{"title":"Ambient air quality in the Republic of Macedonia from the perspective of EU directive","authors":"R. Bojkovska, K. Mitreski","doi":"10.2498/iti.2012.0356","DOIUrl":"https://doi.org/10.2498/iti.2012.0356","url":null,"abstract":"In September 1996 the EU adopted Framework Directive 96/62/EC (FWD)[1] that defines the key principles of and general requirements for air quality assessment and management in subsequent (Daughter) Directives that lay down limit levels and specify in more detail the requirements concerning each of the pollutants declared in the FWD. The requirements of Directive 96/69/EC do not specify any detailed rules for zone delineation. In this paper we analysis the ambient air quality on the Republic of Macedonia. We have made analysis of the Directives' requirements in respect of air quality management area delineation - zones and agglomerations. The evaluation is made on the basis of the regular measurements obtained from the three existing measuring networks as well as via measurements of the emissions from stationary and mobile sources in several years period. Results from the analysis of SO2, NO2, NOx, PM10 and ozone concentrations are presented both for specific regions and on the entire state territory. Delineation on zones and agglomerations according to statistical regions is also performed, in line with the preliminary assessment of the air quality according to the measured parameters. We end with several recommendations for improvement of air quality in the given region and for future research work based on these results.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122107791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rethinking Model Driven Development: analysis and opportunities","authors":"Nikola Tanković, Drazen Vukotic, M. Zagar","doi":"10.2498/iti.2012.0414","DOIUrl":"https://doi.org/10.2498/iti.2012.0414","url":null,"abstract":"Application modeling is gaining its share as the next generation software development methodology. Model Driven Development (MDD) uses abstract models of software systems to yield concrete implementations. This process can be achieved in two fundamentally different ways: by generating end artifacts, or by applying model interpretation. Regardless of approach used, MDD still needs to surpass certain challenges to gain further appreciation among community. This paper classifies those challenges and proposes use of different methodologies which could enable simpler modeling solutions. Object Process Methodology (OPM) as software modeling tool is an adequate candidate yielding results in that direction.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122830191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"XML schema domain identification","authors":"Maja Pusnik, Boštjan Šumak, M. Heričko","doi":"10.2498/iti.2012.0392","DOIUrl":"https://doi.org/10.2498/iti.2012.0392","url":null,"abstract":"Using XML data was initially applied in electronic data interchange and e-business, however the application of XML has been moved to several other fields. We nominate those fields of use as XML domains and presume that subsets of their characteristics significantly differ from one another. In this paper, we present the list of identified XML domains with high degree of XML Schema appearances, and for the XML domains, we identify common and distinctive characteristics. Additionally, we propose a function for transforming identified XML domains into known XML Schema patterns.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114056483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Results on ECG compressed sensing using specific dictionaries and its validation","authors":"M. Fira, L. Goras, Nicolae Cleju, C. Barabasa","doi":"10.2498/iti.2012.0362","DOIUrl":"https://doi.org/10.2498/iti.2012.0362","url":null,"abstract":"The paper presents a new method and results regarding the compressed sensing (CS) and classification of ECG waveforms using a general dictionary as well as specific dictionaries built using normal and pathological cardiac patterns. The proposed method has been validated by computation of the distortion errors between the original and the reconstructed signals and by the classification ratio of the reconstructed signals obtained with the k-nearest neighbors (KNN) algorithm.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Zahariev, Georgi V. Hristov, Ivanka D. Tsvetkova
