ipsi – 2005 carcassonne · web viewsveti stefan, september 24 - october 1, 2005 general chairman:...

92
IPSI – 2005 MONTENEGRO Sveti Stefan, September 24 - October 1, 2005 General Chairman: Veljko Milutinovic, Fellow of the IEEE, University of Belgrade Serbia and Montenegro Opening Keynote Speakers: Erich Neuhold, Fraunhofer Institut IPSI Germany Borko Furht, Florida Atlantic University USA Welcome Addresses: Veljko Milutinovic, Fellow of the IEEE, University of Belgrade Serbia and Montenegro IPSI-2005 MONTENEGRO September 24 – October 1, 2005

Upload: dokiet

Post on 28-Jul-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

IPSI – 2005 MONTENEGROSveti Stefan, September 24 - October 1,

2005

General Chairman:Veljko Milutinovic, Fellow of the IEEE, University of BelgradeSerbia and Montenegro

Opening Keynote Speakers:Erich Neuhold, Fraunhofer Institut IPSIGermany

Borko Furht, Florida Atlantic UniversityUSA

Welcome Addresses:Veljko Milutinovic, Fellow of the IEEE, University of BelgradeSerbia and Montenegro

Organiser:IPSI Belgrade, Serbia, Serbia and Montenegro (www.internetconferences.net)

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

ISBN: 86-7466-117-3

© 2005IPSI BelgradeAcademic MindSep-Oct 2005http://www.internetconferences.net E-mail: [email protected] Message from the Chairman

The field of e-business, e-education, and e-science in general is fast growing, and up to now it has been noticed that there is a large body of unpublished knowledge that needs an appropriate forum for its presentation. This was the main rationale behind the idea to organize the

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

2

IPSI international conference series. All IPSI conferences are organized in accordance with the latest recommendations of the world’s major research sponsoring agencies related to Multidisciplinary, Interdisciplinary, and Transdisciplinary research. A sign of appreciation goes also to all the people who worked hard for making this conference a success.

Conference Manager: Marija Miletic

Technical support: Olivera Gajcanski, Senad Omerovic, Nenad Korolija, Miroslav Radakovic, Aleksandar Stanic, Darko Jovic, Zoran Babovic, Aleksa Prijic

Design support: Miletic Marija, Mladen Dodig

Review support: Jindrich Kaluza, Biren Shah, Vaclav Snasel, Paul E. McKenney, Barbara Starfield, Kent Beck, Tony Bates, Charles Perrings, Aat Barendregt, Stephen Brewster, Chris Johnson, Steve Boot- Butterfield, Leila T., Chun Mark, Andrea Goldstein, Hulya Ulku, Jane Dimmitt Champion, Mary Dunn, Dennis Peters, Asghar Bokhari, Qing Xie, Tomas Brandejsky, Bernhard Westfechtel, Jaap de Wilde, Kyle Grayson, Gunhild H., Jack A. Goldstone, Walker Stuart, Albert F. Puttlitz, Dennis R. Olsen, Chin C. Lee, Harold Ackler, Bill Christie, Peter Bloomfield, Hung-gay Fung, Paul E. McKenney, Kent Beck, Rajeev Raje, Elena Lopez, Ted Coladarci, Tremblay Dianne-Gabrielle, John J. Ritsko, Grainne Conole, Eric L. Lesser, Christian Vandenberghe, Jiawei Han, Benjamin Fung, Haofeng Zhou, Mary Grant, Dan Dewey, Jerry Grossman, Tamas Vicsek, Michael L. Littman, John Tsitsiklis, Christine Fernandez, Sebastiano Porretta, Michael Kaib, Shad Roundy, Robyn Silbey, Susan H. Picker, Ehud Kalai, Ariel Rubinstein, Ulrike Malmendier, Martijn Cremers, Christopher F. Baum, Dina Mayzlin, Graeme Gooday, Jade Clement, Massimiano Bucchi, Mary Virginia Orna

Welcome to the IPSI-2005 MONTENEGRO conference! We hope you will all enjoy the event as much as we have enjoyed in contributing to its preparation.

Veljko Milutinovic, Program Chairman

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

3

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

4

IPSI-2005 MONTENEGRO

VIP Forum AbstractsTalented Students Forum Abstracts

IPSI Award AbstractsAuthors

Schedule

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

5

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

6

VIP Forum Abstracts

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

7

Political System’s Evaluation Using Markov Model with Sustainability and Safety Reverse ProcessesAlain LepageUniversity of Technology of Compiegne, France

Which evaluation model could measure the political conditions, as a real state describing the immediate future, combine effect of a sustainable advanced process and a safety reverse one? The research is based on the assumption that the global evaluation of a political project follows the model which we validated largely on complex systems like energy production site and customer services for measuring, respectively, availability and global satisfaction. Indeed, the Markov model, as presented with our laboratory’s validation from many applications in companies, allows us to have a precise calculation of the state of availability (or global satisfaction) as the effect of two cross reverse processes easily measured: failure development (punctual dissatisfaction) and repairing team performance (service improvement quality team). In extension, a validation frame of political system efficiency measurement is proposed.

The Environmental Theory of MentalitySkopin A.J.

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

8

State University-Higher School of Economics, Moscow, Russia

Studying of mentality as way of the thinking including emotional, strong-willed and rational components, it is represented to one of the major directions of interdisciplinary researches. I offer the universal theory of mentality developed from positions of Environmental Sciences. I think that mentality of the person is set by features of an environment, namely - a combination of a natural, social and technical environment of the person. For successful interaction with the nature, the emotional component of mentality is necessary, for successful interaction with other persons - a strong-willed component, and for successful interaction with technics – a rational component. In thinking of the person of a primitive society emotional making prevails (Africa), in thinking of the agrarian person strong-willed prevails (Asia), in thinking of the industrial person rationalism prevails (Europe). The combination of emotional, strong-willed and rational component allows to classify forms of intellectual activity, to distinguish male and female mentality, to predict interaction of the countries by means of Skopin's triangle. In the report the scheme of a triangle of Scopin and numerous of public phenomena with its help is shown.

Bitmap Indexing of XML DataB.M. Alom (1), A.S.M. Hoque (1), Saiful Islam (2)1. CSE dept. DUET, Gazipur, Bangladesh2. Nanyang Technological University, Bangladesh

Indexing schemes for semi structured data have been developed in recent years to optimize path query processing by summarizing path information. Existing methods in three-dimensional bitmap indexing of XML data require large space. At the same time, querying of large XML documents database is difficult. To overcome these limitations, we have developed an indexing scheme of XML data using a two-dimensional Bitmap, providing the facility to store element-path, token and documents in a two dimensional matrix. This system contains two dictionaries; one is element-path dictionary having all the distinct element paths for all XML documents and another token dictionary containing token values for the distinct words. This indexing scheme creates a token-path-document matrix; showing the existence of XML data in specific document and in appropriate path. In this paper we present how XML data, its path and document can be stored in a two dimensional bitmap and describe its performance over three dimension.

