Menu
EDUCATIONAL GAMES FOR LEARNING PROGRAMMING LANGUAGES
By: Shabalina et al.  (2223 reads)
Rating: (1.00/10)

Abstract: A concept of educational game for learning programming languages is presented. The idea of learning programming languages and improving programming skills through programming game characters’ behavior is described. The learning course description rules for using in games are suggested. The concept is implemented in a game for learning C# programming language. A common game architecture is modified for using in the educational game. The game engine is built on the base of the graphical engine Ogre3D and extended with game logic. The game has been developed as an industry level commercial product and is planned for sale to educational institutions. Keywords: educational games, serious games, digital game-based learning, e-learning, course notation, game engine, learning engine. ACM Classification Keywords: K.3.1 Computer Uses in Education; K.3.2 Computer and Information Science Education

Link:

EDUCATIONAL GAMES FOR LEARNING PROGRAMMING LANGUAGES

Olga Shabalina, Pavel Vorobkalov, Alexander Kataev, Alexey Tarasenko

http://www.foibg.com/ibs_isc/ibs-06/IBS-06-p11.pdf

THE CONCEPTION OF CREATION OF INTEGRATED DEVELOPMENT ...
By: Shubin et al.  (2266 reads)
Rating: (1.00/10)

Abstract: The various questions of creation of integrated development environment for computer training systems are considered in the given paper. The information technologies that can be used for creation of the integrated development environment are described. The different didactic aspects of realization of such systems are analyzed. The ways to improve the efficiency and quality of learning process with computer training systems for distance education are pointed

Keywords: Web-Based? Design, Distance Learning, Learning Course Model, Computer-Based? Training System, Hypertext.

ACM Classification Keywords: K.3.1 Computer Uses in Education

Link:

THE CONCEPTION OF CREATION OF INTEGRATED DEVELOPMENT ENVIRONMENT FOR COMPUTER TRAINING SYSTEMS

Igor Shubin, Dmitry Shevchuk, Tatiana Gorbach, Aleksey Tischenko, Svitlana Krytsyna, Iryna Bilous

http://www.foibg.com/ibs_isc/ibs-06/IBS-06-p09.pdf

USING REENGINEERING TECHNIQUES FOR DISTANCE STUDY COURSE IMPROVEMENT
By: Lina Tankeleviciene  (2182 reads)
Rating: (1.00/10)

Abstract: The paper analyses the reengineering concept as it comes from software engineering and management fields. We combine two viewpoints and apply them to solve a problem of reengineering of a distance study system, in general, and the unit of learning, in particular. We propose a framework for reengineering of unit of learning, based on general model of software reengineering, and present a case study, in which we describe, how one topic of distance study course was reengineered, considering triple consistency principle and requirements for computer science. The proposed framework contributes to increasing quality, effectiveness and systematization of delivering distance studies.

Keywords: distance study course, reengineering, triple consistency principle.

ACM Classification Keywords: K.3.1 Computer Uses in Education

Link:

USING REENGINEERING TECHNIQUES FOR DISTANCE STUDY COURSE IMPROVEMENT

Lina Tankeleviciene

http://www.foibg.com/ibs_isc/ibs-06/IBS-06-p02.pdf

QUALITY ESTIMATION OF E-LEARNING SYSTEMS
By: Pavel Vorobkalov, Valerij Kamaev  (2065 reads)
Rating: (1.00/10)

Abstract: Existing approaches to quality estimation of e-learning systems are analyzed. The “layered” approach for quality estimation of e-learning systems enhanced with learning process modeling and simulation is presented. The method of quality estimation using learning process modeling and quality criteria are suggested. The learning process model based on extended colored stochastic Petri net is described. The method has been implemented in the automated system of quality estimation of e-learning systems named “QuAdS”. Results of approbation of the developed method and quality criteria are shown. We argue that using learning process modeling for quality estimation simplifies identifying lacks of an e-learning system for an expert.

Keywords: e-learning, adaptive learning systems, quality estimation.

