{"title":"Analysis of the MSVMO method - the probabilistic SVM outputs","authors":"A. Madevska-Bogdanova, Z. Popeska, D. Nikolik","doi":"10.1109/ITI.2005.1491157","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491157","url":null,"abstract":"Number of experiments has shown that for classification problems, if SVM models trained over the same data set have similar SVM outputs with respect to a given input vector x, the values of the corresponding MSVMO probabilities [3] have small differences. This means that the information from the MSVMO method from different SVM models trained over the same data set is essentially the same.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115734178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A temporal transparency database application development environment","authors":"S. Sivamard, S. Chittayasothorn","doi":"10.1109/ITI.2005.1491113","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491113","url":null,"abstract":"Temporal database concepts have been around for a long time. However, the implementation of temporal databases for practical database applications is limited. One reason is that for most practitioners, the temporal database concepts are difficult to understand. It is also very hard to implement the concepts on conventional relational databases using SQL. Therefore, projects that try to implement it face many problems, such as team members can not tune in with the new concept, delays due to training, lost of productivity and power users can not directly query databases. The objective of this research project is to create an architecture that allows temporal databases to coexist with normal databases. Temporal database application developers can use a temporal version of SQL to develop their applications. Concurrently, applications developed for conventional databases use the standard SQL on current databases and can also maintain temporal databases without the awareness of the existence of the temporal ones thus, achieve temporal transparency. Users, administrators and team members can utilize the databases without extensive training on the temporal relational database implementation. A software development environment is developed according to the architecture.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134264021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The representation of chess game","authors":"B. Bošković, S. Greiner, J. Brest, V. Zumer","doi":"10.1109/ITI.2005.1491153","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491153","url":null,"abstract":"Implementation of a fast chess program is a formidable task from many perspectives. The architecture of a programming model is vital to get the best performance. Instead of building a chess program based on knowledge we opted for speed instead. We implemented the majority of all key concepts which turned out to be very efficient in our chess program design. Tests have shown relatively high rating of our implementation despite the simple evaluation function.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123182923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching statistics using the computer","authors":"E. Williams","doi":"10.1109/ITI.2005.1491092","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491092","url":null,"abstract":"In Australia there has been a decline in the number of students majoring in statistics and mathematics in general. During 2003, just over 3000 PhDs were awarded in Australia in the natural and physical sciences. Of these almost half were in the biological sciences while only 186 were in the mathematical and statistical sciences. Combined with the low number of people currently studying statistics, this has created both an enormous shortage of good statisticians and a lack of critical mass in Australia to develop new technologies. The general situation has prompted a review of the state of statistics in Australian Universities. The Federal Minister for Education, Science and Technology has requested that suitable initiatives be developed in order to redress the problem.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115909850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grid infrastructure based on multiple workflow engines","authors":"Yan Huang, Qifeng Huang, D. Walker","doi":"10.1109/ITI.2005.1491097","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491097","url":null,"abstract":"This paper presents WenGrid, a novel scientific Grid infrastructure composed of workflow engines (WSEngines) that provide enactment environments for applications composed from Web services and described in the SWFL workflow language and its extension, MPFL. MPFL extends SWFL to support more sophisticated parallel applications. An overview of the Grid infrastructure is presented and each of its five main components is discussed, including ISR, a service registry to supplement UDDI for distinguishing between equivalent services.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129443226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of the content of the website on company's image","authors":"J. Kuzic","doi":"10.1109/ITI.2005.1491167","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491167","url":null,"abstract":"In mid 1990's some corporate executives realised the ability of the web site to influence company's image significantly. Nowadays, particularly in the e-business environment, this influence is becoming very evident, forcing companies all over the world to pay attention to web site features more than ever. Anecdotal evidence suggests that the importance of the customers' impressions of web sites plays an important role in defining the way companies communicate with their customers. This research paper investigates the importance of the features of the content of the web site, as well as their influence on company's image. Some of these features include: providing useful information on a web site, having recent and up-to-date content, level of interaction, using valuable graphics, etc. The research reported in this paper also looks at the changes of the perceptions about companies' image occurring after visiting and evaluating their web sites.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127456268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of traffic management in data networks","authors":"P. Tervydis, R. Rindzevičius, J. Gvergždys","doi":"10.1109/ITI.2005.1491188","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491188","url":null,"abstract":"In this article we propose the data network router management topology. Research is in progress to develop topology of data packets management. We motivated the need for data flows management by means of mathematical models and simulation. The point of view taken in this paper is that it is possible to incorporate in routers current technology mechanisms which in addition enabling differentiated services. Using our proposed mechanisms routers can aggregate customer data in very flexible manner and allocate resources in a customizable manner. Finally, it should be stated that the proposed data flow management and control method is based on similar validated work we have undertaken (8,9,10).","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121099275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CRO-GRID security management system","authors":"B. Radic, E. Imamagic, D. Dobrenic","doi":"10.1109/ITI.2005.1491100","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491100","url":null,"abstract":"Computer grids are briefly described as highly distributed systems of computer resources which cooperate together towards creating a reliable, scalable dynamically changeable system for providing resources and services to users. Dynamical nature of grid creates additional security challenges. This paper gives an overview of security demands which a grid security system must overcome. First, an explanation of the grid specific security demands is given. Then, an overview of the available grid security systems, first the concepts they use and later technologies that implement those concepts is given. Furthermore, we use these concepts to define our own architecture for enabling security in a grid environment and enhancements to usual grid security mechanisms. We conclude with a description of future steps and how these steps will improve our system.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"435 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximative terrain guarding with given number of guards","authors":"B. Kaucic","doi":"10.2498/cit.2005.04.08","DOIUrl":"https://doi.org/10.2498/cit.2005.04.08","url":null,"abstract":"Guarding a surface is a well known optimization problem of the visibility site analysis and has many applications. The basic problem is searching for the minimum number of guards needed to guard (see) the entire surface. More realistic is the guarding where the number of guards is upward limited and the optimization problem is to search for their locations in order to guard as much surface as possible. In the paper this problem is treated in detail. Several known heuristics (greedy add, greedy add with swap and stingy drop) are revised and a new technique called solution improving technique is proposed. The technique improves the results of the known algorithms and is used in indirect solving of the problem. Tests on 44 DEMs from USGS DEM Repository showed that our technique yields comparative results for smaller number of guards and better results for higher number of guards.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125221111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Program control of optical spectrum analyzer","authors":"J. Sveikata, A. Noreika","doi":"10.1109/ITI.2005.1491176","DOIUrl":"https://doi.org/10.1109/ITI.2005.1491176","url":null,"abstract":"Development of optical technologies rapidly stimulates analysis of more complex signals. Spectrum measurement demands the use of sophisticated combination of hardware and software for optical instruments. The purpose of this work is to create a computer program for manipulation of optical spectrum analyzer HP 71451A. It is also necessary to select suitable system operation algorithm. System control design should span: algorithm of operation, amount of possible functions, indication type and user interface. This investigation implements the creation of such automated measurement system using two different programming approaches - graphic programming using LabVIEW and text- based programming using LabWindows.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131612146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}