2012 6th International Conference on Application of Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
The role of teacher in the multimedia-based foreign language classes 教师在多媒体外语教学中的作用
Ketevan Gochitashvili
{"title":"The role of teacher in the multimedia-based foreign language classes","authors":"Ketevan Gochitashvili","doi":"10.1109/ICAICT.2012.6398517","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398517","url":null,"abstract":"The paper focuses on the problem of multimedia-based foreign/second-language classes, functions and advantages of multimedia in the foreign/second language education. The main issue of the present article is to describe the role of teacher in the multimedia-based foreign classes and give them some practical suggestions.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data processing in FPGA-based systems 基于fpga系统的数据处理
V. Sklyarov, I. Skliarova
{"title":"Data processing in FPGA-based systems","authors":"V. Sklyarov, I. Skliarova","doi":"10.1109/ICAICT.2012.6398506","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398506","url":null,"abstract":"More than 50% of FPGA market is in the scope of communication and information. Data processing is a very broad area that is important for numerous computations, networking, embedded systems, Internet-based applications, etc. Many problems in this area are computationally intensive and thus, they require parallelization and acceleration based on new technologies. FPGAs can be seen as a very attractive platform permitting application-specific software and problem-targeted hardware to be combined on a single configurable microchip. The tutorial is dedicated to hardware-oriented data processing algorithms with emphasis on parallelism and pipelining. FPGA-targeted design flow is based on the rational use of configurable logic blocks/logic elements and embedded components (DSP slices and block RAMs). Particular examples, potential practical applications, experiments and comparisons will be demonstrated.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"601 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
New novel idea for Cloud Computing: How can we use Kalman filter in security of Cloud Computing 云计算的新思路:如何在云计算安全中使用卡尔曼滤波
M. Darbandi, P. Shahbazi, S. Setayesh, O-C. Granmo
{"title":"New novel idea for Cloud Computing: How can we use Kalman filter in security of Cloud Computing","authors":"M. Darbandi, P. Shahbazi, S. Setayesh, O-C. Granmo","doi":"10.1109/ICAICT.2012.6398466","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398466","url":null,"abstract":"Cloud is a virtual image about some amount of undefined powers, that is widespread and had unknown power and inexact amount of hardware and software configurations, and because of we have not any information about clouds location and time dimensions and also the amounts of its sources we tell that Cloud Computing. This technology presents lots of abilities and opportunities such as processing power, storage and accessing it from everywhere, supporting, working - team group - with the latest versions of software and etc., by the means of internet. On the other hand, in such a large scale networks we should consider the reliability and powerfulness of such networks in facing with events such as high amount of users that may login to their profiles simultaneously, or for example if we have the ability to predict about what times that we would have the most crowd in network, or even users prefer to use which part of the Cloud Computing more than other parts - which software or hardware configuration. With knowing such information, we can avoid accidental crashing or hanging of the network that may be cause by logging of too much users. In this paper we propose Kalman Filter that can be used for estimating the amounts of users and software's that run on cloud computing or other similar platforms at a certain time. After introducing this filter, at the end of paper, we talk about some potentials of this filter in cloud computing platform. In this paper we demonstrate about how we can use Kalman filter in estimating and predicting of our target, by the means of several examples on Kalman filter.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128780504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards remote security monitoring in cloud services utilizing security metrics 利用安全度量实现云服务中的远程安全监控
R. Savola, Jukka Ahola
{"title":"Towards remote security monitoring in cloud services utilizing security metrics","authors":"R. Savola, Jukka Ahola","doi":"10.1109/ICAICT.2012.6398469","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398469","url":null,"abstract":"Large amounts of business-critical data are transferred, processed and stored in cloud services, raising concerns about their security level. Adequate security management of cloud services is vital to their success. Systematically developed and maintained security metrics can be used to offer evidence of the security effectiveness of cloud services. We propose a metrics based approach for remote security correctness monitoring in the Cloud. The approach was investigated by building a monitoring system within an experimental cloud system set-up. Moreover, we discuss how risk-driven security metrics modeling based on the decomposition of security objectives is used to manage monitoring activities.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Web based system for the bee colony remote monitoring 基于Web的蜂群远程监控系统
A. Zacepins, T. Karasha