ACM Classification Keywords: K.3.1 Computer Uses in Education

Link:

QUALITY ESTIMATION OF E-LEARNING SYSTEMS

Pavel Vorobkalov, Valerij Kamaev

http://www.foibg.com/ibs_isc/ibs-06/IBS-06-p03.pdf

E-LEARNING, E-PRACTISING AND E-TUTORING: AN INTEGRATED APPROACH
By: Zheleva et al.  (2213 reads)
Rating: (1.00/10)

Abstract: In this paper is described a didactic methodology combining current e-learning methods and the support of Intelligent Agents technologies. The aim is to favor the synthesis among theoretical approach and based practical approach using the so-called Intelligent Agent, software that exploits the Artificial Intelligence and that operates as tutor, facilitating the consumers in the training operations. The paper illustrates how such new Intelligent Agent algorithm (IA) is used in the training of employees working in the transportation sector, thanks to the experience gained with the PARMENIDE project - Promoting Advanced Resources and Methodologies for New Teaching and Learning Solutions in Digital Education.

Keywords: Learning-by-doing, On-the-job Training, Intelligent Agents, Fuzzy Logic, Virtual Pedagogical Character, Virtual Tutor.

ACM Classification Keywords: I. Computing Methodologies I.2 Artificial Intelligence I.2.6 Learning – Knowledge Acquisition, J. Computer Applications J.7 Computers in Other Systems - Process control

Link:

E-LEARNING, E-PRACTISING AND E-TUTORING: AN INTEGRATED APPROACH

Mariya Monova-Zheleva?,Yanislav Zhelev, Ilaria Mascitti

http://www.foibg.com/ibs_isc/ibs-06/IBS-06-p12.pdf

ON A DIRECT APPROACH TO THE SOLUTION OF INVERSE OPTICAL PROBLEMS
By: Peter Sharlandjiev, Georgi Stoilov  (1938 reads)
Rating: (1.00/10)

Abstract: The evaluation from experimental data, of physical quantities, which enter into the electromagnetic Maxwell equations, is described as inverse optical problem. The functional relations between the dependent and independent variables are of transcendental character and numeric procedures for evaluation of the unknowns are largely used. Herein, we discuss a direct approach to the solution, illustrated by a specific example of determination of thin films optical constants from spectrophotometric data. New algorithm is proposed for the parameters evaluation, which does not need an initial guess of the unknowns and does not use iterative procedures. Thus we overcome the intrinsic deficiency of minimization techniques, such as gradient search methods, Simplex methods, etc. The price of it is a need of more computing power, but our algorithm is easily implemented in structures such as grid clusters. We show the advantages of this approach and its potential for generalization to other inverse optical problems.

Keywords: Thin films; Materials and process characterization

ACM Classification Keywords: J.2 Physical Sciences and Engineering (Physics)

Link:

ON A DIRECT APPROACH TO THE SOLUTION OF INVERSE OPTICAL PROBLEMS

Peter Sharlandjiev, Georgi Stoilov

http://www.foibg.com/ibs_isc/ibs-05/IBS-05-p06.pdf

PROJECTIVE METHODS OF IMAGE RECOGNITION
By: Putyatin et al.  (1952 reads)
Rating: (1.00/10)

Abstract: We propose a method for image recognition on the base of projections. Radon transform gives an opportunity to map image into space of its projections. Projection properties allow constructing informative features on the base of moments that can be successfully used for invariant recognition. Offered approach gives about 91-97% of correct recognition.

Keywords: Radon transforms, invariant features, pattern recognition, image projections.

