Menu
PROPERTIES PROOF METHOD IN IPCL APPLICATION TO REAL-WORLD SYSTEM CORRECTNESS ...
By: Mykyta Kartavov, Taras Panchenko, Nataliya Polishchuk  (3800 reads)
Rating: (1.00/10)

Abstract: The correctness proof for programs with parallelism, and interleaving concurrency with shared memory in particular, is complicated problem because the state of separate execution thread can be changed even in ready-to-run (waiting) time due to possible inference of one execution path over the other via shared data or messaging mechanics. Classical methods like Floyd-Hoare? cannot be applied directly to this case and new non-trivial methods are required to cope with such a complexity. The safety property proof of real-world system using method for software correctness proof in Interleaving Parallel Composition Language (for defined custom class of programs – namely server software for Symmetric Multi-Processing? architecture like DB-server or Web-server) is the subject of this article. Operational semantics of the system is defined in terms of state transitions. Program Invariant as well as Pre- and Post- conditions are formulated in accordance with the methodology. Conclusions about adequacy of the Method usage for such a kind of tasks (thanks to flexibility of compositionnominative platform) and its practicality as well as ease of use for real-world systems have been made based on this and other authors’ works.

Keywords: software correctness, safety proof, concurrent program, interleaving, invariant, IPCL, composition approach, composition-nominative languages, formal verification.

ACM Classification Keywords: F.3.1 Theory of Computation - LOGICS AND MEANINGS OF PROGRAMS - Specifying and Verifying and Reasoning about Programs, D.2.4 Software - SOFTWARE ENGINEERING - Software/Program Verification.

Link:

PROPERTIES PROOF METHOD IN IPCL APPLICATION TO REAL-WORLD SYSTEM CORRECTNESS PROOF

Mykyta Kartavov, Taras Panchenko, Nataliya Polishchuk

http://www.foibg.com/ijima/vol04/ijima04-02-p04.pdf

AN APPROACH TO BUSINESS PROCESSES REENGINEERING BASED ON INTEGRATION OF ...
By: Renata Ayzatullova, Lyudmila Lyadova, Irina Shalyaeva   (3393 reads)
Rating: (1.00/10)

Abstract: An approach to reengineering business processes through the integration of the domain specific modeling platform and Process Mining tools is described. An analysis of the existing approaches to business processes improvement is presented and restrictions are shown. The Process Mining methods are related to business process reengineering stages and tasks. Comparative analysis of Process Mining tools is executed. The advantages of the using of domain specific modeling tools (language workbenches, DSM platforms) are substantiated. Brief comparison of various visual languages notations and model transformation examples are described. The DSM platform ensures mutual understanding between specialists. The MetaLanguage? DSM platform is the basis of integration tools. Some DSL (metamodels) are described and transformations are illustrated. The implementation of integrated tools reduces the complexity of analyst’s work.

Keywords: business processes reengineering, domain specific modeling, DSM, modeling languages, DSL, language toolkits, DSM platform, model transformations, business process analysis, Process Mining.

ACM Classification Keywords: H.4 INFORMATION SYSTEMS APPLICATIONS: H.4.1 Office Automation –Workflow management; H.4.2 Types of Systems – Decision support (e.g., MIS). I.6 SIMULATION AND MODELING: I.6.2 Simulation Languages; I.6.4 Model Validation and Analysis; I.6.5 Model Development Modeling methodologies.

Link:

AN APPROACH TO BUSINESS PROCESSES REENGINEERING BASED ON INTEGRATION OF THE PROCESS MINING METHODS AND DOMAIN SPECIFIC MODELING TOOLS

Renata Ayzatullova, Lyudmila Lyadova, Irina Shalyaeva

http://www.foibg.com/ijima/vol04/ijima04-02-p03.pdf

Index matrices with function-type of elements. Part 2
By: Krassimir T. Atanassov  (3260 reads)
Rating: (1.00/10)

Abstract. Index Matrices (IMs) are extensions of the ordinary matrices. Some of the operations and relations defined over IMs are analogous of the standard ones, while there have been defined new ones, as well. Operators that do not have analogues in matrix theory have been defined, as well. In general, the elements of an IM can be real or complex numbers, as well as propositions or predicates. In the present paper, new operation over IMs with elements being functions, is defined, and some of its properties are discussed.

