2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
Simulation of identification process of parameters of movement of the wagon on monorail transport 单轨运输货车运动参数辨识过程仿真研究
N. Moroz, A. Starostenko, R. Gorbachev, N. Kuznetsov
{"title":"Simulation of identification process of parameters of movement of the wagon on monorail transport","authors":"N. Moroz, A. Starostenko, R. Gorbachev, N. Kuznetsov","doi":"10.1109/ICAICT.2016.7991717","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991717","url":null,"abstract":"The work is devoted to construction of mathematical model of movement of the passenger wagon and algorithm of identification of parameters of mathematical model, as well as demonstration of efficiency of this algorithm through simulation of the process of identification for selected mode of acceleration.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116224981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimum power allocation for non-orthogonal multiple access (NOMA) 非正交多址(NOMA)的最优功率分配
T. Manglayev, Refik Caglar Kizilirmak, Y. Kho
{"title":"Optimum power allocation for non-orthogonal multiple access (NOMA)","authors":"T. Manglayev, Refik Caglar Kizilirmak, Y. Kho","doi":"10.1109/ICAICT.2016.7991730","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991730","url":null,"abstract":"An optimum power allocation scheme for non-orthogonal multiple access (NOMA) with successive interference cancellation (SIC) technique for downlink channels of next generation cellular networks is proposed in this paper. In NOMA downlinks, the signals for each user are superimposed at the transmitter side and SIC is implemented at the receiver side to separate them. Numerical results show that the overall system throughput performance can be improved significantly by the proposed power allocation algorithm with NOMA in comparison with orthogonal multiple access (OMA), which is implemented in previous wireless telephone technology generations.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122583095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
A light weight dynamic attribute based access control module integrated with business rules 一个轻量级的基于动态属性的访问控制模块,集成了业务规则
Vali Tawosi
{"title":"A light weight dynamic attribute based access control module integrated with business rules","authors":"Vali Tawosi","doi":"10.1109/ICAICT.2016.7991700","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991700","url":null,"abstract":"User authorization in software systems is and has been a serious security concern for a long time. Attribute based Access Control (ABAC), as a new model of user authorization, makes it possible to restrict user access based on rules against different attributes. In the context of service access control in enterprise systems, it seems necessary to separate business rules from service logic and user authorization mechanism. This paper is an experimental report on the implementation of an ABAC module in which business rules are used to restrict user access to the services. The ever changing nature of the business rules in an enterprise system made a necessity to the proposal of such a light weight dynamic attribute based access control module, in which end user is able to change access policies and business rules in run time. Challenges of building this module are revealed and plausible solutions which have been put in place are reported.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Carrier-grade NAT — is it really secure for customers? A test on a Turkish service provider 运营商级NAT——对客户来说真的安全吗?对土耳其服务提供商的测试
Kevser Ovaz Akpinar, M. Akpinar, Ibrahim Ozcelik, N. Yumusak
{"title":"Carrier-grade NAT — is it really secure for customers? A test on a Turkish service provider","authors":"Kevser Ovaz Akpinar, M. Akpinar, Ibrahim Ozcelik, N. Yumusak","doi":"10.1109/ICAICT.2016.7991693","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991693","url":null,"abstract":"Dramatic rise in the user amount yields increase in the number of internet accessed devices within the last decade. Since most of the devices have internet connection, IPv4 space becomes inadequate. In order to avoid this situation, internet service providers focus on using their IP's within their IP pool, optimally. The most preferred approach to handle this problem is called Carrier Grade Network Address Translation (CGN). In this technique, a city, a neighborhood or a group of users could be configured as if they are in the same Local Area Network (LAN) and they have IPv4 Network Address Translation (NAT) connections for Wide Area Network (WAN) accesses. By applying this approach, IP costs are reduced and number of IP's in the pool is optimized. However, implementations done in recent systems could cause vulnerabilities as well. This work focuses on examining a part of CGN applied network that acts as LAN, by scanning, exploring users, devices and vulnerabilities for a specific neighborhood in Turkey. Users and devices are determined and since they are considered in the same LAN most of them are easily gained access and the insecurity of the system is proved. Also it is also observed that a user could stop or slow down the traffic by Denial of Service (DoS) or Distributed DoS attacks.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interactive whiteboard in motivation of pupils of primary school 交互式白板在激发小学生学习动机方面的作用
G. Bánesz, D. Lukáčová, Lukáš Vaněk, Peter Hrubý