Keywords: Token-path-document matrix, element-path, token dictionary, element-path dictionary

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

9

The Chemical and Educational Achievements of Henry E. Armstrong (1848 -1937)Bill PalmerCharles Darwin University, Darwin, Australia

This study concerns the life of a British organic chemist, Henry Edward Armstrong (1848 -1937) and his influence on science and science education. His influence on chemistry was limited and he tends to be better known for his opposition to Arrhenius’ theories of ionisation than for his substantial work on chemical change and his research on naphthalene and camphor. His influence on science education in the United Kingdom during his life time was pervasive and influenced subsequent generations of students through the emphasis on practical work (heuristic method) in the physical sciences. Personally, he was a good family man, was generally well liked by his students, but was ruthless in ridiculing those who disagreed with him and today would have been shunned for his views on women’s education.

Linux File Systems Comparison: ext3 vs. JFSB. Djordevic, S. Miskovic, N. Macek, S. StrbacVisa Elektotehnicka Skola, Belgrade, Serbia and Montenegro

This paper concentrates on the Linux ext3 and JFS filesystem performance comparison problem. Main goal this paper should achieve is analysis of performance impact due to a different journaling approach, implemented in 32 bit ext3 filesystem as default Linux filesystem related to 64 bit filesystem, originally developed by IBM, now released as open source. The performance is measured using Postmark benchmark software, which emulates Internet mail server with environment defined by the authors.

Keywords: Linux filesystem, ext3 FS, JFS, journaling, performance evaluation.

Challenges and Prospects of Women Education in Africa and the Introduction of e - EducationBrenda AnugwomInternational Law Institute- African Development Law Centre, Nigeria

This paper will highlight the contribution of education to the lives of women in Africa and the need to encourage e-education as a means of

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

10

building capacity and fostering development in developing countries of Africa. Factors like poverty and other international structural policies which force these countries to ignore schooling, educational and training opportunities for the girl child and women in general will be analyzed in detail to show the extent to which they affect development. Research and concrete calculations show that educating females yields far-reaching benefits for girls and women themselves, their families and the societies in which they reside. Once all the benefits are recognized, investment in the education of girls may well be the highest return investment available for these countries.

What then can we say is education? Can we say it is phenomenon or just a mere concept? David Bowen sees it as unique opportunities offered through NGOs especially those that reflect local activism, empowerment strategies and local knowledge and suggest that by using “modest sums of money to facilitate community development meetings and promote self-examination” external NGOs can have a positive influence in development. Clarens sees it as a form of social marketing. Once one is educated, he is marketable both in his society and overseas. However, priority exists in education at all levels, most apparently in tertiary education in both country and oversea study. There seems to be a systematic discrimination with regard to quality education for women.

In Africa, it is usual to have women experience increasing submission to their husbands and a decline in their autonomy and independence. Thus women continue to be disadvantaged and discriminated against at various levels – educational, social and otherwise. Foundations for women’s education that were laid down in the 1950s and ‘60s were going to produce a platform for gender equity in education though gendered experiences in the educational process are still shaped by a configuration of state policies, social institutions and cultural as well as traditional socio-economic systems. Nevertheless the overall quality of education offered to date disadvantages girls, even though enrollment parity with male counterparts have been achieved in certain regions in Sub-Saharan Africa. Factors which encourage this trend include low investment in education, stagnating economies which is reflected in shortage of books, outdated resources and “brain drain.” In certain cultures, it is unacceptable for the girl child to attend schools which are considered to be for the males and the females are prepared by their mothers for early marriages.

Learning simply requires acquiring knowledge or developing the ability to perform new behaviors. E – Learning in effect would mean acquiring same through electronic means usually through the internet. This has in recent times proven to be the fastest and cheapest means of formal education because it affords one the opportunity to be in different parts of the world at the same time and gathering views the of people from all walks of life. E – Education is therefore necessary for both economic and social development. Developing countries in Sub-Saharan Africa are yet

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

11

to adopt this means of education due to high level of poverty and unavailability of the equipment necessary to run this type of program. About 46% of the estimated 157, 212,650 women between the ages of 25 – 64 in Africa have primary education but less than half have tertiary education relevant to gain employment and earn a living. This explains the reason for high level of poverty in the societies, dependence on the men and constant discrimination and disregard of the women. E-education would be an almost impossible venture where less than half of the workforce population is illiterate and economies dwindling day after day due to high level of poverty and armed conflict. The International Bank for Reconstruction and Development defined a basic learning package needed for women in developing countries especially from Africa to include functional literacy, some choice of relevant vocational skills amongst others. These women do not have equal access to education and training programs like the men, however, especially in skills necessary to a nation-building economy. These developing countries in recent times seems to have channeled their resources to meeting up with Western pressures of globalization with a view to enriching the ruling class therebyneglecting the pressing needs of building capacity. How can either E-education or E-business thrive in such societies? How can the women catch up with the fast moving winds of time? Is the West going to put their feet down to that such opportunities get to these poor countries instead of concentrating on other trivial issues? These questions have however remained unanswered overtime with the leaders of the developing countries contributing to the non-development of the economies themselves by adhering to corrupt practices, sectionalism, indiscipline and greed. What do we seek? A system which eliminates the discrimination and disregard still suffered by girls and women alike in the current systems in these developing countries of Africa and one that creates parity at all levels without regard to the social partnership between men and women.

FACTORS AFFECTING THE EDUCATION OF WOMEN IN AFRICA- Socio-cultural factors- Poverty- Conflicts- International Pressure- Religious inclination

These factors will embrace the single-sex schooling and its effects on adolescents, particularly in traditional cultures that question the value of education for the subsequent roles and behaviors of females, explanation for lower female participation rates and decline in participation at the secondary level. The issue of how the status of women is affected worldwide by such developmental efforts as higher education, urbanization, industrialization and modern agricultural schemes has been the subject of a lively debate since the identification of the role of women in economic development. The main paper will deal extensively with these factors and more to further portray the true picture of the state of

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

12

education in Africa where women are still 2nd class citizens and the measure on course to create parity with the men.

Performance Evaluation of Optimal Interconnection-based Routing Algorithms in Multi-operator Telecommunication NetworkChatkwan Wannasiri, Chaodit AswakulTelecommunication System Research Laboratory, Department of Electrical Engineering, Faculty of Engineering Chulalongkorn University, Bangkok, Thailand

This paper is concerned with the analysis of optimal routing problem in the heterogeneous environment of telecommunication networks, where more than one operator is responsible for all the network controls. The objective is to evaluate candidate routing algorithms which allow a given network to optimize specified objective functions. Based on the framework of interconnection, four routing algorithms are proposed, namely, (i) shortest path routing with no interconnection charge, (ii) cost-based shortest path routing with interconnection charge, (iii) resource-based shortest path routing with interconnection charge and (iv) dynamic alternative routing with interconnection charge. Discrete-event simulation of practical network scenarios are given to show how these routing algorithms perform comparatively in terms of both engineering grade-of service indicators and business measures (i.e. call blocking, network utilization as well as mean values of servicing cost, network revenue and obtainable profit). The obtained results suggest that the dynamic alternative routing with interconnection charge is the most preferable routing algorithm when the network has light loads. Alternatively, under heavy loads, it is found that the resource-based shortest path routing with interconnection charge is the best.