Keywords: Function, Index matrix, Operation, Operator, Relation.

AMS Classification: 11C20

Link:

Index matrices with function-type of elements. Part 2

Krassimir T. Atanassov

http://www.foibg.com/ijima/vol04/ijima04-02-p02.pdf

AN UNCERTAIN CAUCHY PROBLEM OF A NEW CLASS OF FUZZY DIFFERENTIAL EQUATIONS
By: Alexei Bychkov, Eugene Ivanov, Olha Suprun  (3181 reads)
Rating: (1.00/10)

Abstract: The concept of fuzzy perception roaming process is entered. A new integral is built by the fuzzy perception roaming process. Properties of this integral are studied. The new class of differential equalizations is acquired. A theorem of existence and uniqueness of a solution for the new class of fuzzy perception differential equations are proved.

Keywords: possibility-theoretical approach, dynamic processes, soft modeling, fuzzy perception processes, Cauchy problem.

ACM Classification Keywords: G.1.7 – Ordinary Differential Equations.

Link:

AN UNCERTAIN CAUCHY PROBLEM OF A NEW CLASS OF FUZZY DIFFERENTIAL EQUATIONS

Alexei Bychkov, Eugene Ivanov, Olha Suprun

http://www.foibg.com/ijima/vol04/ijima04-02-p01.pdf

METHOD OF ESTIMATING RELIABILITY OF INFORMATION TRANSMISSION IN WIRELESS ...
By: Sergey Zaitsev   (3014 reads)
Rating: (1.00/10)

Abstract: This paper describes a method for estimating the reliability of information transmission in wireless networks operating in conditions of high noise and interference. The method is based on obtaining analytical relationships for calculating the reliability of information transmission based on nonlinear regression analysis and the use of log-likelihood function about transmitted bits in decisionmaking in the turbo decoder.

Keywords: information technologies, a priori uncertainty, wireless networks, turbo codes

ACM Classification Keywords: H.4 Information system applications, H.4.3 Communications Applications and Expert Systems, G.1.6 Optimization, I.6 Simulation and Modeling, K.6.4 System Management

Link:

METHOD OF ESTIMATING RELIABILITY OF INFORMATION TRANSMISSION IN WIRELESS NETWORKS CHANNELS INCREASE IN NOISE AND INTERFERENCE

Sergey Zaitsev

http://www.foibg.com/ijima/vol04/ijima04-01-p08.pdf

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP)
By: Irma Aslanishvili, Tariel Khvedelidze  (3073 reads)
Rating: (1.00/10)

Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that can freely and dynamically self-organize Namicheishvili et al, 2011. In this way they form arbitrary, and temporary “Ad hoc” networks topologies, allowing devices to seamlessly interconnect in areas with no pre-existing infrastructure. Introduction of new protocols such as Bluetooth, IEEE 802.11and Hyperlink are making possible the deployment of ad hoc networks for commercial purposes. TCP (Transmission Control Protocol) was designed to provide reliable end-to end delivery of data over unreliable networks. In theory, TCP should be independent of the technology of the underlying infrastructure. In particular, TCP should not care whether the Internet Protocol (IP) is running over wired or wireless connections. In practice, it does matter because most TCP deployments have been carefully designed based on assumptions that are specific to wired networks. Ignoring the properties of wireless transmission can lead to TCP implementations with poor performance. In practice, most TCP deployments have been carefully designed in the context of wired networks. In order to adapt TCP to the ad hoc environment, improvements have been proposed in the literature to help TCP to differentiate between the different types of losses. Indeed, in mobile or static ad hoc networks losses are not always due to network congestion, as it is mostly the case in wired networks. In this paper, we present model: how TCP can be affected by mobility and lower layers protocols.

Keywords: Ad Hoc Networks, protocols, Routing protocols, packet, source node, Relay routing, finite memory, TCP, Simulation Metrics, layers protocols TCP Feedback, TCP-DOOR.

