2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)最新文献

筛选
英文 中文
Queueing Modeling in the Course in Software Architecture Design 软件体系结构设计课程中的排队建模
V. Liubchenko
{"title":"Queueing Modeling in the Course in Software Architecture Design","authors":"V. Liubchenko","doi":"10.1007/978-3-030-01069-0_39","DOIUrl":"https://doi.org/10.1007/978-3-030-01069-0_39","url":null,"abstract":"","PeriodicalId":403793,"journal":{"name":"2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116897819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The “Individual Workbench for a Corpus Linguist” Information System “语料库语言学家的个人工作台”信息系统
V. Pasichnyk, N. Kunanets, I. Kozák
{"title":"The “Individual Workbench for a Corpus Linguist” Information System","authors":"V. Pasichnyk, N. Kunanets, I. Kozák","doi":"10.1109/STC-CSIT.2018.8526616","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2018.8526616","url":null,"abstract":"The paper is devoted to the information system project for creating of the individual workbench for a corpus linguist, that deals with analysis, design, and monitoring of corpora development process. On the basis of examination and comparative analysis of the existing systems, the most significant disadvantages were defined, as well as the most desired changes and improvements. The system was described by using UML notation diagrams. The paper includes the overall description of the system modules, prototypes and documentation on the system usage.","PeriodicalId":403793,"journal":{"name":"2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116110012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architectural Ontology Designed for Intellectual Analysis of E-Tourism Resources 面向电子旅游资源智能分析的建筑本体设计
V. Lytvyn, V. Vysotska, Y. Burov, A. Demchuk
{"title":"Architectural Ontology Designed for Intellectual Analysis of E-Tourism Resources","authors":"V. Lytvyn, V. Vysotska, Y. Burov, A. Demchuk","doi":"10.1109/STC-CSIT.2018.8526623","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2018.8526623","url":null,"abstract":"The method of architectural ontology building is proposed. The ontology contains general dictionary terms and is used to support intellectual queries to databases with architectural data and for automated data exchange and integration of curriculums in the domain of architecture. The developed method was implemented and tested for a search of a relevant information in Internet using syntactically different, but semantically equivalent architectural terms.","PeriodicalId":403793,"journal":{"name":"2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122871839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Internet Social Environmental Platforms Data Representation 互联网社会环境平台数据表示
Oleg Mastykash, A. Peleshchyshyn, S. Fedushko, O. Trach, Yuriy Syerov
{"title":"Internet Social Environmental Platforms Data Representation","authors":"Oleg Mastykash, A. Peleshchyshyn, S. Fedushko, O. Trach, Yuriy Syerov","doi":"10.1109/STC-CSIT.2018.8526586","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2018.8526586","url":null,"abstract":"Information posted by users on social networks can be found, explored and used by both hand-held and specialized software. The article deals with the architecture of the social environment of the Internet. The main features of the social media platforms of the Internet are highlighted, which is the first step in constructing a software package for data analysis of the social media platform of the Internet. For qualitative data analysis, it is necessary to classify the platforms of the social media of the Internet according to the following criteria: content availability, completeness of the description of the page of the user, the presence of key nodes.","PeriodicalId":403793,"journal":{"name":"2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122536404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
The Method of Encoding Information in the Images Using Numerical Line Bundles 利用数字线束对图像信息进行编码的方法
O. Riznyk, Yurii Kynash, Olexandr Povshuk, Yu. V. Noga
{"title":"The Method of Encoding Information in the Images Using Numerical Line Bundles","authors":"O. Riznyk, Yurii Kynash, Olexandr Povshuk, Yu. V. Noga","doi":"10.1109/STC-CSIT.2018.8526751","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2018.8526751","url":null,"abstract":"The possibility of encoding information by the method of the least significant bit in the image using the model of a numerical ruler-bundle is presented. When using graphic formats, it becomes possible to hide not only text messages, but also other images and files. For these purposes, technology based on the numerical ruler-bundle is used, which reduces to the replacement of certain pixels in the image, which allows creating efficient algorithms for encoding and decoding.","PeriodicalId":403793,"journal":{"name":"2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122564366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Automatic Segmentation of Abdominal Aortic Aneurysm 腹主动脉瘤的自动分割
S. Habib, J. Dehmeshki
{"title":"Automatic Segmentation of Abdominal Aortic Aneurysm","authors":"S. Habib, J. Dehmeshki","doi":"10.1109/STC-CSIT.2018.8526709","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2018.8526709","url":null,"abstract":"The aim of this paper is to develop an accurate automatic segmentation of Abdominal Aortic Aneurysm (AAA). Firstly, an anti -geometric diffusion technique was used to smooth the CTA. Following on, applying the segmentation and morphological operation, the Lumen can be identified from the pre-processed image. Through applying Geometrical information, mathematical morphology and cluster analysis the detention of the abdominal lumen is established. The process is succeeded with the geometrical transformation to align the lumen through the use of the centreline. As a result, to find the existence of the aneurysm, multiple evaluations are conducted on the abdominal lumen area. To test the automatic detection and segmentation, 40 CT Angiography scans have been tested and the results have been displayed in this paper.","PeriodicalId":403793,"journal":{"name":"2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114367344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Distributed System for Detecting the Malware in LAN 分布式局域网恶意软件检测系统
