{"title":"Design of moore finite state machine with extended state codes","authors":"L. Titarenko, O. Hebda, A. Barkalov","doi":"10.2498/iti.2013.0504","DOIUrl":"https://doi.org/10.2498/iti.2013.0504","url":null,"abstract":"The new method is proposed for reduction of chip area occupied by logic circuit of Moore FSM implemented with PLAs. It is based on the representation of the state code as a concatenation of the code of class of pseudoequivalent states and code of state inside this class. Such an approach allows elimination of dependence among states and output variables. It allows the hardware reduction in the FSM logic circuit in comparison with known design methods.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121275485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards new energy efficiency limits of High Performance Clusters","authors":"D. Tomić, E. Imamagic, L. Gjenero","doi":"10.2498/iti.2013.0582","DOIUrl":"https://doi.org/10.2498/iti.2013.0582","url":null,"abstract":"In recent years performance of High Performance Computing Clusters took precedence over their power consumption. However, costs of energy and demand for ecologically acceptable IT solutions are higher than ever before, therefore a need for HPC clusters with acceptable power consumption becomes increasingly important. Consequently, the Green500 list, which takes into account both performance and power consumption of HPC clusters, almost reached the popularity of the Top500 list. Interestingly, the Green500 list is not an opponent to Top500 list; its core idea is to complement the Top500. Therefore, the Top500 list still serves as the basis for the Green500 list, and its numbers regarding measured HPL performance, are a basis for calculating the Green500 list. Indeed, the Green500 is the Top500 list ordered by HPL measured performance per Watt. Rmax numbers gained from High Performance Linpack benchmarks serve as performance input parameters, and total power consumed during execution of HPL on a certain HPC clusters is a power consumption parameter. The critical question remains: how to measure the consumed power correctly? This paper proposes that if it is not possible to measure the consumed power, one can still use maximum power consumption numbers rated from hardware vendors to find at least the lower bound green efficiency of HPC clusters. The main idea behind this approach is that Rmax values found on Top500 list never achieve Rpeak theoretical values, and that even most efficient HPL benchmark can never utilize computing nodes at their maximum. Furthermore by comparing MFLOPS/W results we gained with those found on Green500 list, we noted the excellent efficiency of the new HPC Isabella cluster recently powered on at University Computing Centre in Zagreb, ranking in just behind University of North Carolina KillDevil Top500 super cluster.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122211973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting hubs for self-adaptive secondary re-ranking in bug report duplicate detection","authors":"Nenad Tomašev, Gregor Leban, D. Mladenić","doi":"10.2498/iti.2013.0488","DOIUrl":"https://doi.org/10.2498/iti.2013.0488","url":null,"abstract":"Bug duplicate detection is an integral part of many bug tracking systems. Most bugs are reported multiple times and detecting the duplicates saves time and valuable resources. We propose a novel approach to potential duplicate report query ranking. Our secondary re-ranking procedure is self-adaptive, as it learns from previous report occurrences. It is based on the analysis of temporal evolution of the underlying distribution of influence. The experiments show definite improvements in system performance.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131143431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic analysis of social networks (case study)","authors":"M. Baca, Jasmin Cosic, Z. Cosic","doi":"10.2498/iti.2013.0526","DOIUrl":"https://doi.org/10.2498/iti.2013.0526","url":null,"abstract":"This paper deals with a new challenge for digital forensic experts - the forensic analysis of social networks. There is a lot of identity theft, theft of personal data, public defamation, cyber stalking and other criminal activities on social network sites. This paper will present a forensic analysis of social networks and cloud forensics in the internet environment. For the purpose of this research one case study is created like - a common practical scenario where the combination of identity theft and public defamation through Facebook activity is explored. Investigators must find the person who stole some others profile, who publish inappropriate and prohibited contents performing act of public defamation and humiliation of profile owner.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"440 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114957410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Devising a model of electronic School Management System based on web services for secondary schools in Macedonia","authors":"M. Fetaji, B. Fetaji, A. Ajredini, M. Ebibi","doi":"10.2498/iti.2013.0573","DOIUrl":"https://doi.org/10.2498/iti.2013.0573","url":null,"abstract":"Advanced computer technologies available today can play a crucial role in reorganization of school management activities to promote unity and reliability among students, parents, teachers, and school administrators. However computers are not used to analyze data and output information. Therefore, e-School Management System (e-SMS) is developed to facilitate teaching and administration staff to manage school activities in high schools and parents/teachers to have in-time/reliable information about the performance of their child/student. In this paper we propose a conceptual model of an e-school management system and explain the functionality of an e-SMS and benefits of electronic management. Insights and recommendations are provided.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114172097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Simjanoska, Goran Velkoski, S. Ristov, M. Gusev