Link:

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP)

Irma Aslanishvili, Tariel Khvedelidze

http://www.foibg.com/ijima/vol04/ijima04-01-p07.pdf

AN APPROACH TO BEHAVIORAL SOFTWARE MODELS ANALYTICAL REPRESENTATION
By: Elena Chebanyuk   (3275 reads)
Rating: (1.00/10)

Abstract: According to standard UML 2.5 Behavioral Software Models (BSMs) are UML diagrams that represent software behavior UML 2.5, 2012. An approach of BSM analytical representation is proposed in this paper. Such BSMs as Use Case Diagrams (UCDs), Collaboration Diagrams (CDs) and Sequence Diagrams (SDs) are considered at this paper. In order to design this approach objects and operations that are both common and specific for every type of considering UML diagrams are defined. In order to prepare general analytical representation of BSM it is proposed to form two tuples containing objects and operations. Thus, BSM is represented as a Cartesian product of these two tuples. Then analytical representation of conditional operation is proposed. The peculiarity of the represented approach is that unified analytical representation of some operation for all types of considering BSMs is used. Such representation facilitates performing many operations in Model-Driven? Architecture (MDA) area. Literature review shows that researches of BSMs mostly focused on preparation of an analytical representation for parallel processes Hu, 2014, Dove, 2014 or designing transformation technics Rhazali, 2014, Romera ,2014, FUML, 2013, Wang, 2014, Bonaris, 2014 and ect.. But conditional operations are important constituents of any complex algorithms of processes. Existing technics of conditional operations description, for example Object Constraint Language (OCL) OCL 2.4, 2014, do not contain detailed notation for representation of any condition with given precision level. The notation for formal analytical representation of conditional operation is represented in this paper. It is shown that any complex conditions can be described in terms of the proposed notation. In order to prove this thesis different conditional blocks are designed from Collaboration Diagrams. Also the analytical representation of conditional block is obtained from other types of considering BSM. Also in the point further research the general idea of framework for the analytical description of BSM is proposed. In conclusion advantages of implementing of the proposed approach to perform different activities in software development lifecycle are formulated.

Keywords: Analytical representation, UML diagrams, Set-theory, Object Constraint Languages (OCL), Model-Driven? Architecture (MDA).

ACM Classification Keywords: D.2.2 - Design Tools and Techniques, D.2.11 Software Architecture

Link:

AN APPROACH TO BEHAVIORAL SOFTWARE MODELS ANALYTICAL REPRESENTATION

Elena Chebanyuk

http://www.foibg.com/ijima/vol04/ijima04-01-p06.pdf

ADAPTIVE ALGORITHM FOR MANAGEMENT BY WEIGHT COEFFICIENTS OF THE TRAFFIC ...
By: Kiril Kolchakov, Vladimir Monov  (3351 reads)
Rating: (1.00/10)

bstract: An adaptive algorithm for management by weight coefficients of the traffic in Crossbar commutator is synthesisеd. The algorithm is adaptive because the matrix of weights corresponds to the matrix of the requests, each request receives a weight. The algorithm is modified in order to reduce the number of the weights by the diagonal location.

Keywords: Network nodes, Crossbar switch, Conflict elimination, Packet messages.

ACM Classification Keywords: C.2.1 Network Architecture and Design, C.4 Performance of Systems.

Link:

ADAPTIVE ALGORITHM FOR MANAGEMENT BY WEIGHT COEFFICIENTS OF THE TRAFFIC IN CROSSBAR COMMUTATOR

Kiril Kolchakov, Vladimir Monov

http://www.foibg.com/ijima/vol04/ijima04-01-p05.pdf

ОNTOLOGICAL APPROACH TO A CONSTRUCTION OF THE SIMULATION SYSTEM FOR ...
By: Elena Zamyatina, Alexander Mikov, Roman Mikheev   (3058 reads)
Rating: (1.00/10)

Abstract: This paper discusses the problem of simulation system constructing for the specific domain. Authors suggest using the ontological approach. The simulation system TriadNS is considered. This simulation system is dedicated for computer networks design and analysis. Authors represent base ontology and some other ontologies describing the concepts of a specific domain.

