{"title":"Development of a Containerized System to Build Geometric Models and Perform Their Strength Analysis","authors":"O. Iakushkin, A. Kondratiuk, A. Eremin, O. Sedova","doi":"10.1145/3274856.3274887","DOIUrl":"https://doi.org/10.1145/3274856.3274887","url":null,"abstract":"Strength analysis problems are those engineering tasks that aim to calculate strength properties of structures. The modelling in this sphere is of such complexity that it is often difficult to integrate a geometric model (CAD) and the analysis of physical impact exerted on it (FEM). This paper describes a prototype of an open-source system that integrates CAD and FEM. The strength analysis task is used to illustrate the integration. The system is deployed by means of the Docker platform and uses Jupyter Notebook for strength analysis.","PeriodicalId":373840,"journal":{"name":"Proceedings of the 3rd International Conference on Applications in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of Taxi Request Order Coordination using Monte-Carlo Method","authors":"A. Kirilyuk, I. Trofimova","doi":"10.1145/3274856.3274889","DOIUrl":"https://doi.org/10.1145/3274856.3274889","url":null,"abstract":"The goal of the work is the development of optimal routing which will increase the probability of order and will improve interaction of drivers within the system. In this paper the Monte-Carlo method is used to model the taxi order system and improve the taxi drivers management within one company. This method is aimed at optimizing the operation of the taxi application. In this paper we construct the statistical model, it allows to make predictions with the given distributions and with known statistical data, which sector is optimal from the point of obtaining an order. We describe the implementation of the proposed algorithm in the company. Based on this algorithm a part of the taxi application functionality could be created, which allows to optimize the work of drivers. We demonstrate the execution of the algorithm on the example. To create the above-described functional of the taxi application we combine mathematical methods and web programming techniques.","PeriodicalId":373840,"journal":{"name":"Proceedings of the 3rd International Conference on Applications in Information Technology","volume":"715 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121998635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exponential Innovation through Digital Transformation","authors":"Vlatko Davidovski","doi":"10.1145/3274856.3274858","DOIUrl":"https://doi.org/10.1145/3274856.3274858","url":null,"abstract":"We know the three major industrial revolutions: the first one introduced steam power and mechanization, the second introduced mass production, electricity and economy-changing assembly line, and the third introduced automation, electronics and computers. With recent advances in technology, humanity has entered into a new age: new industrial revolution brings digitalization across all segments of business and life. This talk abstract focuses the definitions of the concept of digitalization and digital transformation, explains the dimensions and principles of digital transformation and covers the enablers of exponential innovation through digitalization.","PeriodicalId":373840,"journal":{"name":"Proceedings of the 3rd International Conference on Applications in Information Technology","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121304264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2-tier vs. 3-tier Architectures for Data Processing Software","authors":"Dmitriy Dorofeev, S. Shestakov","doi":"10.1145/3274856.3274869","DOIUrl":"https://doi.org/10.1145/3274856.3274869","url":null,"abstract":"The rise of data-centric computing, NoSQL and newSQL databases with powerful scripting capabilities, popularity of REST API raise a question: is it feasible to serve clients directly from the DB, with REST API server residing inside the database? What would be the balance between data processing, application, and presentation logic for such a scenario on a server side and on a client side? In this paper we will compare 2 real-world implementations of the commercial Luxms BI analytical platform based on 2-tier and on 3-tier architecture. Our research shows that despite popularity of 3-tier architectures, in-database application server approach delivers better performance in both throughput and latency in analytical client-server application development.","PeriodicalId":373840,"journal":{"name":"Proceedings of the 3rd International Conference on Applications in Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130667750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ekaterina B. Grigut, Ivan Kiriyakov, Y. Senichenkov
{"title":"Designing application-dependent tools for modeling and simulation on basis of universal modeling environment","authors":"Ekaterina B. Grigut, Ivan Kiriyakov, Y. Senichenkov","doi":"10.1145/3274856.3274861","DOIUrl":"https://doi.org/10.1145/3274856.3274861","url":null,"abstract":"The example of the tool with own graphical language and specialized applied library for modeling and simulation electrical systems based on the universal modeling environment is described. The tool has Graphical Editor with standard set of electrical components. Also it has the ability to be extended with habitual for applied user instruments for visualizing and analyzing results of computer experiments. The tool automatically generates a description of a model on modeling language, passes it to universal modeling environment, and gets back the results of simulation. In general the results are comprehensive. However, in case of need user could work directly with automatically generated model. It means that the user could manually control the simulation process and enjoy advantages of powerful visual environment.","PeriodicalId":373840,"journal":{"name":"Proceedings of the 3rd International Conference on Applications in Information Technology","volume":"625 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132818224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grammatical Error Checker for Japanese Learners of English","authors":"J. Blake, Junko Inoue, Takumi Kondo","doi":"10.1145/3274856.3274885","DOIUrl":"https://doi.org/10.1145/3274856.3274885","url":null,"abstract":"This paper describes the design and development of a rule-based online grammar checker that can identifies common mistakes and provides feedback messages specifically to help teenage Japanese learners of English who are unable to attend regular