G. Markowsky, O. Savenko, A. Sachenko
{"title":"Distributed System for Detecting the Malware in LAN","authors":"G. Markowsky, O. Savenko, A. Sachenko","doi":"10.1109/STC-CSIT.2018.8526740","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2018.8526740","url":null,"abstract":"The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilevel. This allows you to use it autonomously. In addition, the feature of autonomous program modules of the system is the same organization, which allows the exchange of knowledge in the middle of the system, which, unlike the known systems, allows you to use the knowledge gained by separate parts of the system in other parts. The developed system allows to fill it with subsystems of detection of various types of malicious software in local area networks.","PeriodicalId":403793,"journal":{"name":"2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114582337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proactive Simulation in Production Line Control 生产线控制中的主动模拟
P. Važan, Jaroslav Znamenak, M. Juhás
{"title":"Proactive Simulation in Production Line Control","authors":"P. Važan, Jaroslav Znamenak, M. Juhás","doi":"10.1109/STC-CSIT.2018.8526675","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2018.8526675","url":null,"abstract":"This paper deals with proposal of a proactive simulation model for a hybrid production system with an integrated MES used for safety, security, control, maintenance and service training with equipment similar to one utilized in a real industrial process. A proactive planning methodology can use information about real time changes in input data used for planning and determine a revised plan and line control. The proposed proactive procedure in this paper demonstrates a way to acquire data from an existing manufacturing process, which will be used to reach a production plan based on a combination of a simulation model and data acquired from MES. The revised control procedure will be send back to the MES to update the manufacturing process.","PeriodicalId":403793,"journal":{"name":"2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128764426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Learning Space Conceptual Model for Computing Games Developers 计算游戏开发者的学习空间概念模型
A. Biloshchytskyi, A. Kuchansky, Y. Andrashko, O. Bielova
{"title":"Learning Space Conceptual Model for Computing Games Developers","authors":"A. Biloshchytskyi, A. Kuchansky, Y. Andrashko, O. Bielova","doi":"10.1109/STC-CSIT.2018.8526719","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2018.8526719","url":null,"abstract":"The article is devoted to the construction of learning space conceptual model for preparation of GameHub computer game developers in higher education institutions. The concept consists of three main components: a methodological or pedagogical component, a technological component, an information component. The article describes processes scheme for developing of learning space infrastructure and reflects the interactions between GameHub participants. The article presents an example of such a scheme for magistracy students, bachelor's degree students and free listeners from one of the Ukrainian universities. An approach to the student knowledge diagnosis is described on the basis of writing and testing analysis. Highlighted results in this paper are useful as a guide for step-by-step organization and for supporting the functioning of game educational hubs in higher education institutions. The described concept includes basic tools that are necessary for effective student training organizing on the principles of computer game development. Learning space conceptual model can serve as foundation for the formation of professionals training implementation roadmap in gaming industry. The concept is proposed for implementation by universities and private IT companies interested in Serious Games industry development.","PeriodicalId":403793,"journal":{"name":"2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Decomposition Approach to Hierarchical Management of Cloud Data Center Services 云数据中心服务分层管理的分解方法
E. Zharikov, O. Rolik, S. Telenyk
{"title":"A Decomposition Approach to Hierarchical Management of Cloud Data Center Services","authors":"E. Zharikov, O. Rolik, S. Telenyk","doi":"10.1109/STC-CSIT.2018.8526764","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2018.8526764","url":null,"abstract":"Combining centralized and distributed management within hierarchical management system of cloud data center allows to ensure the scalability and to determine the global system state. The authors apply the hierarchy theory by decomposing a cloud data center into an infrastructure, a platform and application layers each consisted of processes that can be managed separately while taking into account different objectives. The authors propose the architecture of a multilayer hierarchical management system for the complex object such as cloud data center. The proposed architecture combines traditional resource management techniques with templates and configuration management on higher layers of the hierarchical model. It allows controlling information services of a cloud data center on the criterion of minimizing costs and minimizing the deviation of the quality of service parameters from the given ones. The proposed model can also be used to assess the effectiveness of the service management by the quality of provided services, by the cost of using data center resources and by the cost of SLA violation penalty.","PeriodicalId":403793,"journal":{"name":"2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124129763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信