Keywords: simulation, ontology, computer network, multi model approach

ACM Classification Keywords: I.6 Simulation and Modeling, I.6.8 Types of Simulation - Distributed: I.2 Artificial Intelligence, I.2.5 Programming Languages and Software - Expert system tools and techniques

Link:

ОNTOLOGICAL APPROACH TO A CONSTRUCTION OF THE SIMULATION SYSTEM FOR THE SPECIFIC DOMAIN

Elena Zamyatina, Alexander Mikov, Roman Mikheev

http://www.foibg.com/ijima/vol04/ijima04-01-p04.pdf

SIMULATION MODELING IN THE CONSTRUCTION OF DYNAMIC INTEGRATED EXPERT SYSTEMS
By: Galina Rybina, Victor Rybin  (3075 reads)
Rating: (1.00/10)

Abstract: Problems of integrating methods and simulation modeling tools with the technology of dynamic integrated expert systems (IES) developed on the basis of task-oriented methodology and ATTECHNOLOGY workbench are investigated in the context of the modern stage of simulation modeling development. The current version of the simulation modeling subsystem, functioning as a part of the dynamic version of the AT-TECHNOLOGY workbench, is described. Basic subsystem components and the construction technology of simulation models of complex technical systems are considered, as well as examples of application of this subsystem in prototyping dynamic IES are provided.

Keywords: dynamic intelligent systems, dynamic integrated expert systems, task-oriented methodology, simulation, complex engineering systems, simulation modeling subsystem, simulation model, AT-TECHNOLOGY workbench.

Link:

SIMULATION MODELING IN THE CONSTRUCTION OF DYNAMIC INTEGRATED EXPERT SYSTEMS

Galina Rybina, Victor Rybin

http://www.foibg.com/ijima/vol04/ijima04-01-p03.pdf

DEVELOPMENT AND ANALYSIS OF GENETIC ALGORITHM FOR TIME SERIES FORECASTING ...
By: Leonid Hulianytskyi, Anna Pavlenko  (3771 reads)
Rating: (1.00/10)

Abstract: This paper presents developed genetic-based algorithm for time series forecasting problem and describes approaches to learning procedures design. Different techniques of population representation, recombination, formation of niches, calculation of fitness, conflict resolution methods are proposed. Results of computational experiments with real time series are analyzed.

Keywords: forecasting, genetic-based machine learning, rule-based forecasting, genetic algorithm, time series forecasting, evolutionary algorithms.

ACM Classification Keywords: I.2.8 Problem Solving, Control Methods, and Search

Link:

DEVELOPMENT AND ANALYSIS OF GENETIC ALGORITHM FOR TIME SERIES FORECASTING PROBLEM

Leonid Hulianytskyi, Anna Pavlenko

http://www.foibg.com/ijima/vol04/ijima04-01-p02.pdf

A STUDY OF INTELLIGENT TECHNIQUES FOR PROTEIN SECONDARY STRUCTURE PREDICTION
By: Hanan Hendy, Wael Khalifa, Mohamed Roushdy, Abdel Badeeh Sal  (3648 reads)
Rating: (1.00/10)

Abstract: Protein secondary structure prediction has been and will continue to be a rich research field. This is because the protein structure and shape directly affect protein behavior. Moreover, the number of known secondary and tertiary structures versus primary structures is relatively small. Although the secondary prediction started in the seventies but it has been together with the tertiary structure prediction a topic that is always under research. This paper presents a technical study on recent methods used for secondary structure prediction using amino acid sequence. The methods are studied along with their accuracy levels. The most known methods like Neural Networks and Support Vector Machines are shown and other techniques as well. The paper shows different approaches for predicting the protein structures that showed different accuracies that ranged from 50% to over than 90%. The most commonly used technique is Neural Networks. However, Case Based Reasoning and Mixed Integer Linear Optimization showed the best accuracy among the machine learning techniques and provided accuracy of approximately 83%.

Keywords: Bioinformatics, Machine Learning, Protein Secondary Structure Prediction.

ACM Classification Keywords: I.2 Artificial Intelligence, H.4 Information System Applications, H.4.2 Types of systems decision support

Link:

A STUDY OF INTELLIGENT TECHNIQUES FOR PROTEIN SECONDARY STRUCTURE PREDICTION

Hanan Hendy, Wael Khalifa, Mohamed Roushdy, Abdel Badeeh Salem

http://www.foibg.com/ijima/vol04/ijima04-01-p01.pdf

PHOTOGRAMMETRIC TECHNIQUE FOR THE DETERMINATION OF THE MOMENT IN TIME AND ...
By: Spilko Hubenov, Georgi Stoilov   (3300 reads)
Rating: (1.00/10)

Abstract: An experimental study establishing a technique for the contactless optical determination of the local plastic formability limit on the loss of stability of sheet metal has been conducted. The possibilities for the recording of the time instant and the place of the localisation of the deformation based on the changes in the optical images of the surface have been examined. An optical criterion for the determination of the time instance and the place of the loss of stability derived through a correlation analysis of the images has been proposed. The experimentally obtained results have been presented and analysed.