{"title":"An approach towards balanced energy consumption in hierarchical cluster-based wireless sensor networks","authors":"P. Zahariev, Georgi V. Hristov, Ivanka D. Tsvetkova","doi":"10.2498/cit.1002092","DOIUrl":"https://doi.org/10.2498/cit.1002092","url":null,"abstract":"In this paper we investigate the mechanisms for organization of the clusters in wireless sensor networks (WSN). After the short introduction to these systems we present the communication architecture and the energy dissipation model, which are used for the hierarchical cluster-based WSN. In the third section of the paper we analyze the current widely used process for organization of the clusters and we outline its main disadvantages. Later we present an approach for balanced consumption of the energy by the sensor motes, and then we propose a modification to this approach. In the next section we present and analyze the results of a series of simulation experiments, which we have conducted with the proposed approach, and then we compare these results with the ones obtained from the simulation experiments, which are conducted with the other presented approaches.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115069732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two factor authentication using EEG augmented passwords","authors":"Ivan Svogor, T. Kisasondi","doi":"10.2498/iti.2012.0441","DOIUrl":"https://doi.org/10.2498/iti.2012.0441","url":null,"abstract":"The current research with EEG devices in the user authentication context has some deficiencies that address expensive equipment, the requirement of laboratory conditions and applicability. In this paper we address this issue by using widely available and inexpensive EEG device to verify its capability for authentication. As a part of this research, we developed two phase authentication that enables users to enhance their password with the mental state by breaking the password into smaller elements, marry them with mental state, and generate one time pad for a secure session.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127080235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reference model design: An approach and its application","authors":"Dejan Pajk, M. Stemberger, A. Kovačič","doi":"10.2498/iti.2012.0419","DOIUrl":"https://doi.org/10.2498/iti.2012.0419","url":null,"abstract":"The main idea of reference modelling is to reuse business knowledge to create efficient business processes to be deployed inside an organisation. Reference models provide a set of generally accepted recommended practices. One of the management challenges facing today's organisations involves the development and reuse of business process reference models. We present a reference model design approach with a focus on a business process merging phase. Process merging is an approach that brings together several business process models with the objective to create a new model. We base our findings on a case study of three big Slovenian companies from the metal industry sector.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127145863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use cases in requirements capture - Trends and open issues","authors":"A. Amaechi, S. Counsell","doi":"10.2498/iti.2012.0359","DOIUrl":"https://doi.org/10.2498/iti.2012.0359","url":null,"abstract":"Despite the wide acceptance and usage of use case models, there is still controversy among practitioners and researchers on issues such as correct applicability of use case models, levels of abstraction desirable in a use case model and the kind of rules that guide inspection of use cases. This work presents the findings of a review of the literature related to the challenges concerning use case models. This paper presents the lessons learned from literature review of use case models research studies published in the Journal of Object Technology and Requirements Engineering Journal published from 2000 to 2010 and International Requirements Engineering Conference proceedings from 2002 to 2010.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114961703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cardinality of simplexes in a Delaunay tessellation","authors":"L. Hearne","doi":"10.2498/iti.2012.0472","DOIUrl":"https://doi.org/10.2498/iti.2012.0472","url":null,"abstract":"Given a set of n linearly independent points in a Euclidean space Ed, P = {p1, ... , pn} with n >; d, a Delaunay tessellation with at lease one d-dimensional simplex can be constructed. This tessellation is unique up to degenerate linearity conditions. The cardinality of the set of unique k-dimensional simplexes, k ≤ d, in the tessellation is bounded and the bound can be computed, given the dimension of the space, d, and the number of points in the tessellation generating set, n. These bounds can be refined if the number of points on the convex hull of P, m, is known. The bounds on cardinality are developed using constructive geometric arguments presented in the sequence necessary to construct the tessellation. The cardinality of simplexes in the Voronoi diagram is then related to the Delaunay tessellation by geometric duality. An example is given.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124260571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Peer to peer distributed storage and computing cloud system","authors":"Boris Tomas, Bojan Vuksic","doi":"10.2498/iti.2012.0442","DOIUrl":"https://doi.org/10.2498/iti.2012.0442","url":null,"abstract":"Peer to peer Cloud computing and storage are defined. Several security features are recognised. Implementation of such system requires new types of communication protocols as well as new client applications. Paper proposes convenient business model for implementation of P2P cloud.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130449257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}