Knowledge vs. IntelligenceSteven M. Halladay, Charles A. MilliganPresident, Creative C Corp, Storage Technology Corporation, USA

Current knowledge representations focus on building systems that are based on sets of rules and on ontology. The intent is to enable one to incorporate computational models that people can understand and engineer. However, ability to formulate a knowledge representation even when that representation is augmented with a rich set of both relationship type and quantity does not imply the ability to drive a decision process to conclusion. This paper introduces a new discipline entitled intelligence simulation. Simulated intelligence differs from knowledge representation in that simulated intelligence relaxes the requirements of human understanding while maintaining the capability for human interaction. The emphasis is on computational capability and localizing ontology via relationship maps. Thus, instead of an engineering functionality, intelligence simulation principles emphasize Network

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

13

Science connectivity of basic information blocks for processing pathways through knowledge maps.

Networkcentric Healthcare: The Entry Point into the Network Dag von Lubitz (1), Nilmini Wickramasinghe (2)1. HH & GA Dow Coll. Of Health Professions -Central Michigan University, USA2. Stuart Graduate School of Business, Illinois Institute of Technology, USA

The concept of “e-health” gains rapid and widespread international acceptance as the most practical means of reducing burgeoning healthcare costs, improving healthcare delivery, and reducing medical errors. However, due to profit- maximizing forces controlling healthcare, the majority of e-based systems are characterized by non-existent or marginal compatibility leading to “platformcentricity” i.e., a large number of individual information platforms incapable of integrated, collaborative functions. While such systems provide excellent service within limited range healthcare operations (such as hospital groups, insurance companies, or local healthcare delivery services), chaos exists at the level of nation-wide or international activities. As a result, despite intense efforts, introduction of “e-health doctrine” has minimal impact on reduction of healthcare costs. Based on their previous work, the authors present the doctrine of “networkcentric healthcare operations” that assures unimpeded flow and dissemination of fully compatible, high quality, and operation-relevant healthcare information and knowledge within the Worldwide Healthcare Information Grid (WHIG). In similarity to networkcentric concepts developed and used by the armed forces of several nations, practical implementation of WHIG, consisting of interconnected entry portals, nodes, and telecommunication infrastructure, will result in enhanced administrative efficiency, better resource allocation, higher responsiveness to healthcare crises, and – most importantly – improved delivery of healthcare services worldwide

Keywords: e-health, e-portal, web design, healthcare, healthcare management, healthcare operations, healthcare doctrine, healthcare policy, global healthcare, networkcentric healthcare, networkcentric operations, healthcare technology, ICT, Boyd, OODA Loop, germane knowledge, information asymmetry, information integrity

New Approach to Data Warehouse DevelopmentDarko Krulj(1), Milutin Cupic(2), Milan Martic(2), Milija Suknovic(2), Boris Delibasic(2)1. Trizon Group, Belgrade, Serbia and Montenegro2. Faculty of Organizational Science, University of Belgrade, Serbia and Montenegro

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

14

In the last decade data warehouses have become the basis for business decision making support. This paper will present our framework for the development of data warehouse systems through developed applications: DW modeler and DW explorer. We present advantages and disadvantages of this approach in relation to the other frameworks for development of data warehouse systems. The basic characteristic of our approach is that it is based on XML META data. We have also implemented significant changes in dimensional model based upon flexible dimensional hierarchies which enables us to use special methods for creating aggregations and important advantages in data visualization. In our framework we use intelligent creation concept for aggregates based on observation of history of user queries.

Keywords: Data Warehouse, XML Meta Data, Dimensional Modeling.

UNIX, Linux, and the Software CopyrightDennis S. KarjalaArizona State University, USA

Copyright protection for computer programs, including operating software, has been with us for some 25 years. While the basic scope of such protection is now fairly clear, ongoing litigation between SCO Group and IBM Corporation provides a dramatic example of the danger of protecting computer programs under copyright. The problem inheres in the dual nature of software as functional speech. In the case of operating software, network effects reduce the number of efficient competitors and thereby inhibit technological innovation. UNIX is a quintessential example of a technological work that grew, and grew better, by the incremental contributions of thousands, and Linux has followed a similar path. The SCO challenge is not just to IBM’s role in the development of open-source Linux but to Linux itself and the General Public License with which Linux is distributed. This paper considers the distinctions between patent and copyright with a focus on computer software, analyzes the issues in the SCO/IBM litigation, and argues for legal rules that promote rather than stifle competition in platform software.

Memetic Engineering – Authentic Travel International Example Karabeg Dino, Furst Karin, Hagen, Jan Egil Information Design Group, University of Oslo, Norway

Memetic engineering is proposed as a possible answer to both some basic methodological questions regarding MIT research and as a practical method for e-business design. Our Authentic Travel International project is a prototype instance of memetic engineering where e-business plays a key role. Memes are to society and culture as genes are to an ecosystem – units of inheritance and reproduction. Power interests (power structure), now enhanced by globalization, tend to create degenerate memes

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

15

(business practices, values etc. which are harmful for environment, local economies and cultures). This has recently been recognized by sociologists as a new global risk. The purpose behind memetic engineering is to reverse this negative trend by creating beneficial memes which are competitively stronger than the degenerate ones. Analogously to genetic engineering, this approach consists in finding a ‘good’ base meme (in our example authentic travel), and making it resilient and strong by combining suitable elements of various agile auxiliary memes (in our case e-business, franchising and value-based marketing). Memetic engineering is proposed as a way to handle global issues. Since creating powerful memes requires a combination of backgrounds and skills, memetic engineering is inherently ‘MIT’.

Keywords: e-business, interdisciplinary research, research methodology

What is Authentic Travel – An Experiment in Polyscopic Knowledge Representation Furst Karin, Karabeg DinoInformation Design Group, University of Oslo, Norway Authentic travel is an approach to travel and travel business developed and successfully practiced by the first author. Authentic travel has proven to be not only a source of customer satisfaction and a profitable business, but also an instrument par excellence of cultural exchange and empowerment. We take up the task which is common in knowledge representation: Partly tacit, experiential knowledge of an expert is made explicit and communicated in such a way that it can be understood and practiced by others. We apply polyscopy, a general information-design method developed by the second author, to our task. Polyscopy allows for combining results and insights from a variety of disciplines as distinct ways of looking or scopes, and for using them as justification (or ‘proof’) for establishing a more general, high-level result. In the application at hand, the high-level result is the rendition of an expert procedure so that it can be understood and practiced by others. The justification is an inter-disciplinary explanation of why this procedure works, as well as a multiple-perspective survey of its favorable side effects on local economy and culture, cultural exchange and the traveler. Our results illustrate the use and the usefulness of polyscopy in knowledge representation.