Keywords: stable formability limit, loss of stability, photogrammetry, correlation analysis, digital image correlation

Link:

PHOTOGRAMMETRIC TECHNIQUE FOR THE DETERMINATION OF THE MOMENT IN TIME AND THE PLACE OF THE LOSS OF STABILITY DURING THE PLASTIC DEFORMATION OF SHEET METAL

Spilko Hubenov, Georgi Stoilov

http://www.foibg.com/ijima/vol03/ijima03-04-p06.pdf

ON THE TRAINING OF CONSOLIDATED INFORMATION ANALYSTS
By: Kateryna Solovyova et al.  (3199 reads)
Rating: (1.00/10)

Abstract: The current development of society requires the use of modern information technologies of business administration, regardless the field of activity. For automation and informatization an enterprise requires the introduction of innovative technologies, including technologies for knowledge management. To ensure the integration of modern information technology corresponding to the noospheric stage of scientific development organizations require highly qualified analysts for consolidated information (business intelligence analysts, information analysts, knowledge managers). The Social Informatics Department of the Kharkiv National University of Radio Electronics is engaged in the training of such specialists, its workers developed a standard for the preparation of consolidated information analysts in Ukraine. This standard is largely in line with the preparation of Competitive Intelligence Professionals (Competitive Intelligence)1, 2. Special difficulties in the training of consolidated information analysts in a lack of teaching hours are related to the need of development of a special kind of systematic analytical and creative thinking, as well as the ability to perceive and implement modern world standards of information and organizational culture. The training program is formed in a manner to develop thinking and understanding of the relevance, necessity and features of work with knowledge at the graduates from various universities and bachelor systems. An important role in this process belongs to the integration of educational and scientific process at the department that allows us to prepare highly qualified specialists in a short time, but the main feature is the use of training in the preparation of a noospheric system methodology - systemology and modern systemological method – the systemological classification analysis 3. The article deals with the relevance of the training and development of the specialty through the use of modern tools of knowledge management, some aspects of the training of consolidated information analysts, methods and tools to improve the quality of their education in terms of reducing academic load and reduce the direct interaction between teachers and students.

Keywords: Knowledge management, consolidated information analyst, systemological classification analysis, information technology, classification, social network on the Internet, model, e-learning, UML diagrams, learning organization, software testing, business process analysis and modeling requirements.

Link:

ON THE TRAINING OF CONSOLIDATED INFORMATION ANALYSTS

Kateryna Solovyova, Andrey Danilov, Olga Pishchukhina, Panasovska Yuliia, Olga Lashyna, Maria Kozlova, Maryna Khoroshenko, Maksym Voroniy

http://www.foibg.com/ijima/vol03/ijima03-04-p05.pdf

НАУЧНЫЕ ПОДХОДЫ СИСТЕМЫ ФОРМИРОВАНИЯ КОНКУРЕНТОСПОСОБНОГО УЧИТЕЛЯ
By: Юрий Иванович Завалевский   (3308 reads)
Rating: (1.00/10)

Аннотация: В статье обосновываются научные подходы, в соответствии с которыми происходит формирование конкурентоспособности учителя. Доказывается необходимость комплексного применения мировоззренческих идей обозначенных подходов. Анализируются авторские концепции трактовки содержания данных подходов, на основе которых выделяются характерные черты в соответствии с проблемами конкурентоспособности личности, учителя.

Ключевые слова: методологические основы исследования, научные подходы, системный подход, синергетический подход, личностно-деятельностный подход, аксиологический подход, ресурсный подход, компетентностный подход.

Link:

НАУЧНЫЕ ПОДХОДЫ СИСТЕМЫ ФОРМИРОВАНИЯ КОНКУРЕНТОСПОСОБНОГО УЧИТЕЛЯ

Юрий Иванович Завалевский

http://www.foibg.com/ijima/vol03/ijima03-04-p04.pdf

КОМПЛЕКСНЫЕ ИНСТРУМЕНТАЛЬНЫЕ СРЕДСТВА ИНЖЕНЕРИИ ОНТОЛОГИЙ
By: Виталий Величко, Кирилл Малахов, Виталий Семенков, Александр  (4017 reads)
Rating: (1.00/10)

Аннотация: В статье представлен обзор актуальных специализированных инструментальных средств инженерии онтологий, а также средств аннотирования текстов на основе онтологий. Рассмотрены основные функции и возможности данных инструментальных средств, их достоинства и недостатки. Описываются основные компоненты системы формирования онтологий на основе семантического анализа текстовых массивов. Дается системный сравнительный анализ средств инженерии онтологий.