ACM Classification Keywords: I.4.7 Feature Measurement – Invariants

Link:

PROJECTIVE METHODS OF IMAGE RECOGNITION

Yevgeniy Putyatin, Vladimir Gorohovatsky, Alexey Gorohovatsky, Elena Peredriy

http://www.foibg.com/ibs_isc/ibs-05/IBS-05-p05.pdf

DISTANCE MATRIX APPROACH TO CONTENT IMAGE RETRIEVAL
By: Kinoshenko et al.  (1990 reads)
Rating: (1.00/10)

Abstract: As the volume of image data and the need of using it in various applications is growing significantly in the last days it brings a necessity of retrieval efficiency and effectiveness. Unfortunately, existing indexing methods are not applicable to a wide range of problem-oriented fields due to their operating time limitations and strong dependency on the traditional descriptors extracted from the image. To meet higher requirements, a novel distance-based indexing method for region-based image retrieval has been proposed and investigated. The method creates premises for considering embedded partitions of images to carry out the search with different refinement or roughening level and so to seek the image meaningful content.

Keywords: content image retrieval, distance matrix, indexing.

ACM Classification Keywords: H.3.3 Information Search and Retrieval: Search process

Link:

DISTANCE MATRIX APPROACH TO CONTENT IMAGE RETRIEVAL

Dmitry Kinoshenko, Vladimir Mashtalir, Elena Yegorova

http://www.foibg.com/ibs_isc/ibs-05/IBS-05-p04.pdf

APPLICATION OF FUZZY LOGIC ON IMAGE EDGE DETECTION
By: Mathur et al.  (6267 reads)
Rating: (1.00/10)

Abstract: In this paper a novel method for an application of digital image processing, Edge Detection is developed. The contemporary Fuzzy logic, a key concept of artificial intelligence helps to implement the fuzzy relative pixel value algorithms and helps to find and highlight all the edges associated with an image by checking the relative pixel values and thus provides an algorithm to abridge the concepts of digital image processing and artificial intelligence. Exhaustive scanning of an image using the windowing technique takes place which is subjected to a set of fuzzy conditions for the comparison of pixel values with adjacent pixels to check the pixel magnitude gradient in the window. After the testing of fuzzy conditions the appropriate values are allocated to the pixels in the window under testing to provide an image highlighted with all the associated edges.

Keywords: Fuzzy logic, digital image processing, feature extraction.

ACM Classification Keywords: I.2 Artificial Intelligence, I.4 Image processing and computer vision

Link:

APPLICATION OF FUZZY LOGIC ON IMAGE EDGE DETECTION

Shashank Mathur, Anil Ahlawat

http://www.foibg.com/ibs_isc/ibs-05/IBS-05-p03.pdf

ON THE FEASIBILITY OF STEERING SWALLOWABLE MICROSYSTEM CAPSULES ...
By: Wu et al.  (2094 reads)
Rating: (1.00/10)

Abstract: Swallowable capsule endoscopy is used for non-invasive diagnosis of some gastrointestinal (GI) organs. However, control over the position of the capsule is a major unresolved issue. This study presents a design for steering the capsule based on magnetic levitation. The levitation is stabilized with the aid of a computer-aided feedback control system and diamagnetism. Peristaltic and gravitational forces to be overcome were calculated. A levitation setup was built to analyze the feasibility of using Hall Effect sensors to locate the invivo capsule. CAD software Maxwell 3D (Ansoft, Pittsburgh, PA) was used to determine the dimensions of the resistive electromagnets required for levitation and the feasibility of building them was examined. Comparison based on design complexity was made between positioning the patient supinely and upright.

Keywords: Computer-Aided? Magnetic Levitation, Capsule Endoscopy, Real-Time? Image Transmission

ACM Classification Keywords: J.6 Computer-Aided? Engineering

Link:

ON THE FEASIBILITY OF STEERING SWALLOWABLE MICROSYSTEM CAPSULES USING COMPUTER-AIDED MAGNETIC LEVITATION

Billy T. Wu, Martin P. Mintchev

http://www.foibg.com/ibs_isc/ibs-05/IBS-05-p02.pdf

HARDWARE IMPLEMENTATIONS OF VIDEO WATERMARKING
By: Li et al.  (1876 reads)
Rating: (1.00/10)

Abstract: Various digital watermarking (WM) techniques for still imaging have been studied in the last several years. Recently, many new WM schemes have been proposed for other types of digital multimedia data, such as text, audio and video. This paper presents a brief overview of existing digital video WM. We classify WM techniques and discuss the properties of video WM. Since each WM application has its own specific requirements, WM design must take the intended application into consideration. Video WM applications are also discussed in the paper. The features of video WM implementations in software and hardware and their differences are presented through the description of four examples of existing work.