{"title":"Web based system for the bee colony remote monitoring","authors":"A. Zacepins, T. Karasha","doi":"10.1109/ICAICT.2012.6398490","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398490","url":null,"abstract":"Monitoring of bioprocesses is an important problem and challenge for researchers and information technology specialists. Beekeeping is one of the agricultural sub directions where monitoring techniques and methods can be adapted and applied. Integration of information technologies into beekeeping process can improve the beekeepers knowledge about behavior of individual bee colonies. One of the objectives in the field of bee monitoring is to develop real time on-line tools for continuous observations of bees during their life and production using the automatic solutions avoiding exposure of bees to additional stress or unproductive activities. The aim of these technical tools is not to replace but rather to support the beekeeper. The aim of this paper is to describe developed web based system for real time bee monitoring.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127844700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Labeled protection of project tasks in collaborative designing of software intensive systems 软件密集型系统协同设计中项目任务的标记保护
P. Sosnin, V. Maklaev, S. Zhukov
{"title":"Labeled protection of project tasks in collaborative designing of software intensive systems","authors":"P. Sosnin, V. Maklaev, S. Zhukov","doi":"10.1109/ICAICT.2012.6398477","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398477","url":null,"abstract":"The paper presents the system of means for the labelled protection of project tasks in designing the software intensive systems. The specificity of suggested means is defined by the uniform hierarchical representation of tasks and the team of designers the real time relations between units of which are being provided by programmed agents. Protection means are embedded to the toolkit WIQA (Working In Questions and Answer) supporting the work of designers at the conceptual stage.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"18 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power-aware topology generation for application specific NoC design 针对特定应用NoC设计的功耗感知拓扑生成
S. Tosun, Y. Ar, S. Ozdemir
{"title":"Power-aware topology generation for application specific NoC design","authors":"S. Tosun, Y. Ar, S. Ozdemir","doi":"10.1109/ICAICT.2012.6398505","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398505","url":null,"abstract":"Network-on-Chip (NoC) is a new alternative approach to bus-based and point-to-point communication methods to design large System on Chip (SoC) architectures. Designing a power-aware irregular topology for a NoC based application is a challenging problem due to its high complexity. This paper tackles at this problem and presents a genetic algorithm based topology generation algorithm (GATGA) for NoC architectures aiming to minimize the power consumed by the communication among tasks of the application. Our experiments on multimedia benchmarks and randomly generated graphs show that the proposed algorithm achieves considerable improvements over the existing topology generation algorithms in terms of communication overhead and power consumption.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114239114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective evolutionary algorithm based on decomposition for efficient coverage control in mobile sensor networks 基于分解的多目标进化算法在移动传感器网络中的有效覆盖控制
B. Attea, F. Y. Okay, S. Ozdemir, M. Akcayol
{"title":"Multi-objective evolutionary algorithm based on decomposition for efficient coverage control in mobile sensor networks","authors":"B. Attea, F. Y. Okay, S. Ozdemir, M. Akcayol","doi":"10.1109/ICAICT.2012.6398527","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398527","url":null,"abstract":"Node deployment is a fundamental issue to be solved in Wireless Sensor Networks (WSNs). A proper node deployment scheme can reduce the complexity of problems in WSNs such as routing, data fusion, communication, etc. Furthermore, it can extend the lifetime of WSNs by minimizing energy consumption due to sensing and communication. This paper presents the development of a recently multi-objective optimization algorithm, the so-called multi-objective evolutionary algorithm based on decomposition (MOEA/D). MOEA/D aims the relocation of mobile nodes in a WSN with the goal of providing maximum sensing coverage area, and with the constraint of minimizing the energy required for the relocation as measured by total travel distance of the sensors from their initial locations to their final locations. Simulation results clearly show that the non-dominated solutions have tradeoff between the travelled distance and coverage area.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121209974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Implementation of eLearning in Azerbaijan 在阿塞拜疆实施电子学习
L. Muradkhanli, B. Atabeyli
{"title":"Implementation of eLearning in Azerbaijan","authors":"L. Muradkhanli, B. Atabeyli","doi":"10.1109/ICAICT.2012.6398528","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398528","url":null,"abstract":"This article discusses the experience of implementation of eLearning in Azerbaijan. Various factors contributing to the success and challenges of eLearning implementation are also discussed.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126902001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Genetic Algorithm approach for the prediction of business risks' dynamics of enterprise 基于遗传算法的企业经营风险动态预测方法
G. Sirbiladze, M. Kapanadze
{"title":"Genetic Algorithm approach for the prediction of business risks' dynamics of enterprise","authors":"G. Sirbiladze, M. Kapanadze","doi":"10.1109/ICAICT.2012.6398507","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398507","url":null,"abstract":"This work deals with the problem of identification and modeling of Discrete Fuzzy Dynamic System (DFDS) with possibility uncertainty, using the technologies of Genetic Algorithms (GA). Applying the results from [5-9, 11-13,15,16,18-20], the fuzzy recurrent process, the source of which is expert knowledge reflections on the states of the evolutionary complex system, is constructed. The dynamics of DFDS is described and the constructed model is converted to the finite model. The DFDS transition operator is restored by means of expert data with possibility uncertainty. Obtained results are illustrated by the example for prediction and stopping problems for evaluations of the increasing business risks of the enterprise.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130994626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信