schools.","PeriodicalId":373840,"journal":{"name":"Proceedings of the 3rd International Conference on Applications in Information Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115913976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating Crack Patterns on Planar Geometry by L-system","authors":"Megumi Takato, Y. Nishidate","doi":"10.1145/3274856.3274868","DOIUrl":"https://doi.org/10.1145/3274856.3274868","url":null,"abstract":"An empirical approach for generation of crack patterns on planar geometry is considered in this study. The L-system is used to define growing process of crack patterns. The L-system produces a sequence of letters and it is translated as visual representation by the turtle graphics concept. In order to investigate what kind of grammar can be suitable to generate realistic crack patterns, an WebGL application has been developed. The developed application can generate variety of crack patterns. Through experiments, we discovered several grammars which generates realistic crack patterns. The final crack patterns are often difficult to predict, but it is possible to control the number of branches and geometry of fragments with an appropriate selection of grammar. Our approach provides a possibility toward an intuitive control of crack propagation process and final crack geometry.","PeriodicalId":373840,"journal":{"name":"Proceedings of the 3rd International Conference on Applications in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129398244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal IMF Selection of EMD for Sleep Disorder Diagnosis using EEG Signals","authors":"Md. Rashedul Islam, M. Rahim, Hafeza Akter, Raihan Kabir, Jungpil Shin","doi":"10.1145/3274856.3274876","DOIUrl":"https://doi.org/10.1145/3274856.3274876","url":null,"abstract":"Sleep disorders has a vital effect on mental depression and many other diseases of human body. Diagnosing the sleep disorder in an early curable stage may help to provide better treatment and save the life. The EEG (Electroencephalogram) signal is one of the most uses bio signal for capturing brain activities to detect and diagnosis the sleep disorders. Empirical mode decomposition (EMD) is an efficient time-frequency data analysis technique for diagnosing disease by analyzing EEG signal. However, it is a challenging issue to select the optimal intrinsic mode functions (IMFs) of Empirical mode decomposition (EMD) for extracting discriminant properties of EEG signals to diagnosis the sleep disorder. From this point of view, this paper presents a model to select optimal IMF of EMD for diagnosing the sleep disorder using EEG brain signal. In this proposed model, EMD is applied to decompose and analyze EEG signal for extracting biomarker/feature of sleep disorders. During the EMD decomposition process, different levels of IMF are extracted and features, i.e., Shannon Entropy, Spectral Entropy, Standard deviation, Skewness and Kurtosis are calculated from those IMFs for detecting the sleep disorders. In identification process, the multiclass support vector machine (MC-SVM) classification algorithm is used and sleep disorders are classified based on trained knowledge. Finally, the performance of proposed model is evaluated for different IMFs of EMD and find the optimal IMF for sleep disorder diagnosis. For evaluating the proposed model, a benchmark dataset including 4 types of data such as Apnea, REM, PLM and healthy subjects are used in experiment. According to the experimental result, the proposed model achieves the optimal classification performance for IMF 8, i.e., 93.24% average classification accuracy.","PeriodicalId":373840,"journal":{"name":"Proceedings of the 3rd International Conference on Applications in Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125814119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topic Modeling of Conflict Ad Hoc Discussions in Social Networks","authors":"I. Blekanov, N. Tarasov, Alexey Maksimov","doi":"10.1145/3274856.3274881","DOIUrl":"https://doi.org/10.1145/3274856.3274881","url":null,"abstract":"In this paper authors carry out the research of three different topic models in the context of analyzing different large scale twitter ad hoc discussions, obtained from social network on different social and political events. An experiment is being conducted to test the effectiveness of models in analyzing three known discussions: the riots in Biryulyovo (Russia), Ferguson unrest (USA), Charlie Hebdo shooting (France). The results of the experiment show that the BTM topic model in terms of both Umass and Npmi, yielded the best results on all discussions in comparison to the baseline LDA model and another model for short unbalanced texts - WNTM.","PeriodicalId":373840,"journal":{"name":"Proceedings of the 3rd International Conference on Applications in Information Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a CSV Validation System","authors":"Abdulrazaq Abba, Mohammed A. Hassan","doi":"10.1145/3274856.3274879","DOIUrl":"https://doi.org/10.1145/3274856.3274879","url":null,"abstract":"The need for error checking is essential in our daily activities, as the saying goes \"to err is human\". This issue becomes problematic when it involves hidden errors. Depending on the hidden errors, in critical systems this can lead to a tragedy or disaster. There are two possible solutions, either preventing the error or detecting and correcting the error. In the case of file system detection and correction is more effective. In this work we consider the later case of error detection and correction, here we develop a scalable tabular technique for detecting errors in a file system. We apply the technique on a CSV file system with developing an application. The application detects and corrects errors in a CSV file. Scalability is one of the strength that differentiate this work from other related work. This scalability of the application provides an easy way for expanding the scope of possible errors that can be detected and corrected. The work contributes in illustrating a technique that improves confidence in the well-known legacy file CSV. This is very important considering the role of CSV file in transmission and processing of data, especially in data migration. The result of this work indicates a promising scalable approach for error detection and correction on a file system like CSV file.","PeriodicalId":373840,"journal":{"name":"Proceedings of the 3rd International Conference on Applications in Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130377477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}