No abstract available.
John Vincent Atanasoff: the inventor of the first electronic digital computing
This paper describes the main points of biography of John Vincent Atanasoff and inventing of the first digital computer. The emphasis was made on the significance of his new approach to the using of digital devices for massive computations. The basic ...
Virtual learning environments: towards new generation
The classification of the virtual education environments (VLE) is based on the functional characteristics, inhererit (or not) of the respective environment. In their evolution history there are three distinctive generations of VLEs. Numerous are the ...
Security design for a new local area network AULWLAN
This paper presents a security scheme for a medium access control protocol in a new wireless local area network AULWAN (Aden University laboratory WLAN). The design objective has been to develop a security scheme that will be scalable for various needs ...
A decomposition procedure for register-transfer level power management
Power dissipation has become one of the most important constraints in the design of integrated circuits. This work describes a decomposition based approach for power reduction using dynamic power management. The problem of low power synthesis ...
Solid state disk architecture on the basis of FRAM
The paper offers an architecture solution of a solid state disk designed on the basis of ferroelectric RAM. The requirements to be met by the storage element forming the storage medium have beer defined. A comparative analysis of the parameters of a ...
Selective stack prefetch method
In this paper is described novel approach for prefetching of stack references. In proposed method the decision which blocks to be prefetched is based on the context of current procedure. The results clearly point that we can effectively prefetch the ...
Automatic GPS-based vehicle tracking and localization information system
The convergence of GPS technologies, wireless communications, and Internet is seen as the key to the GPS consumer market. The proposed vehicle tracking and localization system allows: remote and mobile control and vehicle monitoring (position and ...
Monitoring of the change of the level of liquids and loose materials in reservoirs
An approach for receiving data and processing information about the level of filling tanks with liquids and loose materials is presented in the paper. This information may be used in different technological processes. The developed electronic scheme ...
Microprocessor control of uninterruptible power supplies for responsible loads
There is presented a microprocessor-controlled uninterruptible power system /UPS/, devoted for responsible consumers such as computer, communications and some special systems, working in online regime. They are achieved high technical performances: high ...
Microprocessor system for analysis, diagnostics and supervision of non stationary work regimes of batteries including in UPS
It is presented a microprccessor system for determining in on line regime the capacity and the reserve time of the accumulator batteries, working in UPS under non stationary loads. The reliability and effectiveness of the whole system is depending on ...
Complementary code keying with PIC based microcontrollers for the wireless radio communications
The IEEE 802.11b is a Direct Sequence Spread Spectrum (DSSS) system very similar in concept to the CDMA Wireless, using a spread spectrum chip sequence. In the 802.11b the transmission medium is wireless and the operating frequency band is 2.4GHz, ...
Using the MSSP module of PIC16F87X microcontroller in master mode for I2C communications
The paper considers the utilizing of the master synchronous serial port (MSSP) module of the microcontrollers of the PIC16F87X Microchip family in master mode for I2C communications. An algorithm for processing the status of the transfer is presented.
A modal logic based approach to schema integration
In this paper, we use standard modal logic as a formal framework for modelling and analyzing of schemata. A main problem considered is how to combine two schemata into an integrated schema that has the same information capacity as the original ones. To ...
Protecting information by means of the remainders theorem
In the present paper, the protection of information when using the remainders theorem as a means of cryptographic protection is analyzed. A classification of the attempt for illegal decryption is offered. Various types of decryptive attacks are ...
An approach to usability assurance
This work presents a systematic approach to the Usability Assurance Problems. The current standard for software ergonomics is presented and the corresponding methodology for its application is described. The author's ideas how to accomplish a systematic ...
Process modelling using Petri nets
This paper discusses the reasons, which impose Petri nets as a conceptual standard for modelling and analysis of workflow. Petri nets notation is used for representation of the main routing constructs as weft as for the workflow process description. The ...
The expert approach: a case study
This article presents an experiment under the EC IST 34488 eXPERT project in Rila Solutions (a Bulgarian software company). The approach is a systematic combination of Extreme Programming (XP) and Personal Software Process (PSP). The Rila Solutions ...