Ключевые слова: онтология, инженерия знаний, проектирование онтологии предметной области, инструментальный комплекс онтологического назначения.

ACM Classification Keywords: I.2 ARTIFICIAL INTELLIGENCE - I.2.4 Knowledge Representation Formalisms and Methods, H. Information Systems – H.2 DATABASE MANAGEMENT – H.2.4 Systems

Link:

КОМПЛЕКСНЫЕ ИНСТРУМЕНТАЛЬНЫЕ СРЕДСТВА ИНЖЕНЕРИИ ОНТОЛОГИЙ

Виталий Величко, Кирилл Малахов, Виталий Семенков, Александр Стрижак

http://www.foibg.com/ijima/vol03/ijima03-04-p03.pdf

MODEL OF THE MONEY CIRCULATION IN THE BULGARIAN LANDS DURING THE ANTIQUITY AND T
By: Jordan Tabov   (3554 reads)
Rating: (1.00/10)

Abstract: This article presents a model of the money circulation in Bulgaria, based on the data about coins, excavated in Bulgaria and published in the Proceedings of the (Bulgarian) Archaeological Society (PAS) during the period 1910-1920 and in the Proceedings of the (Bulgarian) Archaeological Institute (PAI) during the period 1921-1959. We construct the Chronological Distribution of these coins and its graph using computer technology (the package MS Excel in our case). The studied material consists of over 280000 coins, which in our view is large enough to give an adequate picture in a first approximation of the chronological distribution of all coins excavated in the Bulgarian lands during the period 1910-1959. We think that it also gives a plausible picture of the monetary circulation in the eastern part of the Balkan Peninsula during the different historical periods. We discuss some considerable anomalies of the obtained chronological distribution. The results of the analysis juxtaposed with a peculiarity of the Chronological Distribution of Byzantine coins noticed by A. Kazhdan leads us to the hypothesis that there are probably certain mistakes in the accepted dating of some ancient coins.

Keywords: model; money circulation; coin finds; chronological distribution

ACM Classification Keywords: I.6 Simulation and Modeling, I.6.3 Applications

Link:

MODEL OF THE MONEY CIRCULATION IN THE BULGARIAN LANDS DURING THE ANTIQUITY AND THE MIDDLE AGES

Jordan Tabov

http://www.foibg.com/ijima/vol03/ijima03-04-p02.pdf

RDFARM - A SYSTEM FOR STORING LARGE SETS OF RDF TRIPLES AND QUADRUPLES BY ...
By: Krassimira Ivanova   (8529 reads)
Rating: (1.00/10)

Abstract: In this paper we present results from experiments for storing middle-size and large sets of RDF triples and quadruples by means of Natural Language Addressing. For experiments we have realized program RDFArM aimed to store RDF triples and quadruples in multi-layer hash tables (information spaces with variable size). The main features of program RDFArM are outlined in the paper. Analysis of the experimental results and rank-based multiple comparison are discussed.

Keywords: Natural Language Addressing; Rank-based Multiple Comparison

ACM Classification Keywords: H.2 Database Management; H.2.8 Database Applications

Link:

RDFARM - A SYSTEM FOR STORING LARGE SETS OF RDF TRIPLES AND QUADRUPLES BY MEANS OF NATURAL LANGUAGE ADDRESSING

Krassimira Ivanova

http://www.foibg.com/ijima/vol03/ijima03-04-p01.pdf

ORGANIZING OF KNOWLEDGE BASES FOR EMERGENCY SITUATIONS USING SOCIAL NETWORKS
By: Oleksandr Kuzomin, Bohdan Tkachenko, Mariia Lysenko  (3060 reads)
Rating: (1.00/10)

Abstract: This paper describes technology of automated survey system for emergencies eyewitness that helps to collect data about emergencies.

Keywords: Social Networks, Emergencies Prevention, Automatic Survey, Language Analysis, Special Language.