Keywords: knowledge representation, e-business, interdisciplinary research

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

16

Project is a Problem Scheduled for SolutionDoug VucevicWoodward Ave, Milton, Ontario, Canada

Around the end of 1980, the Carnegie Mellon Software Engineering Institute's (SEI) created its Software Capability Evaluation (SCE) method which has had a profound influence to the software community. At the same time, SEI has also designed its Process Assessment (PA) as a preparatory stage for SCE. Both programs, SCE and PA, are described in this paper SCE is evaluated on its merits and compared to the other initiatives in software industry. Relation to and basis in software engineering discipline is explored. Software engineering methods used in successful resolution of software problems are presented. Software "production" process is decomposed into its elements: Project Management, Metrics and Estimation, Configuration Management, Requirements, Automation, Testing, Quality Assurance, and Training, and their influence on total software capability process explained. Ensuring both, the right process is used in producing right products, as there in no point in having an efficient (right) process which creates products that nobody needs. Relevant conclusions are extrapolated.The Urban Ecological Entropic Black Hole A Measured Discourse Concerning the Mega-City, within the Context of Both a Contemporary and Future Sustainable World EnvironmentDouglas M. Cotner Brooks College-Long Beach, California; American Institute of Urban and Regional Affairs; Cooperative Graduate School of Sustainable Development; American Intercontinental University, USA

This research concerns what may be termed, Urban Ecological Entropic Black Holes. These are urban settlements, commonly know as Mega Cites. This newest of urban phenomena, represents a clear and present danger global, environmental sustainability. The work contained in this paper stresses the interrelationships between population, biophysical resources, and Bioregionalism, as the rational alternative to the idea of both the Global Economy and the ersatz notion of a Global Village. This research further suggests a new theory, which underpins a new paradigm for Ecological Economics, supported by sound theory and practical tools. This theory is, A Unified Field Theory of Adapted Space, supported by the environmental accounting tool of Ecological Footprint Analysis.

Keywords: Entropic, Black Hole, Mega Cities, Adapted Space, Unified Field Theory, Ecological Footprint Analysis, Global Village, Globalization, Bioregionalism

Professional Competences of Media DesignersDragan Solesa (1), Milan Obric (1), Heli Ruokamo (2)

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

17

1. University in Novi Sad, Teachers' Training Faculty in Sombor, Serbia and Montenegro2. University of Lapland, Faculty of Education, Centre for Media Pedagogy, Finland

Media designer has a main role in a world of modern education. This, relatively, new profession is a result of changes in relations between teaching, studying and learning strategies in network-based education (NBE). This distributed learning, which utilizes educational use of information and communication technologies (ICTs), requests more competency than a teacher in traditional lectures has. Media designer should be aware of educational principles and appropriate technological solutions. This paper defines professional competences of media designer, defines his/her qualifications and discusses some of his/her main responsibilities and tasks. There is a difference between academic and business environment where qualities and skills of media designer are equally needed.

Evidence-based Medicine and InternetDusko SpasovskiThe International Federation of Sports Medicine, Serbia and Montenegro

The interference between two prevailing trends in contemporary medicine- increased diversity of professional challenges on one hand, and rapidly growing amount of medical information of various importances on the other, has promoted new approach to medical knowledge: evidence-based medicine. Internet communication and data presentation, availability and applicability have brought most recent scientific findings to daily medical practice. The paper reviews basic features of evidence-based medicine and its relation to traditional experience-based medicine, defines relation to Internet resources and discusses its present implementation and future potential, and its impact to preservation of human resources and establishment of higher quality standards in medical practice.

Computers and Visual Handicapped PersonsEmir SkejicFakultet Elektrotehnike, Univerzitet u Tuzli, Bosnia and Herzegovina

Monitor and keyboard are the most popular devices for performing the direct communication between people and computers. Blind persons and persons with low vision find a variety of barriers in communication with computers using these traditional devices. However, during the last decade of 20th century, advances in microcomputer technology and

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

18

computer programming have given rise to a new generation of methods for providing computer access. In this article is presented a review of available hardware and software solutions that make easier and/or possible interaction between human and computers for visual handicapped persons.

Keywords: Sensory Impairments, Visual Disabilities, Visual Impairments, Low Vision, Blindness

Emotionality, Experientiality and Sensationality in Network-Based Mobile Education: Looking into the Potential of AffordancesPirkko Hyvonen (1), Miika Lehtonen (1), Heli Ruokamo (1), Seppo Tella (2)1. University of Lapland, Faculty of Education, Centre for Media Pedagogy (CMP), Finland2. University of Helsinki, Faculty of Behavioural Sciences, Research Centre for Foreign Language Education (ReFLEct) & Media Education Centre (ME), Finland

This article aims to analyze the significance of experientiality, emotionality and sensationality in network-based mobile education (NBME). It also looks closely into these concepts as potential affordances in the teaching–studying–learning (TSL) processes. In our previous article (Lehtonen, Hyvonen & Ruokamo, to appear), we demonstrated, on the basis of a theoretical analysis and empirical data, that emotional processes are crucial for studying and learning and should thus be taken into serious account in NBME as well. Emotional factors have a strong impact on the ways one teaches studies and learns, and on the issue whether one remembers what was taught, studied and supposedly learned. We examined NBE group dynamics in network-based education from the viewpoint of shared emotional states and the NBE conveyance of emotions. The ability to empathise, entering into another person’s role, and emotional recip-rocity are essential factors generating a shared mutual emotional state (Chayko, 2002).

Emotional, study-related situations were also analysed from the perspective of one’s cognitive and emotional load as well as via situational anxiety and situational pleasure. ‘Experiential’ usually pertains to experience or personal observation, instead of obtained from reasoning. In this sense, experiential always refers to a personal reality as seen by individuals. In our context, experientiality is enriched with emotions, so as to imply strong, personally-colored feelings, even sensations. By ‘emotional’ we mean mental ac-tivity comparable with perception, thinking, language and learning, which also produces feelings. In this paper, we argue that it is essential to examine experientiality and emotionality related to part of network-based mobile education and as dormant affordances vis-a-vis TSL processes. An affordance is a property of an object, or a feature of the immediate en-

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

19

vironment, that indicates how that object or feature can be interfaced with (Gibson 1966; 1979). We firmly argue that these affordances can and should be made dominant in a way that fully benefits a human being’s potentiality as a com-mitted, self-directed individual. We also look into how expressing emotions and feelings can be beneficially incorporated as part of an individual’s teaching–studying– learning processes. Emotions represent an individual-level system that provides us with valuable information about the state of our own bodies and the relationship of ourselves and our bodies with ongoing activity (Siegel 1999; Simonov 1981), such as studying. We always assess, in all activity, our knowledge and acts also emotionally, even though we do not always notice it.

