Комп'ютерні науки та інженерія (CSE-2009 ). – 2009 р.
Permanent URI for this collectionhttps://ena.lpnu.ua/handle/ntb/3293
У збірнику опубліковано матеріали конференції, присвяченої проблемам у галузі комп'ютерних наук та інженерії, інформаційних технологій, прикладної математики, комп'ютерної лінгвістики, радіоелектроніки, інформаційно-вимірбвальних технологій та метрології. Видання призначено для науковців, аспірантів, студентів.
Комп'ютерні науки та інженерія : матеріали ІІІ Міжнародної конференції молодих вчених CSE–2009, 14–16 травня 2009 року, Україна, Львів / Міністерство освіти і науки України, Національний університет "Львівська політехніка". – Львів : Видавництво Національного університету «Львівська політехніка», 2009. – 358 с. : іл. – ( Міжнародний молодіжний фестиваль науки «Litteris et Artibus»). – Титульний аркуш та текст паралельно англійською.
Browse
Item Anti-Forensic Tool Using Double Encryption Scheme(Видавництво Національного університету «Львівська політехніка», 2009) Singh, Avtar; Singh, KuldipIn this paper we are implementing an Anti- Forensic tool that is used in data hiding approaches of the Anti-Forensic technology. This tool will encrypt a secret file twice: firstly it is encrypted with the XOR and then by the powerful AES (Advance Encryption Standard). To make XOR strong we have used three files that are selected by user. These files will create a mess with the plain text before encryption making the cipher text more secure and harder to break.Item Assistive communication device for individuals with paralysis(Видавництво Національного університету «Львівська політехніка», 2009) Gupta, Akshima; Aggarwal, Ankita; Krishnan, MeethaPatients suffering from diseases like paralysis, ALS are very dependant upon attendants, even for the simplest of everyday acts. However, suitable assistive texnology can give suh individuals improved independence. The present project is very unique collection in the field of Component based assistive technology and systems. This system provides a possible new solution for a human-computer interaction system that can be used for highly disabled people. Such patients are not able to move their limb unable to speak; henceforth we have fabricated a system such that patient can communicate with the outside worl with the help of eye blinkto fulfill their basic needs. The patient can liste and understand everything. Therefore we can teach him directions for using the system. After learning the directions, he can convery a message in the form of eye flickering. The flickering of eye gives a signal to the sensor while the open eye gives no signal and for every signal there is a message at the computer screen. Whilst such a system does not represent the best interactive approach for all users in all situations, it does represent an important and useful option for individuals with movement restrictions.Item Computer systems software support for foreign languages teaching(Видавництво Національного університету «Львівська політехніка», 2009) Kis, Yaroslav; Sloboda, KaterynaIn this article the peculiarities of foreign languages teaching computer systems software are considered. The main types of programs are distinguished The tasks of such kinds of programs are analyzed The main objectives of these programs are pointed out.Item Effort estimation for aspect oriented software development based on use case model(Видавництво Національного університету «Львівська політехніка», 2009) Manojkumar, Archana; Jayanthi, JayanthiEffort Estimation of any project has to be done systematically in the early stages of software development Reliable estimates form the basis of the cost- benefit analysis and resource planning and so effort estimation is a very important task. Estimation largely depends on the software development process. Size or function points are been used for estimation of conventional software development, whereas use case model prove to be useful for Object-oriented or Aspect Oriented software development Aspect Oriented Software Development (AOSD) is an emerging and systematic approach of software development, to achieve better modularity and scalability. Use case models are largely used in all the phases of AOSD from requirement mapping to testing. Use case model help in the seamless transition from one phase to another and are very efficient for iterative development Moreover a use case model captures the complete scope of the project and maps all the requirements of the stakeholders and so has been used extensively to obtain estimates. In this paper, we have analyzed the complexity of use cases based on their types and relationships and proposed a method to produce reliable estimates.Item Evaluation of lower natural frequencies of axisymmetric vibrations of laminate circular plates clamped on the boundary(Видавництво Національного університету «Львівська політехніка», 2009) Katunin, AndrzejThe new mathematical approach to the treatment