{"title":"Does the performance scale the same as the cost in the cloud","authors":"M. Simjanoska, Goran Velkoski, S. Ristov, M. Gusev","doi":"10.2498/iti.2013.0570","DOIUrl":"https://doi.org/10.2498/iti.2013.0570","url":null,"abstract":"Cloud computing is a paradigm that offers on-demand scalable resources with the “pay-per-usage” model. Cloud service providers' price rises linearly as the resources scale. However, the main challenge for the cloud customers is “Does the performance scale as the price for the rented resources in the cloud”? Also, how does the performance scales for different server load? In this paper we analyze the performance and the cost of a web service that utilize both memory and CPU varying the server load with different message size and number of concurrent messages in order to determine the real cost of rented CPU resources. The results show that the web service's cost rises linearly with the resources, i.e. the lowest cost is determined while hosted on one CPU.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129002556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cancer patient blogs: How patients, clinicians, and researchers learn from rich narratives of illness","authors":"Lisa Gualtieri, Fiona Y. Akhtar","doi":"10.2498/iti.2013.0586","DOIUrl":"https://doi.org/10.2498/iti.2013.0586","url":null,"abstract":"Blogs written by cancer patients can offer deep insights to other patients about what to expect in the course of illness and treatment, can provide information to oncologists and other clinicians about patient experiences outside of appointments, and can increase researcher awareness of treatment effects and alternatives. While many forms of social media and online communities are used by patients, blogs are unique in that they provide a narrative of many aspects of disease and treatment, offering a comprehensive view of the disease experience delivered in installments, often from diagnosis through life as a survivor. However, the impact of patient blogs has been modest thus far because patient blogs are spread across the internet and, with no central repository of patient blogs, opportunities for analysis are limited. Given the life-altering and potentially devastating impact of cancer on people's lives, we seek to develop a tool that will analyze tens of thousands of patient-authored blogs to improve cancer patient care.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130273477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Continuous user verification based on behavioral biometrics using mouse dynamics","authors":"Mirko Stanic","doi":"10.2498/iti.2013.0505","DOIUrl":"https://doi.org/10.2498/iti.2013.0505","url":null,"abstract":"This paper provides overview of the current methods of identifying users based on their interactions with a computer keyboard, mouse or a touchscreen and argues that in their current state of development none of them are capable of establishing the users identity within the time it takes for a user to input a password. The paper proposes the application of behavioral biometrics as a supplement to regular password based user authentication as a safeguard against unauthorized users gaining access to a computer that is already running an authenticated session e.g. unattended computers in offices.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126335536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyses of factors that influence the reliability of e- school Management software System in high schools in Macedonia","authors":"M. Fetaji, B. Fetaji, M. Ebibi","doi":"10.2498/iti.2013.0571","DOIUrl":"https://doi.org/10.2498/iti.2013.0571","url":null,"abstract":"High schools have rapidly adapted computers in their administration, management and academy. School management uses papers and computers as tools to store the administrative and management data. However computers are not used to analyze data and output information. Therefore, e-School Management System (e-SMS) is developed to facilitate teaching and administration staffs to manage school activities in high schools and parents to have in-time information about the performance of their child. As a result, users found that e-SMS is capable of offering reliable and correct information and communication among teachers, parents, students and the general public and improved the management process in schools. Findings are presented and recommendations are provided.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115635684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The influence of human resources on the IT service management","authors":"Jan Ministr","doi":"10.2498/iti.2013.0561","DOIUrl":"https://doi.org/10.2498/iti.2013.0561","url":null,"abstract":"Optimal utilization of human resources contributes to achievement of the aims of IT department and also of the entire company. Organizational Structure of IT department should be designed on the base of IT Service Lifecycle. IT personnel should support the IT Services in all stages of their Lifecycles. The paper is focused on the method describing transformation of the organization structure of IT department on the base of adopting and implementing the principles which are described in the IT Infrastructure Library.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122618312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}