Keywords: Digital video, watermarking, WM, hardware implementation, security.

ACM Classification Keywords: B.0 Hardware - Conference proceedings

Link:

HARDWARE IMPLEMENTATIONS OF VIDEO WATERMARKING

Xin Li, Yonatan Shoshan, Alexander Fish, Graham Jullien, Orly Yadid-Pecht?

http://www.foibg.com/ibs_isc/ibs-05/IBS-05-p01.pdf

CORE DESIGN PATTERN FOR EFFICIENT MULTI-AGENT ARCHITECTURE
By: Kasper Hallenborg  (1961 reads)
Rating: (1.00/10)

Abstract: Interaction engineering is fundamental for agent based systems. In this paper we will present a design pattern for the core of a multi-agent platform - the message communication and behavior activation mechanisms - using language features of C#. An agent platform is developed based on the pattern structure, which is legitimated through experiences of using JADE in real applications. Results of the communication model are compared against the popular JADE platform.

Keywords: multi-agents, design pattern, C# language features, message based architecture, behaviors.

ACM Classification Keywords: D.2.11 Software Architectures, D.2.13 Reusable Software.

Link:

CORE DESIGN PATTERN FOR EFFICIENT MULTI-AGENT ARCHITECTURE

Kasper Hallenborg

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p04.pdf

A LOG TOOL FOR SOFTWARE SYSTEMS ANALYSES
By: Karelin et al.  (2285 reads)
Rating: (1.00/10)

Abstract: The article presents a new type of logs merging tool for multiple blade telecommunication systems based on the development of a new approach. The introduction of the new logs merging tool (the Log Merger) can help engineers to build a processes behavior timeline with a flexible system of information structuring used to assess the changes in the analyzed system. This logs merging system based on the experts experience and their analytical skills generates a knowledge base which could be advantageous in further decision-making expert system development. This paper proposes and discusses the design and implementation of the Log Merger, its architecture, multi-board analysis of capability and application areas. The paper also presents possible ways of further tool improvement e.g. - to extend its functionality and cover additional system platforms. The possibility to add an analysis module for further expert system development is also considered.

Keywords: Knowledge Base, Software Systems Analyses, Log Tool, Telecommunication System.

ACM Classification Keywords: B.8.0 Hardware – Performance and Reliability - General, D.2.5 Software – Software Engineering - Testing and Debugging, H.3.4 Information Systems - Information Storage and retrieval - Systems and Software.

Link:

A LOG TOOL FOR SOFTWARE SYSTEMS ANALYSES

Igor Karelin, Boris Lyubimov, Tatyana Gavrilova

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p09.pdf

KEY AGREEMENT PROTOCOL USING ELLIPTIC CURVE MATRIX POWER FUNCTION*
By: Artūras Katvickis, Paulius Vitkus  (2089 reads)
Rating: (1.00/10)

Abstract: The key agreement protocol (KAP) using elliptic curve matrix power function is presented. This function pretends be a one-way function since its inversion is related with bilinear equation solution over elliptic curve group. The matrix of elliptic curve points is multiplied from left and right by two matrices with entries in Zn. Some preliminary security considerations are presented.

Keywords: key agreement protocol, elliptic curve cryptography, NP-complete problem.

ACM Classification Keywords: E.3 Data Encryption, F.2.1 Numerical Algorithms and Problems.