of positron annihilation lifetime data in humidity-sensitive MgAlO ceramics are proposed. It is shown that watersorption processes in these ceramics leads to increase in positron trapping rates of extended defects located near intergranual boundaries. The fixation of direct positron lifetime components allows refining the most significant changes in positron trapping rate.Item Features of the Crystal and Electronic Structures of the Zr1-xYxNiSn Semiconductor(Видавництво Національного університету «Львівська політехніка», 2009) Krayovskyy, Roman; Romaka, Vitaly; Bovgyra, OlegCrystal and electronic structures of the heavy, Y impurity, dopez ZrNiSn intermetallic semiconductor (Na=3,8*10/4,8*10cm)were investigated. It is rotined that alloing of n- ZrNiSn is accompaid arrangement of crystalline structure, the atoms of admixture occupy positions of atoms of Zr only, generating the defects of occeptor-type nature. Set area of existence of solid solution of Zr1-xYxNiSn, dependence, between the concentration of solid solution and direction and speed of drift of lever to Fermi, by the transition of conductivity dielectric-metal.Item Forms of Knowledge Representation in Enterprise Information Technologies(Видавництво Національного університету «Львівська політехніка», 2009) Dovgan, SvitlanaIn today's conditions of data saturation and economical globalization, decision making occurs in organizations more frequently. Effective actions rely on decisions that are both informed and knowledgeable. To remain competitive, organizations must effectively create, locate, capture, and share their knowledge and expertise. This requires application of new information technology — knowledge management.Item Hardware bitstream sequence recognizer(Видавництво Національного університету «Львівська політехніка», 2009) Karpin, Oleksandr; Sokil, VolodymyrThis paper describes how to implement in hardware a bistream sequence recognizer using the PSoC Pseudo Random Sequence Generator (PRS) User Module. The PRS can be used in digital communication systems with the serial data interface for automatic preamble detection and extraction, control words selection, etc.Item Inducing and Evaluating Rule-Based Classification Models from Data(Видавництво Національного університету «Львівська політехніка», 2009) Zavaliy, TarasThe psychological testing results, which were analyzed by the author, are used for decision-making about admitting the power engineering specialists to work. The author describes the rough sets approach and its application for mining rules from data tables. These rules form a classification models that are used to classify new examples. The role of hitting fraction in model induction is considered Success rate and ROC curves are used for model evaluation. All of the analysis mis done with free Rosetta software.Item Investigation of Date Transmission Rate Dependence in Wi-Fi Network(Видавництво Національного університету «Львівська політехніка», 2009) Gumenyuk, BogdanThis paper shows the influence of different factors on wireless network productivityItem Linguistic analysis of the human language memory: syntactic aspect(Видавництво Національного університету «Львівська політехніка», 2009) Zazulyak, Ulyana; Karamysheva, IrynaThe presented article highlights some aspects of the language memory organization, dealing with the syntactic memory. The issues of deep syntax analysis, being topical for psycholinguistics, are exemplified with the help of syntactic- paradigmatic modelItem Localization in Wireless Sensor Networks by learning movement pattern using Hidden Markov Model(Видавництво Національного університету «Львівська політехніка», 2009) Kavitha, B.; Arthi, R.; Murugan, K.The Sensor Network Localization problem deals with the estimating the geographical location of all nodes in Wireless Sensor Network (WSN),focusing that sensors to be equipped with GPS, but it is often too expensive to include GPS receiver in all sensor nodes. In the proposed localization method, sensor networks with non-GPS nodes derive their location from limited number of GPS nodes. The nodes are capable of measuring received signal strength (RSSI) and\or are able to do coarse (sectoring) or fine signal angle of arrival (AoA) measurements. Existing algorithms exploit the aspects of such sensory data to provide either better localization accurary or higher localization coverage. However, there is a need for a framework that could benefit from the interactions of nodes with mixed types of sensors, in certain applications RSSI measurements of single sensory capacity sensor nodes are most appropriate for better localization. Most of the sensor nodes has unique movement profile, which is possible to learn and used to predict location. In the proposed work, localization is achived by Bayes Particle Filter method and Hidden Markov Model (HMM). From the results Learning movement patterns HMM gives faster predictionand improved error estimates.Item