Keywords: emotionality, experientiality, sensationality, affordances, embodiment, network-based education (NBE), net-work-based mobile education (NBME), teaching-studying-learning process

Meaning of ‘Individuals Diversity’ for Information-System-Design-as Organization-Design, and Significance of ‘Web-based’ as Design SolutionHideaki MiyashitaDepartment of Education, Hokkaido University of Education, Japan

As to information system, “if we build it, they will come” does not work. Its result is wasting money. But, in reality, it is being repeated. The point of the problem is that the methodology of design is seriously lacked there. Information system design is much more than information system design. It is an organization design — design of organization shift. It is to conform the information system and the members’ diversity to each other. And the point is the activation/release of individuals diversity, because (1) individuals diversity is the moment of organization shift and (2) activating/releasing individuals diversity is the manner of organizational ‘well-being’.

The ‘web-based’ is a potent means/solution for activating/releasing individuals diversity. It should be asserted because we are still far from using the most of the power of ‘web-based’.

Keywords: information system design, organization design, diversity of individuals, release of diversity, well-being

Reusable Agent-based Framework for Deployment in Multiagent Systems Ivan Seder, Ronny Weinkauf, Tobias Neumann, Gabriel Neumann

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

20

Fachhochschule Merseburg, University of Applied Sciences, Department of Computer and Applied Natural Sciences, Heinz Nixdorf Foundation, Germany

In past years the research community has created a number of different methodologies for construction of agent-based systems. Our approach combines the component-based software engineering (CSBE) with agent-oriented software engineering (AOSE) in order to close the gap between the design and implementation phase and to be applied for development of multiagent systems for planning tasks in urban systems. Our component model is framework based and specialized as reusable agent framework which can be deployed in a particular application domain of multiagent system (MAS). Our view of agent is pragmatic one and oriented to simplicity of architecture and and high level of reusability. The main requirements for framework construction are the capability of agent to communicate with agents of MAS, to gather knowledge about other agents of working environment and to store it in own knowledge base. Different roles of agents in MAS are built reusing the agent based framework as working instances according to the design structure of it. The differences between so generated different agent instances are their capabilities. The capabilities are stored as metadata in the knowledge base as description of their location and functionality. To use different capabilities, a mechanism to include web services is implemented in agent framework. We developed successfully a prototype of planning system for an urban area as experimental field for construction of MAS using agent-based framework.

Design a License Server to Protect the Multi-level Distributed Digital ContentJihyun Park, Yeonjeong Jeong, Ki-Song Yoon, Jaecheol RyouElectronics and Telecommunications Research Institute, Korea

Current digital content distribution model can not protect the intellectual property rights of a creator if the content is delivered to a retailer. If a retailer infringes the rights of a creator after the content of the creator is delivered to the retailer, only the post dealing with it by the legal procedure is possible. Currently the distribution from creators to retailers and from retailers to consumers is the general distribution channel. This simple content distribution has the limit because the content could not be distributed through diverse distribution channels which many retailers concerned. In the paper, we describe the license server system for protecting the content throughout all phases of the content distribution

Keywords: DRM, License Server

Advanced E-learning Environment to Increase the Quality of the Global Learning Process

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

21

Jose Carlos Teixeira (1), Teresa Gaspar (2)1. Instituto de Telecomunicacoes - Dep. de Matematica (FCTUC), Portugal 2. Escola Secundaria Jose Loureiro Botas - Instituto de Telecomunicacoes, Portugal

Based on a new pedagogical model specially developed to increase the quality of the global learning process, we created a Web-based interactive elearning environment. The pedagogical model and the e-learning environment have been tested, with very good results. After the introduction of the pedagogical model developed to support an active teaching and learning of sciences, and the discussion of its adaptability, we will discuss its application in a real school environment. The development of the model, and the corresponding e-learning environment, intents to provide the students with a working environment adapted to the group work and to develop other social values, such as cooperation and knowledge transfer. We will show that our approach is able to support different rhythms, knowledge depth and acquisition and applications of concepts.

Keywords: E-learning, pedagogical model.

Privatization Process in Mexico: Prospects and Effects in Economic DevelopmentJose G. Vargas-HernandezInstitute of Urban and Regional Development, University of California at Berkeley, USA

This paper is aimed to analyze historical development and background of privatization in Mexico, prospects of the privatization program in Mexico and effects of the Mexican privatization program. It is safe to conclude that changes of ownership through the privatization process in Mexico has led to the foreign investors to own the most profitable former state owned enterprises which under the spirit of globalization of business has terminated any sentiment of national capitalism. Also, it is concluded that the policy of privatization in Mexico has not achieved the aims related to increase economic growth and development, but has contributed significantly to become a subsidiary economy owned and managed by transnational and multinational corporations. However, this aim is politically neither desirable nor feasible for the economic development of Mexico. If good performance of privatization is required, actually it is successful only if state-owned companies are so well managed that there is no need to privatise

A Study on the Multiple Packaging Techniques for Digital Rights Management of Discrete MediaJunil Kim, Yeonjeong Jeong, Ki-Song YoonElectronics and Telecommunications Research Institute, Korea

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

22

This paper presents multiple packaging techniques for digital rights management of discrete media. Discrete media is a format for download media and stored in the any file format. We design multiple packaging systems of discrete media for digital rights management based on MPEG-21 DID (Digital Item Declare). We design two kinds of multiple packaging techniques which multipart packaging or composite packaging. We will present example to use each packaged contents.

Strategies to Incorporate Family Health Assessment and Intervention in Clinical Practice through On-Line Teaching

Kathryn Hoehn Anderson (1), Marie-Luise Friedemann (1), Paivi Astedt-Kurki (2), Andreas Buscher (3), Rita Kerr (4), Eija Paavillianen (2), Julita Sansoni (5)1 .Florida International University, Miami, FL, USA2 .University of Tampere, Finland3. Private University of Witten-Herdecke, Witten, Germany4. Capital University Columbus, Ohio, USA5. “La Sapienza” Universitat of Rome, Italy

This presentation outlines a web-based program for health professionals to acquire cultural understanding of the health of families in Europe and the U.S.A. The aim of the Family Health Care Across Cultures certificate program at Florida International University in Miami, Florida, USA is to address global changes in health care, the need for culturally competent health practitioners with an international perspective, and the ability to treat families as the unit of care. A major challenge is the electronic teaching of practice knowledge and skills to perform assessments and interventions. Through five courses, entirely on the web, students progress interactively from concept discussions to the application of theories in practice, and evaluation of interventions. Students begin with learning theoretical models pertaining to cultures, families, and health care systems. They then apply the concepts through bulletin board discussions of movie segments, case studies, and guided observations in the students’ practice environment. Assessment is taught step-wise, first by analyzing situations posted in the course, second by assessing their own families, third by observing situations at work and sharing observations with class mates, and fourth through class discussion of a common case that leads to the generation of family interventions. Assessment is then integrated into practice through guided interviewing. Results are shared with their practice team and interventions are developed based on the cultural background of the client families and the health system milieu. Communication with the class as a whole occurs through spontaneous chats and discussion postings in the courses. Advantages of these electronic teaching strategies include learning differing perspectives in professional teams, differences in health care systems in Europe and the USA, multiple ways of caring for families, and

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

23

appreciation of cultural uniqueness. Students also benefit from the opportunity to think independently, receiving guidance from professors and the class, and integrating didactic content in actual practice. Written evaluation summaries attest to the fact that students implement their learning in their place of work. Final course evaluations suggest that students learn to work successfully with families in the health care system, experience increasing comfort and competency in challenging situations, and emerge as leaders while working in interdisciplinary teams.