Link:

KEY AGREEMENT PROTOCOL USING ELLIPTIC CURVE MATRIX POWER FUNCTION*

Artūras Katvickis, Paulius Vitkus

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p16.pdf

DATA PROTECTION AND PACKET MODE IN THE DISTRIBUTED INFORMATION MEASUREMENT ...
By: Kiprushkin et al.  (2328 reads)
Rating: (1.00/10)

Abstract: The present paper is devoted to creation of cryptographic data security and realization of the packet mode in the distributed information measurement and control system that implements methods of optical spectroscopy for plasma physics research and atomic collisions. This system gives a remote access to information and instrument resources within the Intranet/Internet networks. The system provides remote access to information and hardware resources for the natural sciences within the Intranet/Internet networks. The access to physical equipment is realized through the standard interface servers (PXI, CАМАC, and GPIB), the server providing access to Ethernet devices, and the communication server, which integrates the equipment servers into a uniform information system. The system is used to make research task in optical spectroscopy, as well as to support the process of education at the Department of Physics and Engineering of Petrozavodsk State University.

Keywords: distributed information measurement and control system, equipment server, PXI server, CAMAC server, GPIB server, distance learning.

ACM Classification Keywords: H.3.4 Systems and Software: Distributed systems.

Link:

DATA PROTECTION AND PACKET MODE IN THE DISTRIBUTED INFORMATION MEASUREMENT AND CONTROL SYSTEM FOR RESEARCH IN PHYSICS

Sergey Kiprushkin, Nikolay Korolev, Sergey Kurskov, Vadim Semin

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p12.pdf

GRID APPROACH TO SATELLITE MONITORING SYSTEMS INTEGRATION
By: Kussul et al.  (1948 reads)
Rating: (1.00/10)

Abstract: This paper highlights the challenges of satellite monitoring systems integration, in particular based on Grid platform, and reviews possible solutions for these problems. We describe integration issues on different levels: data integration level and task management level (job submission in terms of Grid). We show example of described technologies for integration of monitoring systems of Ukraine (National Space Agency of Ukraine, NASU) and Russia (Space Research Institute RAS, IKI RAN). Another example refers to the development of InterGrid? infrastructure that integrates several regional and national Grid systems: Ukrainian Academician Grid (with Satellite data processing Grid segment) and RSGS Grid (Chinese Academy of Sciences).

Keywords: Grid systems, satellite monitoring systems.

ACM Classification Keywords: H. Information Systems - H.1 Models and Principles

Link:

GRID APPROACH TO SATELLITE MONITORING SYSTEMS INTEGRATION

Nataliia Kussul, Andrii Shelestov, Serhiy Skakun

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p11.pdf

MATRIX POWER S-BOX ANALYSIS1
By: Kestutis Luksys, Petras Nefas  (2804 reads)
Rating: (1.00/10)

Abstract: Construction of symmetric cipher S-box based on matrix power function and dependant on key is analyzed. The matrix consisting of plain data bit strings is combined with three round key matrices using arithmetical addition and exponent operations. The matrix power means the matrix powered by other matrix. This operation is linked with two sound one-way functions: the discrete logarithm problem and decomposition problem. The latter is used in the infinite non-commutative group based public key cryptosystems. The mathematical description of proposed S-box in its nature possesses a good “confusion and diffusion” properties and contains variables “of a complex type” as was formulated by Shannon. Core properties of matrix power operation are formulated and proven. Some preliminary cryptographic characteristics of constructed S-box are calculated.

Keywords: Matrix power, symmetric encryption, S-box.

ACM Classification Keywords: E.3 Data Encryption, F.2.1 Numerical Algorithms and Problems.

Link:

MATRIX POWER S-BOX ANALYSIS1

Kestutis Luksys, Petras Nefas

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p15.pdf

KNOWLEDGE CONSTRUCTION TECHNOLOGY THROUGH HYPERMEDIA-BASED ...
By: S.M.F.D Syed Mustapha  (2276 reads)
Rating: (1.00/10)

Abstract: There have been multifarious approaches in building expert knowledge in medical or engineering field through expert system, case-based reasoning, model-based reasoning and also a large-scale knowledge-based system. The intriguing factors with these approaches are mainly the choices of reasoning mechanism, ontology, knowledge representation, elicitation and modeling. In our study, we argue that the knowledge construction through hypermedia-based community channel is an effective approach in constructing expert’s knowledge. We define that the knowledge can be represented as in the simplest form such as stories to the most complex ones such as on-the-job type of experiences. The current approaches of encoding experiences require expert’s knowledge to be acquired and represented in rules, cases or causal model. We differentiate the two types of knowledge which are the content knowledge and socially-derivable knowledge. The latter is described as knowledge that is earned through social interaction. Intelligent Conversational Channel is the system that supports the building and sharing on this type of knowledge.