Link:

ORGANIZING OF KNOWLEDGE BASES FOR EMERGENCY SITUATIONS USING SOCIAL NETWORKS

Oleksandr Kuzomin, Bohdan Tkachenko, Mariia Lysenko

http://www.foibg.com/ijima/vol03/ijima03-03-p11.pdf

COMPUTERIZED MODEL FOR APHASIA ASSESSMENT, BASED ON KERTEZS TEST
By: Iliya Pendzhurov, Polina Mihova, Atanas Dashovski  (3139 reads)
Rating: (1.00/10)

Abstract: Aphasia is an acquired communication disorder caused by brain damage that impairs a person’s ability to understand, produce and use language. Furthermore, it is a multimodal disorder which includes additional neurological impairments such as apraxia of speech or dysarthria Keshree et al, 2013. Aphasia tests are used to classify and diagnose aphasia and they are needed for a standard classification of aphasia and to compare studies performed in different centers. The aim of this paper is to present an original authors solution, which performs a digital version of the Kertész test.

Keywords: aphasia, WAB, software solution

Link:

COMPUTERIZED MODEL FOR APHASIA ASSESSMENT, BASED ON KERTEZS TEST

Iliya Pendzhurov, Polina Mihova, Atanas Dashovski

http://www.foibg.com/ijima/vol03/ijima03-03-p10.pdf

THREE RD MODELS FOR TWO-HOP RELAY ROUTING WITH LIMITED PACKETS LIFETIME IN...
By: Irma Aslanishvili  (3124 reads)
Rating: (1.00/10)

Abstract: The rules for preparing the manuscripts for the International Journals (IJ) and International Book Series (IBS) of the ITHEA International Scientific Society (ITHEA ISS) are outlined. We study mobile communication of networks, the ad hoc networks, Ad hoc networks are complex distributed systems that consist of wireless mobile or static nodes that can freely and dynamically self-organize. The parameter of the queuing models depends on the node mobility pattern. The main finding is that the expected relay buffer size depends on the expectation and the variance of the nodes contact time. Such analysis is done for the three dimensional random walks models over a circle; expected relay buffer size depends on the expectation and the variance of the nodes contact time. First model-The source node transmits a packet only once (either to the relay or to the destination node). Thus, the source node does not keep a copy of the packet once it has been sent. When the source node transmits a packet to the destination node (when their locations permit such a transmission), the source node transmits packets that it has not transmitted before. The source node has always data to send to the destination node. This is a standard assumption, also made in GMPS04, GT02, GK00, because we are interested in the maximum relay throughput of the relay node. This shows: the first relay node performs a Random walk and the source and destination are fixed, second the source, the destination, and the relay node move inside a square according to the RD model. Second model-The relay node is moving according to a symmetric random walk (RW) on a circle of 4R + 2w steps. Third model - Three nodes: a source a destination and a relay source, nodes are moving a cording a symmetrical Random Walk over a circle.

Keywords: Ad Hoc Networks, MANETs protocols, Routing protocols, packet, source node, Relay routing, finite memory, Relay Buffer (RB), RB occupancy, Destination.

Link:

THREE RD MODELS FOR TWO-HOP RELAY ROUTING WITH LIMITED PACKETS LIFETIME IN AD HOC NETWORKS

Irma Aslanishvili

http://www.foibg.com/ijima/vol03/ijima03-03-p09.pdf

ALGORITHMS OF AUTOMATE MODEL CONSTRUCTION FOR BUSINESS GAME EXECUTION SUBSYSTEM
By: Alexandr Deryabin, Lidia Shestakova, Olga Vikentyeva  (3637 reads)
Rating: (1.00/10)

Abstract: Changes of professional environment, caused by introduction of new technologies and techniques, create a necessity in continuous education and development of professional competences. In these conditions, managers and other company employees face the choice of methods and tools of personnel training. A business game is one of the most productive tools of business-education. This paper elaborates the ideas embodied previously, which considered the conceptual approach to a toolkit creation for active training techniques in a form of competence-based business game studio. Competence-based business game studio is an ergatic system for development of professional competences, which are required to ensure organization’s business processes. Business game control is performed with the help of automate module, which executes the interpretation of expressions in algorithm logical scheme language. Unified business process is the input data for automate model construction. Unified business process is acquired from the information about company’s real business processes, represented in poorly formalized ways. Unified business process transforms into unified training business process, which includes possible business game trainee actions and information about input, output, administrative data and business process operation execution mechanism. The next step to automate model is the construction of scenario graph, which represents a more formalized description of unified training business process. Next, the administrating algorithm of the business game in algorithm logical scheme language is built. The paper considers the algorithms of transition between models that allow automating the process of acquiring algorithm logical scheme in order to implement the business games scenario.