Logical models and strategies in management of active systems(Видавництво Національного університету «Львівська політехніка», 2009) Mounir, Gabsi; Sikora, L. SIntellectual agents have steadily matured in moving from the research laboratory to industrial application over the last ten years. Numerous systems have been deployed or are under advanced development with strong industrial support. These systems suggest important lessons for both industry and researchers. From an industrial perspective, these examples reflect trends in both business and technology that make agents an increasingly attractive commercial tool From a research perspective, these examples identify important gaps in intellectual agent that merit the attention of academicians. In this paper we will see strategies models witch are realised by intellectual agent into the Automatic Control System of Technological Process (ACS-TP) of agency travel example.Item New mathematical approach to the treatment of positron annihilhumidity lifetime data for humidity-sensitive ceramics(Видавництво Національного університету «Львівська політехніка», 2009) Klym, Halyna; Ingram, Adam; Shpotyuk, OlehA mathematical model is considered as a problem of Steafan for equation of heat conductivity. The decision of problem is found in spase of gridding functions of the Rote method and by a report to nonlinear intgral equation of Gammershteyn type with a basis of Grina's functions. Basic parameter of control of the temperature distributing are conducted.Item Recognition of People by Photographs(Видавництво Національного університету «Львівська політехніка», 2009) Kazimov, Tofig Hasanaga; Mahmudova, Shafagat Jabrail qiziThe technique of the person search in base of images on its photograph is considered. On the basis of the chosen identification points of the face, distances between them are calculated Identification attributes of the face are defined on specially chosen way which differs from earlier available attributes.Item Remote Кeyless Еntry System with Floating Code(Видавництво Національного університету «Львівська політехніка», 2009) Karpin, Oleksandr; Miyushkovych, Eugene; Sokil, VolodymyrThis paper presents an example of a remote keyless entry system. This system is based on a strong cryptography authentication method and uses a bidirectional Cypress WirelessUSB link. It can be used as the base for a complete car alarm or a secure remote keyless entry system (door opener, access control, etc).Item Software fault tolerance(Видавництво Національного університету «Львівська політехніка», 2009) Kazinov, Tofik Hasanaga; Mostafa, Jalilian ShahrukhBecause of our present inability to produce errorfree software, software fault tolerance is and will contiune to be an important consideration in software system. The root cause of software design errors in the complexity of the systems. This paper surveys various software fault tolerance techniquest and methodologies. They are two gpoups: Single version and Multi version software fault tolerance techniques. It is expected that software fault tolerance research will benefit from this research by enabling greater predictability of the dependability of software.Item Some considerations on a Monte-Carlo method for evaluating measurement uncertainty(Видавництво Національного університету «Львівська політехніка», 2009) Novicov, VolodymyrUncertainty calculation task is discussed in the paper. Monte-Carlo method for uncertainty evaluation is covered. It is used for uncertainty evaluation of a proposed measuremered scenario. In order to validate the Monte-Carlo method, long-ran success rate estimation procedure is presented. Application of such procedure showed unexpected invalid results of uncertainty evaluation. A modification of the Monte-Carlo method is proposed that appears to deliver more valid results.Item The notion of epitaph in epigraphy and linguistics(Видавництво Національного університету «Львівська політехніка», 2009) Prystay, NataliyaEpitaph as a specific discourse type is being studied. Typology of epigraphic inscriptions and classification of epitaphs are being suggested.Item Time series analysis and forecasting intellectual methods using in epidemiology supervision system(Видавництво Національного університету «Львівська політехніка», 2009) Olga, Radivonenko; Tetiana, KorchakIn this paper the problem of time series analysis is considered. The importance of a collaborative approach to the prevention and control of enteric infection are highlighted. Time series forecasting methods are described. Basic methods of statistical, regression and fractal analysis are used. Also the problem of epidemic thresholds modeling was considered. The implementation of the fuzzy clustering procedure in the method of epidemic thresholds calculation was proposed. This feature allows exclude epidemic information from the calculation data which will improve trueness and certainty of results substantially.