Keywords: Knowledge Building, Community Channel, Community Learning, Virtual Agents

ACM Classification Keywords: K.3.1 Computer Uses in Education (Collaborative Learning)

Link:

KNOWLEDGE CONSTRUCTION TECHNOLOGY THROUGH HYPERMEDIA-BASED INTELLIGENT CONVERSATIONAL CHANNEL

S.M.F.D Syed Mustapha

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p06.pdf

A "CROSS-TECHNOLOGY" SOFTWARE DEVELOPMENT APPROACH
By: Palanchov et al.  (1913 reads)
Rating: (1.00/10)

Abstract: Contemporary web-based software solutions are usually composed of many interoperating applications. Classical approach is the different applications of the solution to be created inside one technology/platform, e.g. Java-technology, .NET-technology, etc. Wide spread technologies/platforms practically discourage (and sometime consciously make impossible) the cooperation with elements of the concurrent technologies/platforms. To make possible the usage of attractive features of one technology/platform in another technology/platform some “cross-technology” approach is necessary. In the paper is discussed the possibility to combine two existing instruments – interoperability protocols and “lifting” of procedures – in order to obtain such cross-technology approach.

Keywords: web-solution, interoperability of applications, interoperability protocols, lifted procedures

ACM Classification Keywords: D.2 Software Engineering, D.2.11 Languages (interconnection), D.2.12 Interoperability (interface definition)

Link:

A "CROSS-TECHNOLOGY" SOFTWARE DEVELOPMENT APPROACH

Stefan Palanchov, Alexander Simeonov, Krassimir Manev

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p07.pdf

ASYMMETRIC CIPHER PROTOCOL USING DECOMPOSITION PROBLEM
By: Andrius Raulynaitis, Saulius Japertas  (2409 reads)
Rating: (1.00/10)

Abstract: The asymmetric cipher protocol based on decomposition problem in matrix semiring M over semiring of natural numbers N is presented. The security parameters are defined and preliminary security analysis is presented. Keywords: asymmetric cipher, decomposition problem. ACM Classification Keywords: E.3 Data Encryption, F.2.1 Numerical Algorithms and Problems.

Link:

ASYMMETRIC CIPHER PROTOCOL USING DECOMPOSITION PROBLEM

Andrius Raulynaitis, Saulius Japertas

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p17.pdf

KEY AGREEMENT PROTOCOL (KAP) BASED ON MATRIX POWER FUNCTION*
By: Sakalauskas et al.  (1970 reads)
Rating: (1.00/10)

Abstract: The key agreement protocol (KAP) is constructed using matrix power functions. These functions are based on matrix ring action on some matrix set. Matrix power functions have some indications as being a oneway function since they are linked with certain generalized satisfiability problems which are potentially NPComplete. A working example of KAP with guaranteed brute force attack prevention is presented for certain algebraic structures. The main advantage of proposed KAP is considerable fast computations and avoidance of arithmetic operations with long integers.

Keywords: key agreement protocol, matrix power function, one-way function (OWF).

ACM Classification Keywords: E.3 Data encryption, F.2.1 Numerical Algorithms and Problems.