A Test Automation Tool for Car Temperature ControllerSangyong Lee(1), Joongsoon Jang(1), Seungkyu Park(2), Kyunghee Choi(2), Gihyun Jung(3), Taeyoung Park1. Dept. of IE, Ajou University, Korea2. Graduate School of I&C, Ajou University, Korea 3. Dept. of EE, Ajou University, Korea

In this paper, architecture of automated test platform for embedded system is proposed and the details of a test automation tool built based on the architecture are addressed. In the test platform, called QUEST, an embedded system is modeled with finite states and sub states presented in tabular form. A state is used to model the external behavior of embedded system. And a sub state is used to represent an operation of actuators or sensors. A commercial car temperature controller is tested in real and virtual mode with QUEST and the test result is presented.

Keywords: test automation, embedded system, finite state machine, temperature controller

Aligning Business Integration with ICT Capabilities: A Holistic ApproachMarc Rabaey(1), Koenraad Vandenborre(2), Herman Tromp(3), Ghislain Hoffman(3)1. Belgian Defense Forces and Brussels Free University, Belgium2. Hogeschool Gent and Ghent University, Belgium3. Ghent University, Belgium

The current business landscape is characterized by integration initiatives. The required integrat ions occur as well between organizations as between processes within one organization. I n this paper we describe a framework aligning ICT capabilities with business integrat ion requirements starting from the involved party’s business and resource strategies. The framework result s from a translation of military principles to non-military organizations as described in [1]. The framework differentiates between strategical, tactical and organizational integrat ion and describes the impact each scenario has on ICT architecture and the needed ICT capabilities. Further, the paper

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

24

describes how the framework was applied in a real life test case within the Belgian Office of Intervention and Refunds (BIRB), a Belgian federal agency charged with interventions, refunds and support within the framework of the agriculture policy of the European Union.

Prediction Diagnostic for Warning of Catastrophes Mirko Novak, Zdenek VotrubaCzech Technical University, Prague, Czech Republic

Human society suffers from various accidents and catastrophes. The influence of such events was recognizable through all the human history, however their significance increases with the size of human population in general and with its density in particular parts of the world. Contemporary, such regional catastrophes, like the December 26, 2004 earthquake near Sumatra can cause the death of several hundreds thousand people and tremendous financial losses. Such accidental or catastrophic events appear usually unexpected and the people are not prepared to face them. This fact multiplies usually the losses. Though there is often very difficult to predict the advent of accidents and catastrophes, our present knowledge of system theory, system reliability, signal analysis together with modern computer, sensor and communication technology opens the possibility that at least something can be done. The analysis of accidental and catastrophic events tells that only very rarely they appear absolutely without any preceding signals. Such signals can be of course very weak and hardly recognizable, nevertheless, careful and systematic use of sophisticated analysis of data (mainly in the form of time-series) reached from various sensors gives the hope that the advent of particular nonstandard situation can be detected.

The respective prediction diagnostic involves:a) Analysis of the frequency of appearance of particular nonstandard situationsb) Systematic recording of all relevant data representing the system parameters, in which or among which the information of nonstandard situation advent can be hiddenc) Investigation of indicators of possible nonstandard situationsd) Systematic data-mining of appearance of such indicators in respective data basese) Analysis of the sensitivities of particular system properties and functions on system parameters and estimation, which of them are most significantf) Determination of limits of acceptable changes of the most sensitive system parametersg) Prediction of further development of most sensitive parameters and estimation of time, in which its vector approaches or breaks the boundaries of the respective region of acceptabilityh) Starting the activity of reliable and efficient warning system

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

25

The signals of warning system must be distributed in appropriate time and understandable form in the whole region of the expected nonstandard situation. All the individuals and organizations in such regions have also to be prepared and trained for appropriate reactions. In this contribution we discuss some aspects of system prediction diagnostic, which can in general improve the operation reliability and efficiency of warning systems.

Office Design Has Many Different Interrelated ElementsNedzad Repcic University of Sarajevo, Faculty of Mechanical Engineering, Bosnia and Herzegovina

A lot of people now have E-Mail which makes the sharing of drawings a lot easier. But, not everybody has got AutoCAD, so even if you E-Mail the drawing to them they still cannot open it. You could fax it, but that has its own problems. Firstly, you must plot the drawing out to suit the size format of the fax machine, or cut the drawing up into strips and fax it that way. If you have a fax card and modem connected to your computer you can use a little bit of Visual Basic to send the drawing to your fax. Just remember to change the name of the Fax in the coding to the name of your fax. To demonstrate the use of VBA in AutoCAD, I've taken a few of the more common AutoLisp routines, and converted them to VBA Applications. This will hopefully help the Auto Lisper who is trying to migrate from AutoLisp to VBA. These routines should be familiar to most Auto Lispers and by having a good understanding of how the routine is written in AutoLisp, you should find it very easy to follow and understand the VBA logic and coding. (Sorry, AY2K Only.)

When writing any sort of AutoLisp routine, one should supply some kind of Help. An Information box is also a handy thing to include as it allows you to inform the user of what version of the routine he is using, as well as giving you a chance to advertise yourself and your applications. You can access and integrate custom Help into the Windows Help Files, but this is quite an involved process and you need the brains of a rocket scientist to accomplish this. A much simpler way is to call an external Help or Info file from your AutoLisp routine. Whilst Lisp Help.Lsp, if you click on the Help button, your default browser will open, displaying an HTML Help file. Clicking on the Info button, will open Notepad and display an Info Text file. Tested on R14 and RY2K. It is very important when writing AutoLISP routines to declare all your variables as Local. This prevents them from stepping on other variables of the same name defined from other routines. It often happens though, that on completion of your application, it can be quite difficult to remember and locate all the variables that you have used. This application will list all the un-declared variables and all functions used within your routine. Tested on R14 and RY2K I dare to say that 3D22D is that what you shall use for all your 2D-presentations of a 3D-Model This application enables the user - in a

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

26

simple way - to establish 2D-presentations from a 3D-Model. These will be presented in predefined scales.Advantages: User friendly! There is just one dialog box including everything you need. No searching for icons on different toolbars. Everything is there! 3D22d just not handles Solids but even Solids - in blocks, in nested blocks and even in xrefs.

