{"title":"The role of teacher in the multimedia-based foreign language classes","authors":"Ketevan Gochitashvili","doi":"10.1109/ICAICT.2012.6398517","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398517","url":null,"abstract":"The paper focuses on the problem of multimedia-based foreign/second-language classes, functions and advantages of multimedia in the foreign/second language education. The main issue of the present article is to describe the role of teacher in the multimedia-based foreign classes and give them some practical suggestions.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data processing in FPGA-based systems","authors":"V. Sklyarov, I. Skliarova","doi":"10.1109/ICAICT.2012.6398506","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398506","url":null,"abstract":"More than 50% of FPGA market is in the scope of communication and information. Data processing is a very broad area that is important for numerous computations, networking, embedded systems, Internet-based applications, etc. Many problems in this area are computationally intensive and thus, they require parallelization and acceleration based on new technologies. FPGAs can be seen as a very attractive platform permitting application-specific software and problem-targeted hardware to be combined on a single configurable microchip. The tutorial is dedicated to hardware-oriented data processing algorithms with emphasis on parallelism and pipelining. FPGA-targeted design flow is based on the rational use of configurable logic blocks/logic elements and embedded components (DSP slices and block RAMs). Particular examples, potential practical applications, experiments and comparisons will be demonstrated.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"601 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Darbandi, P. Shahbazi, S. Setayesh, O-C. Granmo
{"title":"New novel idea for Cloud Computing: How can we use Kalman filter in security of Cloud Computing","authors":"M. Darbandi, P. Shahbazi, S. Setayesh, O-C. Granmo","doi":"10.1109/ICAICT.2012.6398466","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398466","url":null,"abstract":"Cloud is a virtual image about some amount of undefined powers, that is widespread and had unknown power and inexact amount of hardware and software configurations, and because of we have not any information about clouds location and time dimensions and also the amounts of its sources we tell that Cloud Computing. This technology presents lots of abilities and opportunities such as processing power, storage and accessing it from everywhere, supporting, working - team group - with the latest versions of software and etc., by the means of internet. On the other hand, in such a large scale networks we should consider the reliability and powerfulness of such networks in facing with events such as high amount of users that may login to their profiles simultaneously, or for example if we have the ability to predict about what times that we would have the most crowd in network, or even users prefer to use which part of the Cloud Computing more than other parts - which software or hardware configuration. With knowing such information, we can avoid accidental crashing or hanging of the network that may be cause by logging of too much users. In this paper we propose Kalman Filter that can be used for estimating the amounts of users and software's that run on cloud computing or other similar platforms at a certain time. After introducing this filter, at the end of paper, we talk about some potentials of this filter in cloud computing platform. In this paper we demonstrate about how we can use Kalman filter in estimating and predicting of our target, by the means of several examples on Kalman filter.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128780504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards remote security monitoring in cloud services utilizing security metrics","authors":"R. Savola, Jukka Ahola","doi":"10.1109/ICAICT.2012.6398469","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398469","url":null,"abstract":"Large amounts of business-critical data are transferred, processed and stored in cloud services, raising concerns about their security level. Adequate security management of cloud services is vital to their success. Systematically developed and maintained security metrics can be used to offer evidence of the security effectiveness of cloud services. We propose a metrics based approach for remote security correctness monitoring in the Cloud. The approach was investigated by building a monitoring system within an experimental cloud system set-up. Moreover, we discuss how risk-driven security metrics modeling based on the decomposition of security objectives is used to manage monitoring activities.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web based system for the bee colony remote monitoring","authors":"A. Zacepins, T. Karasha","doi":"10.1109/ICAICT.2012.6398490","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398490","url":null,"abstract":"Monitoring of bioprocesses is an important problem and challenge for researchers and information technology specialists. Beekeeping is one of the agricultural sub directions where monitoring techniques and methods can be adapted and applied. Integration of information technologies into beekeeping process can improve the beekeepers knowledge about behavior of individual bee colonies. One of the objectives in the field of bee monitoring is to develop real time on-line tools for continuous observations of bees during their life and production using the automatic solutions avoiding exposure of bees to additional stress or unproductive activities. The aim of these technical tools is not to replace but rather to support the beekeeper. The aim of this paper is to describe developed web based system for real time bee monitoring.