|
PROPERTIES PROOF METHOD IN IPCL APPLICATION TO REAL-WORLD SYSTEM CORRECTNESS ...
By: Mykyta Kartavov, Taras Panchenko, Nataliya Polishchuk
(3800 reads)
Rating:

(1.00/10)
|
Abstract: The correctness proof for programs with parallelism, and interleaving concurrency with
shared memory in particular, is complicated problem because the state of separate execution thread
can be changed even in ready-to-run (waiting) time due to possible inference of one execution path over
the other via shared data or messaging mechanics. Classical methods like Floyd-Hoare? cannot be
applied directly to this case and new non-trivial methods are required to cope with such a complexity.
The safety property proof of real-world system using method for software correctness proof in
Interleaving Parallel Composition Language (for defined custom class of programs – namely server
software for Symmetric Multi-Processing? architecture like DB-server or Web-server) is the subject of this
article. Operational semantics of the system is defined in terms of state transitions. Program Invariant as
well as Pre- and Post- conditions are formulated in accordance with the methodology. Conclusions
about adequacy of the Method usage for such a kind of tasks (thanks to flexibility of compositionnominative
platform) and its practicality as well as ease of use for real-world systems have been made
based on this and other authors’ works.
Keywords: software correctness, safety proof, concurrent program, interleaving, invariant, IPCL,
composition approach, composition-nominative languages, formal verification.
ACM Classification Keywords: F.3.1 Theory of Computation - LOGICS AND MEANINGS OF
PROGRAMS - Specifying and Verifying and Reasoning about Programs, D.2.4 Software - SOFTWARE
ENGINEERING - Software/Program Verification.
Link:
PROPERTIES PROOF METHOD IN IPCL APPLICATION TO REAL-WORLD SYSTEM
CORRECTNESS PROOF
Mykyta Kartavov, Taras Panchenko, Nataliya Polishchuk
http://www.foibg.com/ijima/vol04/ijima04-02-p04.pdf
|
AN APPROACH TO BUSINESS PROCESSES REENGINEERING BASED ON INTEGRATION OF ...
By: Renata Ayzatullova, Lyudmila Lyadova, Irina Shalyaeva
(3393 reads)
Rating:

(1.00/10)
|
Abstract: An approach to reengineering business processes through the integration of the domain
specific modeling platform and Process Mining tools is described. An analysis of the existing
approaches to business processes improvement is presented and restrictions are shown. The Process
Mining methods are related to business process reengineering stages and tasks. Comparative analysis
of Process Mining tools is executed. The advantages of the using of domain specific modeling tools
(language workbenches, DSM platforms) are substantiated. Brief comparison of various visual
languages notations and model transformation examples are described. The DSM platform ensures
mutual understanding between specialists. The MetaLanguage? DSM platform is the basis of integration
tools. Some DSL (metamodels) are described and transformations are illustrated. The implementation of
integrated tools reduces the complexity of analyst’s work.
Keywords: business processes reengineering, domain specific modeling, DSM, modeling languages,
DSL, language toolkits, DSM platform, model transformations, business process analysis, Process
Mining.
ACM Classification Keywords: H.4 INFORMATION SYSTEMS APPLICATIONS: H.4.1 Office
Automation –Workflow management; H.4.2 Types of Systems – Decision support (e.g., MIS). I.6
SIMULATION AND MODELING: I.6.2 Simulation Languages; I.6.4 Model Validation and Analysis; I.6.5
Model Development Modeling methodologies.
Link:
AN APPROACH TO BUSINESS PROCESSES REENGINEERING BASED ON
INTEGRATION OF THE PROCESS MINING METHODS AND
DOMAIN SPECIFIC MODELING TOOLS
Renata Ayzatullova, Lyudmila Lyadova, Irina Shalyaeva
http://www.foibg.com/ijima/vol04/ijima04-02-p03.pdf
|
Index matrices with function-type of elements. Part 2
By: Krassimir T. Atanassov
(3260 reads)
Rating:

(1.00/10)
|
Abstract. Index Matrices (IMs) are extensions of the ordinary matrices. Some of the operations and relations
defined over IMs are analogous of the standard ones, while there have been defined new ones, as well. Operators
that do not have analogues in matrix theory have been defined, as well. In general, the elements of an IM can be
real or complex numbers, as well as propositions or predicates. In the present paper, new operation over IMs with
elements being functions, is defined, and some of its properties are discussed.
Keywords: Function, Index matrix, Operation, Operator, Relation.
AMS Classification: 11C20
Link:
Index matrices with function-type of elements. Part 2
Krassimir T. Atanassov
http://www.foibg.com/ijima/vol04/ijima04-02-p02.pdf
|
AN UNCERTAIN CAUCHY PROBLEM OF A NEW CLASS OF FUZZY DIFFERENTIAL EQUATIONS
By: Alexei Bychkov, Eugene Ivanov, Olha Suprun
(3181 reads)
Rating:

(1.00/10)
|
Abstract: The concept of fuzzy perception roaming process is entered. A new integral is built by the
fuzzy perception roaming process. Properties of this integral are studied. The new class of differential
equalizations is acquired. A theorem of existence and uniqueness of a solution for the new class of
fuzzy perception differential equations are proved.
Keywords: possibility-theoretical approach, dynamic processes, soft modeling, fuzzy perception
processes, Cauchy problem.
ACM Classification Keywords: G.1.7 – Ordinary Differential Equations.
Link:
AN UNCERTAIN CAUCHY PROBLEM OF A NEW CLASS OF FUZZY DIFFERENTIAL
EQUATIONS
Alexei Bychkov, Eugene Ivanov, Olha Suprun
http://www.foibg.com/ijima/vol04/ijima04-02-p01.pdf
|
METHOD OF ESTIMATING RELIABILITY OF INFORMATION TRANSMISSION IN WIRELESS ...
By: Sergey Zaitsev
(3014 reads)
Rating:

(1.00/10)
|
Abstract: This paper describes a method for estimating the reliability of information transmission in
wireless networks operating in conditions of high noise and interference. The method is based on
obtaining analytical relationships for calculating the reliability of information transmission based on
nonlinear regression analysis and the use of log-likelihood function about transmitted bits in decisionmaking
in the turbo decoder.
Keywords: information technologies, a priori uncertainty, wireless networks, turbo codes
ACM Classification Keywords: H.4 Information system applications, H.4.3 Communications
Applications and Expert Systems, G.1.6 Optimization, I.6 Simulation and Modeling, K.6.4 System
Management
Link:
METHOD OF ESTIMATING RELIABILITY OF INFORMATION TRANSMISSION IN
WIRELESS NETWORKS CHANNELS INCREASE IN NOISE AND INTERFERENCE
Sergey Zaitsev
http://www.foibg.com/ijima/vol04/ijima04-01-p08.pdf
|
SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP)
By: Irma Aslanishvili, Tariel Khvedelidze
(3073 reads)
Rating:

(1.00/10)
|
Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static
nodes that can freely and dynamically self-organize Namicheishvili et al, 2011. In this way they form
arbitrary, and temporary “Ad hoc” networks topologies, allowing devices to seamlessly interconnect in
areas with no pre-existing infrastructure. Introduction of new protocols such as Bluetooth, IEEE
802.11and Hyperlink are making possible the deployment of ad hoc networks for commercial purposes.
TCP (Transmission Control Protocol) was designed to provide reliable end-to end delivery of data over
unreliable networks. In theory, TCP should be independent of the technology of the underlying
infrastructure. In particular, TCP should not care whether the Internet Protocol (IP) is running over wired
or wireless connections. In practice, it does matter because most TCP deployments have been carefully
designed based on assumptions that are specific to wired networks. Ignoring the properties of wireless
transmission can lead to TCP implementations with poor performance. In practice, most TCP
deployments have been carefully designed in the context of wired networks. In order to adapt TCP to
the ad hoc environment, improvements have been proposed in the literature to help TCP to differentiate
between the different types of losses. Indeed, in mobile or static ad hoc networks losses are not always
due to network congestion, as it is mostly the case in wired networks. In this paper, we present model:
how TCP can be affected by mobility and lower layers protocols.
Keywords: Ad Hoc Networks, protocols, Routing protocols, packet, source node, Relay routing, finite
memory, TCP, Simulation Metrics, layers protocols TCP Feedback, TCP-DOOR.
Link:
SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP)
Irma Aslanishvili, Tariel Khvedelidze
http://www.foibg.com/ijima/vol04/ijima04-01-p07.pdf
|
AN APPROACH TO BEHAVIORAL SOFTWARE MODELS ANALYTICAL REPRESENTATION
By: Elena Chebanyuk
(3275 reads)
Rating:

(1.00/10)
|
Abstract: According to standard UML 2.5 Behavioral Software Models (BSMs) are UML diagrams that
represent software behavior UML 2.5, 2012. An approach of BSM analytical representation is
proposed in this paper. Such BSMs as Use Case Diagrams (UCDs), Collaboration Diagrams (CDs) and
Sequence Diagrams (SDs) are considered at this paper. In order to design this approach objects and
operations that are both common and specific for every type of considering UML diagrams are defined.
In order to prepare general analytical representation of BSM it is proposed to form two tuples containing
objects and operations. Thus, BSM is represented as a Cartesian product of these two tuples. Then
analytical representation of conditional operation is proposed.
The peculiarity of the represented approach is that unified analytical representation of some operation
for all types of considering BSMs is used. Such representation facilitates performing many operations in
Model-Driven? Architecture (MDA) area.
Literature review shows that researches of BSMs mostly focused on preparation of an analytical
representation for parallel processes Hu, 2014, Dove, 2014 or designing transformation technics
Rhazali, 2014, Romera ,2014, FUML, 2013, Wang, 2014, Bonaris, 2014 and ect.. But conditional
operations are important constituents of any complex algorithms of processes. Existing technics of
conditional operations description, for example Object Constraint Language (OCL) OCL 2.4, 2014, do
not contain detailed notation for representation of any condition with given precision level. The notation
for formal analytical representation of conditional operation is represented in this paper. It is shown that
any complex conditions can be described in terms of the proposed notation. In order to prove this thesis
different conditional blocks are designed from Collaboration Diagrams. Also the analytical
representation of conditional block is obtained from other types of considering BSM.
Also in the point further research the general idea of framework for the analytical description of BSM is
proposed.
In conclusion advantages of implementing of the proposed approach to perform different activities in
software development lifecycle are formulated.
Keywords: Analytical representation, UML diagrams, Set-theory, Object Constraint Languages (OCL),
Model-Driven? Architecture (MDA).
ACM Classification Keywords: D.2.2 - Design Tools and Techniques, D.2.11 Software Architecture
Link:
AN APPROACH TO BEHAVIORAL SOFTWARE MODELS ANALYTICAL
REPRESENTATION
Elena Chebanyuk
http://www.foibg.com/ijima/vol04/ijima04-01-p06.pdf
|
ADAPTIVE ALGORITHM FOR MANAGEMENT BY WEIGHT COEFFICIENTS OF THE TRAFFIC ...
By: Kiril Kolchakov, Vladimir Monov
(3351 reads)
Rating:

(1.00/10)
|
bstract: An adaptive algorithm for management by weight coefficients of the traffic in Crossbar
commutator is synthesisеd. The algorithm is adaptive because the matrix of weights corresponds to the
matrix of the requests, each request receives a weight. The algorithm is modified in order to reduce the
number of the weights by the diagonal location.
Keywords: Network nodes, Crossbar switch, Conflict elimination, Packet messages.
ACM Classification Keywords: C.2.1 Network Architecture and Design, C.4 Performance of Systems.
Link:
ADAPTIVE ALGORITHM FOR MANAGEMENT BY WEIGHT COEFFICIENTS OF THE
TRAFFIC IN CROSSBAR COMMUTATOR
Kiril Kolchakov, Vladimir Monov
http://www.foibg.com/ijima/vol04/ijima04-01-p05.pdf
|
ОNTOLOGICAL APPROACH TO A CONSTRUCTION OF THE SIMULATION SYSTEM FOR ...
By: Elena Zamyatina, Alexander Mikov, Roman Mikheev
(3058 reads)
Rating:

(1.00/10)
|
Abstract: This paper discusses the problem of simulation system constructing for the specific domain.
Authors suggest using the ontological approach. The simulation system TriadNS is considered. This
simulation system is dedicated for computer networks design and analysis. Authors represent base
ontology and some other ontologies describing the concepts of a specific domain.
Keywords: simulation, ontology, computer network, multi model approach
ACM Classification Keywords: I.6 Simulation and Modeling, I.6.8 Types of Simulation - Distributed: I.2
Artificial Intelligence, I.2.5 Programming Languages and Software - Expert system tools and techniques
Link:
ОNTOLOGICAL APPROACH TO A CONSTRUCTION OF THE SIMULATION SYSTEM
FOR THE SPECIFIC DOMAIN
Elena Zamyatina, Alexander Mikov, Roman Mikheev
http://www.foibg.com/ijima/vol04/ijima04-01-p04.pdf
|
SIMULATION MODELING IN THE CONSTRUCTION OF DYNAMIC INTEGRATED EXPERT SYSTEMS
By: Galina Rybina, Victor Rybin
(3075 reads)
Rating:

(1.00/10)
|
Abstract: Problems of integrating methods and simulation modeling tools with the technology of
dynamic integrated expert systems (IES) developed on the basis of task-oriented methodology and ATTECHNOLOGY
workbench are investigated in the context of the modern stage of simulation modeling
development. The current version of the simulation modeling subsystem, functioning as a part of the
dynamic version of the AT-TECHNOLOGY workbench, is described. Basic subsystem components and
the construction technology of simulation models of complex technical systems are considered, as well
as examples of application of this subsystem in prototyping dynamic IES are provided.
Keywords: dynamic intelligent systems, dynamic integrated expert systems, task-oriented
methodology, simulation, complex engineering systems, simulation modeling subsystem, simulation
model, AT-TECHNOLOGY workbench.
Link:
SIMULATION MODELING IN THE CONSTRUCTION OF DYNAMIC INTEGRATED
EXPERT SYSTEMS
Galina Rybina, Victor Rybin
http://www.foibg.com/ijima/vol04/ijima04-01-p03.pdf
|
DEVELOPMENT AND ANALYSIS OF GENETIC ALGORITHM FOR TIME SERIES FORECASTING ...
By: Leonid Hulianytskyi, Anna Pavlenko
(3771 reads)
Rating:

(1.00/10)
|
Abstract: This paper presents developed genetic-based algorithm for time series forecasting problem
and describes approaches to learning procedures design. Different techniques of population
representation, recombination, formation of niches, calculation of fitness, conflict resolution methods are
proposed. Results of computational experiments with real time series are analyzed.
Keywords: forecasting, genetic-based machine learning, rule-based forecasting, genetic algorithm, time
series forecasting, evolutionary algorithms.
ACM Classification Keywords: I.2.8 Problem Solving, Control Methods, and Search
Link:
DEVELOPMENT AND ANALYSIS OF GENETIC ALGORITHM FOR TIME SERIES
FORECASTING PROBLEM
Leonid Hulianytskyi, Anna Pavlenko
http://www.foibg.com/ijima/vol04/ijima04-01-p02.pdf
|
A STUDY OF INTELLIGENT TECHNIQUES FOR PROTEIN SECONDARY STRUCTURE PREDICTION
By: Hanan Hendy, Wael Khalifa, Mohamed Roushdy, Abdel Badeeh Sal
(3648 reads)
Rating:

(1.00/10)
|
Abstract: Protein secondary structure prediction has been and will continue to be a rich research field.
This is because the protein structure and shape directly affect protein behavior. Moreover, the number
of known secondary and tertiary structures versus primary structures is relatively small. Although the
secondary prediction started in the seventies but it has been together with the tertiary structure
prediction a topic that is always under research. This paper presents a technical study on recent
methods used for secondary structure prediction using amino acid sequence. The methods are studied
along with their accuracy levels. The most known methods like Neural Networks and Support Vector
Machines are shown and other techniques as well. The paper shows different approaches for predicting
the protein structures that showed different accuracies that ranged from 50% to over than 90%. The
most commonly used technique is Neural Networks. However, Case Based Reasoning and Mixed
Integer Linear Optimization showed the best accuracy among the machine learning techniques and
provided accuracy of approximately 83%.
Keywords: Bioinformatics, Machine Learning, Protein Secondary Structure Prediction.
ACM Classification Keywords: I.2 Artificial Intelligence, H.4 Information System Applications, H.4.2
Types of systems decision support
Link:
A STUDY OF INTELLIGENT TECHNIQUES FOR PROTEIN SECONDARY
STRUCTURE PREDICTION
Hanan Hendy, Wael Khalifa, Mohamed Roushdy, Abdel Badeeh Salem
http://www.foibg.com/ijima/vol04/ijima04-01-p01.pdf
|
PHOTOGRAMMETRIC TECHNIQUE FOR THE DETERMINATION OF THE MOMENT IN TIME AND ...
By: Spilko Hubenov, Georgi Stoilov
(3300 reads)
Rating:

(1.00/10)
|
Abstract: An experimental study establishing a technique for the contactless optical determination of the local
plastic formability limit on the loss of stability of sheet metal has been conducted. The possibilities for the
recording of the time instant and the place of the localisation of the deformation based on the changes in the
optical images of the surface have been examined. An optical criterion for the determination of the time instance
and the place of the loss of stability derived through a correlation analysis of the images has been proposed. The
experimentally obtained results have been presented and analysed.
Keywords: stable formability limit, loss of stability, photogrammetry, correlation analysis, digital image
correlation
Link:
PHOTOGRAMMETRIC TECHNIQUE FOR THE DETERMINATION OF THE MOMENT
IN TIME AND THE PLACE OF THE LOSS OF STABILITY DURING THE PLASTIC
DEFORMATION OF SHEET METAL
Spilko Hubenov, Georgi Stoilov
http://www.foibg.com/ijima/vol03/ijima03-04-p06.pdf
|
ON THE TRAINING OF CONSOLIDATED INFORMATION ANALYSTS
By: Kateryna Solovyova et al.
(3199 reads)
Rating:

(1.00/10)
|
Abstract: The current development of society requires the use of modern information technologies of business
administration, regardless the field of activity. For automation and informatization an enterprise requires the
introduction of innovative technologies, including technologies for knowledge management. To ensure the
integration of modern information technology corresponding to the noospheric stage of scientific development
organizations require highly qualified analysts for consolidated information (business intelligence analysts,
information analysts, knowledge managers). The Social Informatics Department of the Kharkiv National University
of Radio Electronics is engaged in the training of such specialists, its workers developed a standard for the
preparation of consolidated information analysts in Ukraine. This standard is largely in line with the preparation of
Competitive Intelligence Professionals (Competitive Intelligence)1, 2.
Special difficulties in the training of consolidated information analysts in a lack of teaching hours are related to the
need of development of a special kind of systematic analytical and creative thinking, as well as the ability to
perceive and implement modern world standards of information and organizational culture. The training program
is formed in a manner to develop thinking and understanding of the relevance, necessity and features of work
with knowledge at the graduates from various universities and bachelor systems. An important role in this process
belongs to the integration of educational and scientific process at the department that allows us to prepare highly
qualified specialists in a short time, but the main feature is the use of training in the preparation of a noospheric
system methodology - systemology and modern systemological method – the systemological classification
analysis 3.
The article deals with the relevance of the training and development of the specialty through the use of modern
tools of knowledge management, some aspects of the training of consolidated information analysts, methods and
tools to improve the quality of their education in terms of reducing academic load and reduce the direct interaction
between teachers and students.
Keywords: Knowledge management, consolidated information analyst, systemological classification analysis,
information technology, classification, social network on the Internet, model, e-learning, UML diagrams, learning
organization, software testing, business process analysis and modeling requirements.
Link:
ON THE TRAINING OF CONSOLIDATED INFORMATION ANALYSTS
Kateryna Solovyova, Andrey Danilov, Olga Pishchukhina, Panasovska Yuliia,
Olga Lashyna, Maria Kozlova, Maryna Khoroshenko, Maksym Voroniy
http://www.foibg.com/ijima/vol03/ijima03-04-p05.pdf
|
НАУЧНЫЕ ПОДХОДЫ СИСТЕМЫ ФОРМИРОВАНИЯ КОНКУРЕНТОСПОСОБНОГО УЧИТЕЛЯ
By: Юрий Иванович Завалевский
(3308 reads)
Rating:

(1.00/10)
|
Аннотация: В статье обосновываются научные подходы, в соответствии с которыми происходит
формирование конкурентоспособности учителя. Доказывается необходимость комплексного
применения мировоззренческих идей обозначенных подходов. Анализируются авторские концепции
трактовки содержания данных подходов, на основе которых выделяются характерные черты в
соответствии с проблемами конкурентоспособности личности, учителя.
Ключевые слова: методологические основы исследования, научные подходы, системный подход,
синергетический подход, личностно-деятельностный подход, аксиологический подход, ресурсный
подход, компетентностный подход.
Link:
НАУЧНЫЕ ПОДХОДЫ СИСТЕМЫ ФОРМИРОВАНИЯ
КОНКУРЕНТОСПОСОБНОГО УЧИТЕЛЯ
Юрий Иванович Завалевский
http://www.foibg.com/ijima/vol03/ijima03-04-p04.pdf
|
КОМПЛЕКСНЫЕ ИНСТРУМЕНТАЛЬНЫЕ СРЕДСТВА ИНЖЕНЕРИИ ОНТОЛОГИЙ
By: Виталий Величко, Кирилл Малахов, Виталий Семенков, Александр
(4017 reads)
Rating:

(1.00/10)
|
Аннотация: В статье представлен обзор актуальных специализированных инструментальных
средств инженерии онтологий, а также средств аннотирования текстов на основе онтологий.
Рассмотрены основные функции и возможности данных инструментальных средств, их достоинства
и недостатки. Описываются основные компоненты системы формирования онтологий на основе
семантического анализа текстовых массивов. Дается системный сравнительный анализ средств
инженерии онтологий.
Ключевые слова: онтология, инженерия знаний, проектирование онтологии предметной области,
инструментальный комплекс онтологического назначения.
ACM Classification Keywords: I.2 ARTIFICIAL INTELLIGENCE - I.2.4 Knowledge Representation Formalisms
and Methods, H. Information Systems – H.2 DATABASE MANAGEMENT – H.2.4 Systems
Link:
КОМПЛЕКСНЫЕ ИНСТРУМЕНТАЛЬНЫЕ СРЕДСТВА ИНЖЕНЕРИИ ОНТОЛОГИЙ
Виталий Величко, Кирилл Малахов, Виталий Семенков, Александр Стрижак
http://www.foibg.com/ijima/vol03/ijima03-04-p03.pdf
|
MODEL OF THE MONEY CIRCULATION IN THE BULGARIAN LANDS DURING THE ANTIQUITY AND T
By: Jordan Tabov
(3554 reads)
Rating:

(1.00/10)
|
Abstract: This article presents a model of the money circulation in Bulgaria, based on the data about coins,
excavated in Bulgaria and published in the Proceedings of the (Bulgarian) Archaeological Society (PAS) during
the period 1910-1920 and in the Proceedings of the (Bulgarian) Archaeological Institute (PAI) during the period
1921-1959. We construct the Chronological Distribution of these coins and its graph using computer technology
(the package MS Excel in our case). The studied material consists of over 280000 coins, which in our view is
large enough to give an adequate picture in a first approximation of the chronological distribution of all coins
excavated in the Bulgarian lands during the period 1910-1959. We think that it also gives a plausible picture of
the monetary circulation in the eastern part of the Balkan Peninsula during the different historical periods. We
discuss some considerable anomalies of the obtained chronological distribution. The results of the analysis
juxtaposed with a peculiarity of the Chronological Distribution of Byzantine coins noticed by A. Kazhdan leads us
to the hypothesis that there are probably certain mistakes in the accepted dating of some ancient coins.
Keywords: model; money circulation; coin finds; chronological distribution
ACM Classification Keywords: I.6 Simulation and Modeling, I.6.3 Applications
Link:
MODEL OF THE MONEY CIRCULATION IN THE BULGARIAN LANDS DURING THE
ANTIQUITY AND THE MIDDLE AGES
Jordan Tabov
http://www.foibg.com/ijima/vol03/ijima03-04-p02.pdf
|
RDFARM - A SYSTEM FOR STORING LARGE SETS OF RDF TRIPLES AND QUADRUPLES BY ...
By: Krassimira Ivanova
(8529 reads)
Rating:

(1.00/10)
|
Abstract: In this paper we present results from experiments for storing middle-size and large sets of RDF triples
and quadruples by means of Natural Language Addressing. For experiments we have realized program RDFArM
aimed to store RDF triples and quadruples in multi-layer hash tables (information spaces with variable size). The
main features of program RDFArM are outlined in the paper. Analysis of the experimental results and rank-based
multiple comparison are discussed.
Keywords: Natural Language Addressing; Rank-based Multiple Comparison
ACM Classification Keywords: H.2 Database Management; H.2.8 Database Applications
Link:
RDFARM - A SYSTEM FOR STORING LARGE SETS OF RDF TRIPLES AND
QUADRUPLES BY MEANS OF NATURAL LANGUAGE ADDRESSING
Krassimira Ivanova
http://www.foibg.com/ijima/vol03/ijima03-04-p01.pdf
|
ORGANIZING OF KNOWLEDGE BASES FOR EMERGENCY SITUATIONS USING SOCIAL NETWORKS
By: Oleksandr Kuzomin, Bohdan Tkachenko, Mariia Lysenko
(3060 reads)
Rating:

(1.00/10)
|
Abstract: This paper describes technology of automated survey system for emergencies eyewitness that helps to
collect data about emergencies.
Keywords: Social Networks, Emergencies Prevention, Automatic Survey, Language Analysis, Special Language.
Link:
ORGANIZING OF KNOWLEDGE BASES FOR EMERGENCY SITUATIONS USING
SOCIAL NETWORKS
Oleksandr Kuzomin, Bohdan Tkachenko, Mariia Lysenko
http://www.foibg.com/ijima/vol03/ijima03-03-p11.pdf
|
COMPUTERIZED MODEL FOR APHASIA ASSESSMENT, BASED ON KERTEZS TEST
By: Iliya Pendzhurov, Polina Mihova, Atanas Dashovski
(3139 reads)
Rating:

(1.00/10)
|
Abstract: Aphasia is an acquired communication disorder caused by brain damage that impairs a person’s ability
to understand, produce and use language. Furthermore, it is a multimodal disorder which includes additional
neurological impairments such as apraxia of speech or dysarthria Keshree et al, 2013. Aphasia tests are used to
classify and diagnose aphasia and they are needed for a standard classification of aphasia and to compare
studies performed in different centers. The aim of this paper is to present an original authors solution, which
performs a digital version of the Kertész test.
Keywords: aphasia, WAB, software solution
Link:
COMPUTERIZED MODEL FOR APHASIA ASSESSMENT, BASED ON KERTEZS
TEST
Iliya Pendzhurov, Polina Mihova, Atanas Dashovski
http://www.foibg.com/ijima/vol03/ijima03-03-p10.pdf
|
THREE RD MODELS FOR TWO-HOP RELAY ROUTING WITH LIMITED PACKETS LIFETIME IN...
By: Irma Aslanishvili
(3124 reads)
Rating:

(1.00/10)
|
Abstract: The rules for preparing the manuscripts for the International Journals (IJ) and International Book Series
(IBS) of the ITHEA International Scientific Society (ITHEA ISS) are outlined. We study mobile communication of
networks, the ad hoc networks, Ad hoc networks are complex distributed systems that consist of wireless mobile
or static nodes that can freely and dynamically self-organize. The parameter of the queuing models depends on
the node mobility pattern.
The main finding is that the expected relay buffer size depends on the expectation and the variance of the nodes
contact time. Such analysis is done for the three dimensional random walks models over a circle; expected relay
buffer size depends on the expectation and the variance of the nodes contact time.
First model-The source node transmits a packet only once (either to the relay or to the destination node). Thus,
the source node does not keep a copy of the packet once it has been sent. When the source node transmits a
packet to the destination node (when their locations permit such a transmission), the source node transmits
packets that it has not transmitted before. The source node has always data to send to the destination node. This
is a standard assumption, also made in GMPS04, GT02, GK00, because we are interested in the maximum
relay throughput of the relay node. This shows: the first relay node performs a Random walk and the source and
destination are fixed, second the source, the destination, and the relay node move inside a square according to
the RD model. Second model-The relay node is moving according to a symmetric random walk (RW) on a circle
of 4R + 2w steps.
Third model - Three nodes: a source a destination and a relay source, nodes are moving a cording a symmetrical
Random Walk over a circle.
Keywords: Ad Hoc Networks, MANETs protocols, Routing protocols, packet, source node, Relay routing, finite
memory, Relay Buffer (RB), RB occupancy, Destination.
Link:
THREE RD MODELS FOR TWO-HOP RELAY ROUTING WITH LIMITED PACKETS
LIFETIME IN AD HOC NETWORKS
Irma Aslanishvili
http://www.foibg.com/ijima/vol03/ijima03-03-p09.pdf
|
ALGORITHMS OF AUTOMATE MODEL CONSTRUCTION FOR BUSINESS GAME EXECUTION SUBSYSTEM
By: Alexandr Deryabin, Lidia Shestakova, Olga Vikentyeva
(3637 reads)
Rating:

(1.00/10)
|
Abstract: Changes of professional environment, caused by introduction of new technologies and techniques,
create a necessity in continuous education and development of professional competences. In these conditions,
managers and other company employees face the choice of methods and tools of personnel training. A business
game is one of the most productive tools of business-education.
This paper elaborates the ideas embodied previously, which considered the conceptual approach to a toolkit
creation for active training techniques in a form of competence-based business game studio. Competence-based
business game studio is an ergatic system for development of professional competences, which are required to
ensure organization’s business processes.
Business game control is performed with the help of automate module, which executes the interpretation of
expressions in algorithm logical scheme language.
Unified business process is the input data for automate model construction. Unified business process is acquired
from the information about company’s real business processes, represented in poorly formalized ways. Unified
business process transforms into unified training business process, which includes possible business game
trainee actions and information about input, output, administrative data and business process operation execution
mechanism. The next step to automate model is the construction of scenario graph, which represents a more
formalized description of unified training business process. Next, the administrating algorithm of the business
game in algorithm logical scheme language is built. The paper considers the algorithms of transition between
models that allow automating the process of acquiring algorithm logical scheme in order to implement the
business games scenario.
Keywords: active learning methods, business-game, business-process, automate model, algorithm logical
scheme, algorithm, metamodels
ACM Classification Keywords: K.3 Computers and Education: K.3.2 Computer and Information Science
Education – Information systems education. K.4 Computers and Society: K.4.3 Organizational Impacts –
Employment. I. Computing Methodologies: I.2 Artificial Intelligence: I.2.1 Applications and Expert Systems –
Games.
Link:
ALGORITHMS OF AUTOMATE MODEL CONSTRUCTION FOR BUSINESS GAME
EXECUTION SUBSYSTEM
Alexandr Deryabin, Lidia Shestakova, Olga Vikentyeva
http://www.foibg.com/ijima/vol03/ijima03-03-p08.pdf
|
FEATURES OF PLANNING TECHNOLOGIES IN COMPUTER-AIDED MANAGEMENT SYSTEMS ...
By: Iryna Balchenko, Vitaliy Lytvynov, Maria Shulga
(3915 reads)
Rating:

(1.00/10)
|
Abstract: The design principles of the functional subsystem of planning for automatizing management of a crop
cultivating agricultural enterprise are shown. Main directions and tasks for the effective work planning of an
agricultural enterprise are described.
Keywords: information technologies, planning, automatizing of management, agriculture enterprise.
ACM Classification Keywords: H.4 Information system applications, I.2.1 Applications and Expert Systems,
G.1.6 Optimization
Link:
FEATURES OF PLANNING TECHNOLOGIES IN COMPUTER-AIDED MANAGEMENT
SYSTEMS OF AN AGRICULTURAL ENTERPRISE
Iryna Balchenko, Vitaliy Lytvynov, Maria Shulga
http://www.foibg.com/ijima/vol03/ijima03-03-p07.pdf
|
HUMAN AND TELECOMMUNICATION TECHNOLOGIES LIFE CYCLES COMPARISON
By: Galina Gayvoronska, Illia Ganytskyi, Petr Yatsuk
(3649 reads)
Rating:

(1.00/10)
|
Annotation: Main stages of human life cycle are described. The human and telecommunication technologies life
cycle’s comparison is done. The general approach to the consideration of telecommunication technologies life
cycle is shown. Also the paper shows that the overall picture of telecommunication technology development can
be obtained only with an integrated approach to the issue. Only a combination of methodological, statistical
approach and development of the standardization process will provide effective assessment, required by
companies for development the industry.
Keywords: life cycle, live cycle stages, telecommunication technologies
Keywords classification of ACM: C. Computer Systems Organization D.2.9 Management (K.6.3) Life cycle.
Link:
HUMAN AND TELECOMMUNICATION TECHNOLOGIES LIFE CYCLES
COMPARISON
Galina Gayvoronska, Illia Ganytskyi, Petr Yatsuk
http://www.foibg.com/ijima/vol03/ijima03-03-p06.pdf
|
MARKET-REQUIRED COMPETENCE TOPIC DYNAMICS
By: Tigran Topchyan
(3395 reads)
Rating:

(1.00/10)
|
Abstract: The Job market is an ever moving and evolving entity. So are the competencies and qualifications it
demands of prospective employees. In our previous work we modelled these competencies using topic models,
but in order to have a more effective understanding of the market, we have to take into account the dynamics of
the system as well. Here we propose using dynamic topic modelling as a means of analysing the job market for
competencies and qualifications stemming from our previous research.
Keywords: dynamic topic modelling, qualification, competence, dynamics
ACM Classification Keywords: H.0 Information Systems-General?
Link:
MARKET-REQUIRED COMPETENCE TOPIC DYNAMICS
Tigran Topchyan
http://www.foibg.com/ijima/vol03/ijima03-03-p05.pdf
|
|
|