Keywords: CAD, Design, State

Strategic Configuration Management: A New Approach for Software Change Management Nowduri Srinivas Department of Computer Science, AMA International University, Kingdom of Bahrain

The strategic management techniques are becoming very important to handle the uncertainties arising from the dynamically changing markets. Thereby if the configuration management activities are coupled with the market change visions it automatically makes the organizations more point focused, more productive and quality oriented. In this paper a new pattern of configuration management, a coupling of strategic management oriented activities and configuration management activities is proposed which results in strategic change and version control. Closed Loop and Open Loop models are proposed. The improvements because of Strategic Configuration Management are discussed with emphasis on the development cycle minimization, process improvement and product quality.

Keywords: Strategic Management, Configuration Management, Sequential Versions, Parallel Versions, Development Cycle Minimization.

Advantages and Disadvantages of Distributed Systems' Classical Approaches Applied to Next Generation DomoticsDavid Fraga Aydillo, Juan-Mariano de Goyeneche y Vazquez de Sellas, Jose Manuel Moya Fernandez, Alvaro Araujo Pinto, Octavio Nieto-Taladriz GarciaDepartamento de Ingenieria Electronica, Technical University of Madrid, Spain

Domotics has been one of the most supported disciplines in the past few years. It has inspired lots of technical articles and hundreds of practical applications have been successfully developed following them. Despite that, however, we currently face a situation in which important challenges must still be addressed before the technology arrives to the people. One of them is the fact that a domotic system is as well a distributed system under very restrictive conditions. Its distributed nature invites to apply classical distributed systems techniques, but those

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

27

restrictive conditions we will talk about bring new specific problems to deal with. In this article we provide a general review of domotics from the distributed applications and systems' perspective, study which of those distributed systems solutions are directly applicable to domotics, which are those new domotics- related problems and investigate the new directions to follow to overcome them.

Keywords: Domotics, inmotics, systems integration, distributed systems, sensor networks, middleware, P2P networks, GRIDs, Web services

Welfare Mix Model: A Case Study of Changing the Welfare Mix in ThailandPattamaporn BusapathumrongFaculty of Liberal Arts, Asian University, Thailand

The paper will focus on the change of the welfare mix in Thailand. It will explore the relationship among the three sectos, namely the state, the private sectors and the third sectors including the households, informal supports systems which often exist in most Asian societies underpinned by the Buddhist religious systems, and non-government sector. In the case of Thailand, the boudaries have been shifted marked by the enactment of the first national development plan around 40 years ago. It is introduced by the international organization particularly World Bank. The state has played a key role in developing several legislations including the emphasis on the development of privatization in Thailand since the year 1975 (2518 B.E.). The boudaries have been shifted from informal supports underpinned by the traditional belief systems to a formal supporting system regulated by the state and the private sector (such as private companies etc.). Shifting boundaries and the state discourses on the welfare mix result in the dilemmas of Thailand changing welfare mix. The household sector become smaller and weaker than the one in the traditional system. For example, the country experiences mass migration from rural to urban araes for jobs plus international migration of Thai labourers to work overseas. This weakens the traditional Thai family systems where values are place upon Bun-kun system (loyalty and reciprocal relationships among the children/ younger generations to the elderly). At the same time, privatization's encouraged and promoted by the state sector for several years but the benefits/social insurance have not well developed like other developed countries. The competion in the market system and the demand of cheap labour’s one of the reasons why most foreign investors have come to Asian countries including Thailand. The state itself play key role in the welfare mix, regulate and impose discursive practices on the Thai welfare mix which partly contribute to the shift of welfare mix and its dilemmas in Thailand.

Internet Based Telemedicine Services in Montenegro-Challenges and Experiences

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

28

S. Stojanovic, Ministry of Health of MontenegroR. Stojanovic, Department of Electrical Engineering, University of Montenegro, S&MI. Obradovic, European Dynamics, Athens, Greece

“TeleCG” is the first system that uses Internet/Intranet technologies for exchanging patient information among health care providers in Montenegro. In order to make up one cost effective “Virtual Clinic on the Internet”, it employees the approachable software technologies such as .NET programming, PHP, my SQL, URL and Web Servers as well as intelligent hardware gateways for importing and transferring wide range of medical signals. The system enables effective access to the patient data by means of any device equipped with a Web browser, such as traditional Personal Computer, workstation, modern Personal Digital Assistance or mobile phone. In this paper we discuss the proposed architecture, challenges we faced and the means by which we overcome these challenges. The effectiveness of the proposed solutions has been evaluated in cardiology through installed pilot system that interconnects three remote centers, Bar, Podgorica and Berane.

Autonomic Information Networking: BRAINMikael Salaun, Sergio Beker France Telecom R&D, France

The "multi-disciplinary" research project called BRAIN (Basic Research in Autonomic Information Networking) aim to design new tools in order to reach the following set of functionalities;• Improving of the network and service management• Helping fault detection• Auto-repairing, auto-configuration and localisation of equipmentsAll the concerned works and proposals should help France Telecom to build and to improve the autonomy of all its telecoms systems and networks. This project is also a research program that has the ambition for defining and developing a software environment to insure uniformity in the architecture.1 Introduction

The BRAIN project aims at automating the parameterization and configuration of the network elements on heterogeneous environments. Under dynamic operational conditions, some network aspects would have to be reconfigured in order to keep the network on the desired point of operation (i.e. meeting the business model and the service contracts). In this context, the main objectives of the subproject are:

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

29

• To define methods allowing the network to automatically parameterize the network elements for the different operational aspects (e.g. addressing, QoS, security, billing, etc.).• To collaborate in the elaboration of policies to automatically react to the dynamics of the network operation, at both the network and application levels (e.g. QoS differentiation, routing, security).• To study the improvement in network efficiency by closing the control loop to react to the dynamics of the network operation. This includes the feedback of the measured parameters and observed events to the decisional entities.

A Study on Chinese Learners’ Communication StrategiesYang DongShandong Jiaotong University, Jinan, P. R. China

To some extent, what Chinese learners need is communication strategies, which can help them solve problems they may encounter in actual communication. The paper sets out to investigate Chinese learners’ communication strategies and the roles it plays in second language acquisition. After a review of current literature on communication strategies, the author conducts investigation on communication strategies of Chinese learners of English, analyzes the results of the investigation and summarizes major points of communication strategies and proposes suggestions for language learning and teaching.

An Analysis of the Impact of the 1997 Economic Crisis on the Dynamic Relationship between Interest Rates and Inflation: The Case of KoreaSang-Bum ParkDept. of Business Administration, Hankuk Aviation University, Korea

This study analyzes the impact of the 1997 economic crisis on the dynamic relationship between the interest rates and inflation rate in Korea using the spectral analysis method. Findings are that, at some point in 1997, the direction of movement of the time series of the interest rates and the inflation rate reversed, from being from interest rates to inflation and became from inflation to interest rates. Also, there exists a unidirectional movement of causality between the two time series.