Link:

KEY AGREEMENT PROTOCOL (KAP) BASED ON MATRIX POWER FUNCTION*

Eligijus Sakalauskas, Narimantas Listopadskis, Povilas Tvarijonas

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p14.pdf

INTELLIGENT SYSTEM FOR COMPUTER AIDED ASSEMBLY PROCESS PLANNING
By: Galina Setlak  (2414 reads)
Rating: (1.00/10)

Abstract: This paper presents the concepts of the intelligent system for aiding of the module assembly technology. The first part of this paper presents a project of intelligent support system for computer aided assembly process planning. The second part includes a coincidence description of the chosen aspects of implementation of this intelligent system using technologies of artificial intelligence (artificial neural networks, fuzzy logic, expert systems and genetic algorithms). Keywords: Artificial intelligence, flexible assembly systems, neural networks, fuzzy logic, fuzzy neural networks, group technology formatting rules. ACM Classification Keywords: I. Computing Methodologies, I.2 Artificial Intelligence, J. Computer Applications, J.6.Computer Aided Engineering

Link:

INTELLIGENT SYSTEM FOR COMPUTER AIDED ASSEMBLY PROCESS PLANNING

Galina Setlak

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p01.pdf

INCREASING RELIABILITY AND IMPROVING THE PROCESS OF ACCUMULATOR ...
By: Andrzej Smykla  (1850 reads)
Rating: (1.00/10)

Abstract: The article presents the software written in Builder C++ that monitors the process of processor impulse charger. Protocol, interface, components used and the future research are presented..

Keywords: PCGraph, developing software, charging process, C++ Builder

ACM Classification Keywords: C.3 Special-Purpose? and Application-based Systems

Link:

INCREASING RELIABILITY AND IMPROVING THE PROCESS OF ACCUMULATOR CHARGING BASED ON THE DEVELOPMENT OF PCGRAPH APPLICATION

Andrzej Smykla

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p03.pdf

IMPROVED CRYPTOANALYSIS OF THE SELF-SHRINKING ...
By: Borislav Stoyanov  (2314 reads)
Rating: (1.00/10)

Abstract: The Self-shrinking p-adic cryptographic generator (SSPCG) is a fast software stream cipher. Improved cryptoanalysis of the SSPCG is introduced. This cryptoanalysis makes more precise the length of the period of the generator. The linear complexity and the cryptography resistance against most recently used attacks are invesigated. Then we discuss how such attacks can be avoided. The results show that the sequence generated by a SSPCG has a large period, large linear complexity and is stable against the cryptographic attacks. This gives the reason to consider the SSPSG as suitable for critical cryptographic applications in stream cipher encryption algorithms.

Keywords: Cryptoanalys, FCSRs, Encryption Algorithm, Stream Cipher, Self-Shrinking? p-adic Cryptographic Generator.

ACM Classification Keywords: G.3 Probability and Statistics: Random Number Generation; E.3 Data Encryption; F.2.2 Nonnumerical Algorithms and Problems: Computations on discrete structures

Link:

IMPROVED CRYPTOANALYSIS OF THE SELF-SHRINKING P-ADIC CRYPTOGRAPHIC GENERATOR

Borislav Stoyanov

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p18.pdf

ADAPTIVE SOA INFRASTRUCTURE BASED ON VARIABILITY MANAGEMENT
By: Peter Graubmann, Mikhail Roshchin  (2050 reads)
Rating: (1.00/10)

Abstract: In order to exploit the adaptability of a SOA infrastructure, it becomes necessary to provide platform mechanisms that support a mapping of the variability in the applications to the variability provided by the infrastructure. The approach focuses on the configuration of the needed infrastructure mechanisms including support for the derivation of the infrastructure variability model.

Keywords: Service-oriented Architecture, Adaptability, Variability Model, Distributed Systems.

ACM Classification Keywords: C.2.4 Distributed Systems

Link:

ADAPTIVE SOA INFRASTRUCTURE BASED ON VARIABILITY MANAGEMENT

Peter Graubmann, Mikhail Roshchin

http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p10.pdf

[prev]  Page: 49/66  [next]
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66 
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.25 secs ]   [ Memory usage: 7.55MB ]   [ GZIP Disabled ]   [ Server load: 0.35 ]