{"title":"Interactive whiteboard in motivation of pupils of primary school","authors":"G. Bánesz, D. Lukáčová, Lukáš Vaněk, Peter Hrubý","doi":"10.1109/ICAICT.2016.7991790","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991790","url":null,"abstract":"In our report we want to present the results of a survey focusing on the use of interactive whiteboard technology in the subject called technology at primary schools to increase students' motivation in teaching technical subjects. Technology is a very specific subject in primary schools, because it combines the teaching of theoretical information and practical skill practicing. The research was to find out or check whether pupils of experimental groups who were using an interactive whiteboard during teaching, will be more motivated to learn than students of the controlling groups. We used Kozéki's questionnaire to detect pupils' motivation to motivate students to learn. We found out that in the experimental group the motivation in the affective field (extrinsic motivation) is positive and predominant. This is demonstrably more powerful than the motivation of the control group, which belongs to the field of the cognitive effects, also with positive character. The research results are useful in the planning of teaching in terms of allocating the interactive whiteboard into the teaching process.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beacon authpath: Augmented human path authentication 信标authpath:增强的人类路径认证
Emin Huseynov, J. Seigneur
{"title":"Beacon authpath: Augmented human path authentication","authors":"Emin Huseynov, J. Seigneur","doi":"10.1109/ICAICT.2016.7991702","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991702","url":null,"abstract":"BLE (Bluetooth Low Energy) beacons are being deployed in smart cities, especially to augment the shopping experience of customers in real outlets. Thus, humans as they walk in cities pass by different beacons and the sequence of beacons form a path. In this paper, we present how those augmented paths can authenticate a user in a secure way whereby the users can prove they have passed by a path, even with current unsecure beacons. We have built a prototype to validate this new authentication scheme with unsecure Estimote beacons. In addition, as an alternative to BLE, a similar system utilizing Wi-Fi to detect user proximity is reviewed as well.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127269857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Large scale system management based on Markov Decision Process and Big Data Concept 基于马尔可夫决策过程和大数据概念的大规模系统管理
S. Valeev, N. Kondratyeva
{"title":"Large scale system management based on Markov Decision Process and Big Data Concept","authors":"S. Valeev, N. Kondratyeva","doi":"10.1109/ICAICT.2016.7991829","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991829","url":null,"abstract":"Processing Big Data in large scale system is a new direction of development of information technologies, including methods and algorithms of streaming data in real time mode. In the paper, application of Markov Decision Process System for large scale system management based on Big Data concept is proposed.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114892418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Figuratively-semantic support in precedent-oriented solving the project tasks 面向先例解决项目任务的形象化语义支持
P. Sosnin
{"title":"Figuratively-semantic support in precedent-oriented solving the project tasks","authors":"P. Sosnin","doi":"10.1109/ICAICT.2016.7991747","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991747","url":null,"abstract":"The paper deals with semantic modeling a mental imagery caused by processing a new project task in real-time designing a system with the software. In the processing of the new task, the designer applies a framework “model of precedent” and its iterative filling by content with using a feedback caused with a stepwise refinement of the task statement. For understanding the current conditions of the task statement, the designer uses a figuratively-semantic support. Combining the indicated means is implemented in the toolkit WIQA.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using web-based geoinformation technologies within micro geo-marketing researches 在微地理营销研究中使用基于网络的地理信息技术
M. M. Milikhin, Y. Gritsenko, Yury P. Ekhlakov, O. I. Zhukovsky, P. Senchenko
{"title":"Using web-based geoinformation technologies within micro geo-marketing researches","authors":"M. M. Milikhin, Y. Gritsenko, Yury P. Ekhlakov, O. I. Zhukovsky, P. Senchenko","doi":"10.1109/ICAICT.2016.7991787","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991787","url":null,"abstract":"The article is dedicated to give an assessment of possibility of the applicability of web-based geographic information systems (GIS) within the micro geo-marketing researches. Description of micro geo-marketing data domain, its key features and objectives are given. Functional model of the data collection process is presented. Authors formulate requirements for micro geo-marketing web-GIS and suggests using geodata meta model to provide all necessary functionality within data store tier of GIS architecture. The paper also contains original attributive store component data model.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128160899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A heuristic algorithm for the band collocation problem 带配置问题的一种启发式算法
A. Gursoy, M. Kurt, H. Kutucu, U. Nuriyev
{"title":"A heuristic algorithm for the band collocation problem","authors":"A. Gursoy, M. Kurt, H. Kutucu, U. Nuriyev","doi":"10.1109/ICAICT.2016.7991746","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991746","url":null,"abstract":"In this paper we present a heuristic algorithm for the The Band Collocation Problem (BCP) which may have some applications in the field of telecommunication. First, we give the definition the BCP. Second, we explain how we create the problem instances with known optimal solutions as a library. Third, we propose the heuristic algorithm. Then, we analysis and interpret the results of the proposed algorithm on the problem instances with known optimal solutions. Finally, we suggest new ideas about the BCP and its solution approaches.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131771130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信