Keywords: active learning methods, business-game, business-process, automate model, algorithm logical scheme, algorithm, metamodels

ACM Classification Keywords: K.3 Computers and Education: K.3.2 Computer and Information Science Education – Information systems education. K.4 Computers and Society: K.4.3 Organizational Impacts – Employment. I. Computing Methodologies: I.2 Artificial Intelligence: I.2.1 Applications and Expert Systems – Games.

Link:

ALGORITHMS OF AUTOMATE MODEL CONSTRUCTION FOR BUSINESS GAME EXECUTION SUBSYSTEM

Alexandr Deryabin, Lidia Shestakova, Olga Vikentyeva

http://www.foibg.com/ijima/vol03/ijima03-03-p08.pdf

FEATURES OF PLANNING TECHNOLOGIES IN COMPUTER-AIDED MANAGEMENT SYSTEMS ...
By: Iryna Balchenko, Vitaliy Lytvynov, Maria Shulga  (3915 reads)
Rating: (1.00/10)

Abstract: The design principles of the functional subsystem of planning for automatizing management of a crop cultivating agricultural enterprise are shown. Main directions and tasks for the effective work planning of an agricultural enterprise are described.

Keywords: information technologies, planning, automatizing of management, agriculture enterprise.

ACM Classification Keywords: H.4 Information system applications, I.2.1 Applications and Expert Systems, G.1.6 Optimization

Link:

FEATURES OF PLANNING TECHNOLOGIES IN COMPUTER-AIDED MANAGEMENT SYSTEMS OF AN AGRICULTURAL ENTERPRISE

Iryna Balchenko, Vitaliy Lytvynov, Maria Shulga

http://www.foibg.com/ijima/vol03/ijima03-03-p07.pdf

HUMAN AND TELECOMMUNICATION TECHNOLOGIES LIFE CYCLES COMPARISON
By: Galina Gayvoronska, Illia Ganytskyi, Petr Yatsuk  (3649 reads)
Rating: (1.00/10)

Annotation: Main stages of human life cycle are described. The human and telecommunication technologies life cycle’s comparison is done. The general approach to the consideration of telecommunication technologies life cycle is shown. Also the paper shows that the overall picture of telecommunication technology development can be obtained only with an integrated approach to the issue. Only a combination of methodological, statistical approach and development of the standardization process will provide effective assessment, required by companies for development the industry.

Keywords: life cycle, live cycle stages, telecommunication technologies

Keywords classification of ACM: C. Computer Systems Organization D.2.9 Management (K.6.3) Life cycle.

Link:

HUMAN AND TELECOMMUNICATION TECHNOLOGIES LIFE CYCLES COMPARISON

Galina Gayvoronska, Illia Ganytskyi, Petr Yatsuk

http://www.foibg.com/ijima/vol03/ijima03-03-p06.pdf

MARKET-REQUIRED COMPETENCE TOPIC DYNAMICS
By: Tigran Topchyan  (3395 reads)
Rating: (1.00/10)

Abstract: The Job market is an ever moving and evolving entity. So are the competencies and qualifications it demands of prospective employees. In our previous work we modelled these competencies using topic models, but in order to have a more effective understanding of the market, we have to take into account the dynamics of the system as well. Here we propose using dynamic topic modelling as a means of analysing the job market for competencies and qualifications stemming from our previous research.

Keywords: dynamic topic modelling, qualification, competence, dynamics

ACM Classification Keywords: H.0 Information Systems-General?

Link:

MARKET-REQUIRED COMPETENCE TOPIC DYNAMICS

Tigran Topchyan

http://www.foibg.com/ijima/vol03/ijima03-03-p05.pdf

[prev]  Page: 3.6/66  [next]
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66 
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.16 secs ]   [ Memory usage: 7.56MB ]   [ GZIP Disabled ]   [ Server load: 0.08 ]