{"title":"Computer-aided OSPF network design tool","authors":"Pavel Kríz, Filip Malý","doi":"10.2498/iti.2012.0371","DOIUrl":"https://doi.org/10.2498/iti.2012.0371","url":null,"abstract":"This article deals with an experimental version of the software used to visualize the network, provide the possibility to simulate topological and configuration changes, analyze and redesign the network. This tool was successfully deployed in the HKFree community wireless network, consisting of a large number of routers that use the OSPF routing protocol. Its primary purpose is to assist the network administrators in solving problems, creating and maintaining documentation and designing future changes.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127845013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-lingual document similarity","authors":"A. Muhic, Jan Rupnik, P. Skraba","doi":"10.2498/iti.2012.0467","DOIUrl":"https://doi.org/10.2498/iti.2012.0467","url":null,"abstract":"In this paper we investigated how to compute similarities between documents written in different languages based on a weekly aligned multi-lingual collection of documents. Computing the cross-lingual similarities is based on an aligned set of basis vectors obtained by either latent semantic indexing or the k-means algorithm on an aligned multi-lingual corpus. We evaluated the methods on two data sets: Wikipedia and European Parliament Proceedings Parallel Corpus.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115928617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-learning participation in higher education: A study of Scottish and Croatian students","authors":"K. Penny, D. Dukic","doi":"10.2498/cit.1002095","DOIUrl":"https://doi.org/10.2498/cit.1002095","url":null,"abstract":"E-learning is becoming increasingly important in higher education. Information was gathered on students' usage of e-learning activities in Scotland and in Croatia. An exploratory factor analysis reveals four underlying factors which may be used to classify the different types of e-learning activities, and logistic regression modelling was used to identify which student characteristics were associated with each of the different classifications of e-learning. These findings provide an insight into the different usages of e-learning activities, each of which should be considered individually in terms of design and management of e-learning systems, and in the provision of training for staff and students.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115588823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mixnets: Implementation and performance evaluation of decryption and re-encryption types","authors":"Pance Ribarski, Ljupcho Antovski","doi":"10.2498/cit.1002101","DOIUrl":"https://doi.org/10.2498/cit.1002101","url":null,"abstract":"The anonymous channels have been the essence of numerous protocols that include anonymous message passing between peers. The mixnet structure is one way to accomplish the anonymity. Since the publication of the Chaumian mixnet, there have been many practical implementations. There are two main approaches to implement mixnets: the decryption (Chaumian) and the re-encryption mixnets. In this paper we analyze four types of mixnets, from which one decryption and three re-encryption types. They were implemented in the Java programing language and evaluated on several criterias as: the number of messages, the total number of nodes, the number of threshold nodes, and the key length of underlying crypto system. In the results section we compare the results from the practical tests to answer the research question, which type of mixnets has better features.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115844062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive personalized mobile multi-blogging service on smart-M3","authors":"D. Korzun, I. Galov, S. Balandin","doi":"10.2498/cit.1002094","DOIUrl":"https://doi.org/10.2498/cit.1002094","url":null,"abstract":"This paper discusses the project targeted in development of proactive, personalized and composite services for the blogosphere. By applying the smart spaces paradigm we have developed an approach for composition of blog spaces. We contribute formal technique for construction of proactive and personalized service for bloggers as well as for its integration with external applications. The proposed technique is implemented in SmartScribo application on top of the Smart-M3 platform. The developed prototype solution has confirmed that the approach results in services with the next quality level.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125087564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of EAP-FAST protocol","authors":"Bakytbek Eshmurzaev, G. Dalkılıç","doi":"10.2498/iti.2012.0429","DOIUrl":"https://doi.org/10.2498/iti.2012.0429","url":null,"abstract":"One of the core security concepts of Wireless LAN is the authentication. An 802.1X/EAP framework allows a variety of specific methods to be used for the authentication. Certificate-based authentication methods provide strong security as well as allow shared key-based methods to be used. This paper analyzes wide deployed TLS-based EAP protocols defined in RFCs, used in WLAN. We mainly focus on the EAP-FAST protocol because it differs from other TLS-based EAP types on using shared secret keys instead of certificates, thus significantly increasing performance. We validated different authentication scenarios of EAP-FAST protocol using AVISPA model checker.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115041842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for semantic enrichment of sensor data","authors":"Alexandra Moraru, D. Mladenić","doi":"10.2498/cit.1002093","DOIUrl":"https://doi.org/10.2498/cit.1002093","url":null,"abstract":"The increased interest in sensing the environment in which we live has led to the deployment of thousands of sensors which can measure and report its status. In order to raise the impact that sensor networks can have, improving the usability and accessibility of the measurements they provide is an important step. The problem addressed in this paper is that of enrichment of sensor descriptions and measurements in order to provide richer data, i.e., data containing more meaning. We propose a framework for automatizing the process of semantically enriching sensor descriptions and measurements with the purpose of improving the usability and accessibility of sensor data.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"50 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130168104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Corporate IT Risk Management model: A holistic view at managing information system security risks","authors":"M. Spremić","doi":"10.2498/iti.2012.0461","DOIUrl":"https://doi.org/10.2498/iti.2012.0461","url":null,"abstract":"Most organizations in all sectors of industry, commerce and government are fundamentally dependent on their information systems (IS) and would quickly cease to function should the technology (preferably information technology - IT) that underpins their activities ever come to halt [15]. IS and IT may contribute towards efficiency, productivity and competitiveness improvements of both inter-organizational and intra-organizational systems [1]. Successful organizations manage IT function in much the same way that they manage their other strategic functions and processes. This in particular means that they understand and manage risks associated with growing IT opportunities as well as critical dependence of many business processes on IT and vice-versa. IT risk management issues are not only any more marginal or `technical' problems and become more and more a `business problem'. Therefore, in this paper a Corporate IT Risk Management model is proposed and contemporary frameworks of IT Governance and IS Audit is shown and explained.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125101581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Zahariev, Georgi V. Hristov, Ivanka D. Tsvetkova
{"title":"Prolonging the lifetime of wireless sensor networks by hierarchical organization of the system in clusters with unequal sizes","authors":"P. Zahariev, Georgi V. Hristov, Ivanka D. Tsvetkova","doi":"10.2498/iti.2012.0465","DOIUrl":"https://doi.org/10.2498/iti.2012.0465","url":null,"abstract":"Wireless sensor networks are a new type of telecommunication networks with many areas of implementation. These systems are known for their many advantages and few disadvantages. This paper investigates one of the biggest problems in this research field - the unequal energy dissipation and the unequal lifetime of the sensor motes. In order to solve this problem, first the standard approach for hierarchical organization of the networks is analyzed and then a solution for solving of this problem is proposed. Simulation models of wireless sensor networks are created using MatLAB, and the results of the evaluation of the new approach are compared to the results obtained by the standard one.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127111485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of on-line survey about need for presence of higher education institutions on social networks: A step towards creation of communication strategy","authors":"Kruno Golubic, Jadranka Lasić-Lazić","doi":"10.2498/cit.1002096","DOIUrl":"https://doi.org/10.2498/cit.1002096","url":null,"abstract":"The use of social networks among higher education institutions in Croatia is not widespread. An anonymous on-line survey about the importance of institutional presence on social networks was conducted during a ten-day period in May 2011 and included a questionnaire which was distributed to students and employees of two Zagreb based institutions. The results of the survey are interpreted and presented in this paper. These results can be used as a general guideline toward the creation of communication strategy for the presence of higher education institutions on web based social networks.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130039128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}