Application of software data dependency detection algorithm in superscalar computer architecture
This paper treats the problem of detection of data hazards in superscalar execution. The algorithm of independent instruction detection is represented. It can be used in out-of-order execution logic and code optimised algorithms. The algorithm uses the ...
Data warehouse architecture on the base of dimensional modelling
The present talk deals with the data warehouse architecture. Dimensional modelling, "star" and "snowflake" schemes are defined. The advantages of the dimensional model are described. A comparison between dimensional and entity relation modelling is ...
Resolving non-determinism in NFA
The paper describes the authors" experience in simulating nondeterministic finite state automata (NFA) using concurrent programming. The non-determinism is resolved simultaneously by activating a separate thread for all possible transition paths. The ...
An approach for texture SDI visualization
In this paper we propose an algorithm for generating synthetic texture with desired appearance and size. Also, we propose a proper visualization process for using the received texture to obtain a realistic appearance of 3D surfaces which can by applied ...
Monitoring MPLS VPNs
Multi-Protocol Label Switching (MPLS) VPN monitoring becomes more and more important with the fast growth of the usage of this technology. The paper describes the main approaches for effective monitoring ef MPLS VPNs and their characteristics.
Object-oriented scientific visualization
In this paper C++ classes for function visualization in MFC Windows program are described. Classes are developed in Microsoft C++ Visual Using these classes 3D polygonal approximation of function can be rendered as color map using Windows GDI or as ...
Functional testing of object-oriented software
The goal of functional testing is to prove that the software performs in conformance with its specification. Functional testing emphasizes the behavioral characteristics of objects by focusing on the interface that is the public, and defining, feature ...
An approach for design of the object-oriented databases with restricted natural language access
The paper proposes a three-dimensional matrix model for representation of entities, attributes, relationships and attribute values of databases in order to access them through menus with predefined fields when posing queries.It is discussed that the ...
Index structure for the fact table of a star-join schema and template query processing
Star-join is a database scheme designed for the purpose of data warehousing. A typical query on a star-join scheme as well as an algorithm for its processing has been examined. An index structure for the star-join fact table has been proposed with the ...
Rapid application development (RAD) and deployment using Oracle
This paper is designed to provide with a high-level overview of the features and benefits available through Oracle9i Forms Developer, a component of Oracle9i Developer Suite (Oracle9iDS), and an overview of some of the key points of the Oracle9iAS Forms ...
An implementation of a multimedia object-oriented database management system
The object-oriented paradigm represents one of the most successful paradigms in many areas of computer science. It has gained wide acceptance as a unifying paradigm for the design of database systems, programming languages, and artificial intelligence ...
Representation of structures with multiple inheritence in relational databases
In relational databases it is often required to represent hierarchical structures with multiple inheritance. The choice of store method for this kind of structures is very important for fast retrieving of infromation. On the basis of storing information ...
Bottom-up method for processing recursive sets of rules
The paper proposes a semi-naive method for processing recursive loops in the dependency graph for a given query. The process goes through two phases. During the expand phase answers are generated using translation to base conjunctions. Entries in ...
Cited By
-
Ahmed N, da Silva F, Buller G, Lamb R and Laurenzis M (2024). Multitarget detection and tracking with continuous capture microwave imaging Emerging Imaging and Sensing Technologies for Security and Defence IX, 10.1117/12.3031542, 9781510681163, (13)
-
Burov V, Myakinkov A, Ryndyk A, Mikhailov A, Balashova D and Horng S (2022). The algorithm of elimination of the ambiguity of radial velocity measurements for the automotive radar International Workshop on Automation, Control, and Communication Engineering (IWACCE 2022), 10.1117/12.2661332, 9781510660915, (37)
Index Terms
- Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
CompSysTech '20 | 72 | 46 | 64% |
CompSysTech '17 | 107 | 42 | 39% |
CompSysTech '16 | 117 | 55 | 47% |
CompSysTech '14 | 107 | 56 | 52% |
CompSysTech '13 | 89 | 42 | 47% |
Overall | 492 | 241 | 49% |