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127844700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Labeled protection of project tasks in collaborative designing of software intensive systems","authors":"P. Sosnin, V. Maklaev, S. Zhukov","doi":"10.1109/ICAICT.2012.6398477","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398477","url":null,"abstract":"The paper presents the system of means for the labelled protection of project tasks in designing the software intensive systems. The specificity of suggested means is defined by the uniform hierarchical representation of tasks and the team of designers the real time relations between units of which are being provided by programmed agents. Protection means are embedded to the toolkit WIQA (Working In Questions and Answer) supporting the work of designers at the conceptual stage.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"18 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power-aware topology generation for application specific NoC design","authors":"S. Tosun, Y. Ar, S. Ozdemir","doi":"10.1109/ICAICT.2012.6398505","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398505","url":null,"abstract":"Network-on-Chip (NoC) is a new alternative approach to bus-based and point-to-point communication methods to design large System on Chip (SoC) architectures. Designing a power-aware irregular topology for a NoC based application is a challenging problem due to its high complexity. This paper tackles at this problem and presents a genetic algorithm based topology generation algorithm (GATGA) for NoC architectures aiming to minimize the power consumed by the communication among tasks of the application. Our experiments on multimedia benchmarks and randomly generated graphs show that the proposed algorithm achieves considerable improvements over the existing topology generation algorithms in terms of communication overhead and power consumption.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114239114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-objective evolutionary algorithm based on decomposition for efficient coverage control in mobile sensor networks","authors":"B. Attea, F. Y. Okay, S. Ozdemir, M. Akcayol","doi":"10.1109/ICAICT.2012.6398527","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398527","url":null,"abstract":"Node deployment is a fundamental issue to be solved in Wireless Sensor Networks (WSNs). A proper node deployment scheme can reduce the complexity of problems in WSNs such as routing, data fusion, communication, etc. Furthermore, it can extend the lifetime of WSNs by minimizing energy consumption due to sensing and communication. This paper presents the development of a recently multi-objective optimization algorithm, the so-called multi-objective evolutionary algorithm based on decomposition (MOEA/D). MOEA/D aims the relocation of mobile nodes in a WSN with the goal of providing maximum sensing coverage area, and with the constraint of minimizing the energy required for the relocation as measured by total travel distance of the sensors from their initial locations to their final locations. Simulation results clearly show that the non-dominated solutions have tradeoff between the travelled distance and coverage area.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121209974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of eLearning in Azerbaijan","authors":"L. Muradkhanli, B. Atabeyli","doi":"10.1109/ICAICT.2012.6398528","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398528","url":null,"abstract":"This article discusses the experience of implementation of eLearning in Azerbaijan. Various factors contributing to the success and challenges of eLearning implementation are also discussed.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126902001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Genetic Algorithm approach for the prediction of business risks' dynamics of enterprise","authors":"G. Sirbiladze, M. Kapanadze","doi":"10.1109/ICAICT.2012.6398507","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398507","url":null,"abstract":"This work deals with the problem of identification and modeling of Discrete Fuzzy Dynamic System (DFDS) with possibility uncertainty, using the technologies of Genetic Algorithms (GA). Applying the results from [5-9, 11-13,15,16,18-20], the fuzzy recurrent process, the source of which is expert knowledge reflections on the states of the evolutionary complex system, is constructed. The dynamics of DFDS is described and the constructed model is converted to the finite model. The DFDS transition operator is restored by means of expert data with possibility uncertainty. Obtained results are illustrated by the example for prediction and stopping problems for evaluations of the increasing business risks of the enterprise.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130994626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}