Key words: spectral analysis, economic impact, interest rate, inflation

An Analysis of How Co-movement and Causality of International InterestRates Affects the Mechanical Industry of KoreaSoo-Yong Lee Hankuk Aviation University, Korea

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

30

In this research, co-movement and causality of international interest rates are analyzed. Finding co-movement and lead and lag relationships using spectral analysis, we estimate causality using a transfer function model to find causal structure. After identifying unidirectional movement of the interest rates from the interest rates of Japan to those of Korea and from the interest rates of the USA to those of Korea using Granger Causality test, we estimate causal structure of them using transfer function model. The results of transfer function model with data from January 1990 through December 2001 (12 years) show that there is dynamic relationship that the interest rates of Japan and the USA are affecting those in Korea as exogenous variables.

Key words: spectral analysis, international interest rates, co-movement, and causality

Engineering Vacuum Using High Density Packets of Electrons for Space Flight ApplicationsShrigovind TiwariDept. of Electronics & Tele-Communications, Shri Guru Gobind Singhji Institute of Engineering & Technology, India

Electromagnetic zero point vacuum fluctuations manifest themselves in the form of Casimir effect. This effect also exists for electrons immersed in the sea of background electromagnetic vacuum fluctuations. At shortening distances the Casimir force can overpower coulomb’s force of repulsion resulting in the electrons being finally attracted towards each other. These electrons under the balanced interaction of Casimir forces and coulomb’s force form high density stable packets of electrons that would bring an inevitable revolution space industry. The packets of electrons have a high amount of potential energy. The key to using high density packets of electrons for space flight propulsion is to tap this potential energy. The amount of potential energy contained in these packets can help propel space crafts to unimaginably high speeds being cost effective at the same time. This work involves the projected possibility that empty space itself (the quantum vacuum) might be manipulated so as to provide energy/thrust for future space vehicles. In this entire conceptualzation we would first try to understand this free energy then try to understand the formation of the packets of electrons and then the possible way of considering the viability of vacuum engineering in the form of systems based on the concept of high density charge for space flight applications.

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

31

Keywords: Electromagnetic vacuum fluctuations, Casimir effect, high density packets of electrons, space propulsion

Analysis of the Producer-Consumer ProblemSun Lun Ping, Jianlong Chen, Lo PanSoutheast University Nanjing, China

Many mathematicians would agree that, had it not been for the improvement of Markov models, the refinement of the Turing machine might never have occurred. In fact, few endusers would disagree with the evaluation of kernels, which embodies the extensive principles of electrical engineering [9]. BAIL, our new algorithm for pervasive technology, facilitates the analysis of the producer-consumer problem in this context.

Envelope Model: Data Exccess from AnywhereSushil KulkarniJai-Hind College, Mumbai, India

In this paper, definition of mobile databasis and mobile transacions witth illustrations from spatial and temporal databases are given. Corresponding to mobile transaction mobile query is defined. New model called Envelope model is presented to execute a mobile query using various base stations of the closed spheres. A mobile query is defined as the union of jumping queries and contains only one unary or binary operator operating on database. A mobile transaction is the union of jumping transactions where each jumping transaction is the unit of execution at the base station. The jumping condition is checked prior to the starting of each jumping query at the base station. This model is implemented using development environment called Data Invoking Capsule. I t is located at every base station and its main job is to transfer messages from one base station to another executing jumping queries and storing envelopes. A mobile unit makes a request to execute mobile query to base station called initializer, who creates a basket that store jumping query number and the directed parse tree. The basket is carried by the mobile unit till mobile query is completely executed. Directed parse tree is created by an initializer using parse tree. It gives guidelines for execution of jumping query at the respective base station. After jumping query is executing an envelope is created, that store jumping query number and the result obtained by executed jumping query. Envelope files from one base station to another as required by another base station for executing next jumping query under the guidelines of directed parse tree. Every base station may not have the required database on which jumping query is executed so the method is proposed

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

32

to execute it. Algorithms for creating directed parse tree and an envelope model are provided. Parallel execution of jumping transaction at the base station is also discussed. Envelope model for mobile transaction is introduced.

Keywords: Base station identification number, Close sphere, Data invoking Capsule, Directed parse tree, Envelope, Envelope model, Execution rule, Jumping condition, Jumping transaction, Jumping query, Jumping query number, Initializer, Node

ICT in Emerging Energy MarketsTerje GjengedalThe Norwegian University of Science and Technology, Oslo, Norway

Statkraft Energy is presently implementing a new control centre system that will replace the five existing control centre solutions by one new multi site solution. The existing control centres are characterized by five independent and different systems, they have different functionality, and communication is carried out by serial solutions based on proprietary protocols. The new control centre solution will be one integrated system with common t tools and functionality. It will be a flexible system that allows redesigning the control centre structure and dispatch of the operation tasks when needed .The new control system is presently under installation, and the full functionality should be in place by early 2006. The new system will give a much better flexibility in defining, dispatching and organizing the process control and thepower plant and hydro system operations than the present system. It is of a great benefit that all users now will use the same type of functionality, and that they have access to the same type and quality audited information. The operators will be more integrated into the same working process, and exchange of information, experiences and view points in between regions will be far easier than before. Since all operators are using the same system, it will also be easier to maintain, develop and exchange the competence between the regions. Hence, an even more professional and efficient process control may be achieved.

Z-Axis Interconnection for Enhanced Wiring in Organic Laminate Electronic PackagesV.R. Markovich, F.D. Egitto, S.R. Krasniak, B. Chan, K.J. BlackwellEndicott Interconnect Technologies, Inc., NY, USA

Greater I/O density at the die level, coupled with more demanding performance requirements, is driving the need for improved wiring density and a concomitant reduction in feature sizes for electronic packages. Traditionally, greater wiring densities are achieved by reducing thedimensions of vias, lines, and spaces, increasing the number of wiring layers, and utilizing blind and buried vias. However, each of

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

33

these approaches possess inherent limitations, for example those related to drilling and plating of high aspect ratio vias, reduced conductance of narrow circuit lines, and increased cost of fabrication related to additional wiring layers. One method of extending wirability beyond the limits imposed by these approaches is a strategy that allows for metal-to-metal z-axis interconnection of subcomposites during lamination to form a composite structure. Conductive joints can be formed during lamination using an electrically conductive paste. As a result, one is able to fabricate structures with vertically-terminated vias of arbitrary depth. Replacement of conventional plated through holes with vertically-terminated vias opens up additional wiring channels on layers above and below the terminated vias, enables die shrink, and eliminates via stubs which cause reflective signal loss. In addition, parallel lamination of testable subcomposites offers yield improvement, shorter cycle times, and ease of incorporating features conducive to high speed data rates, such as differential pair wiring and thicker laminates. As a case study, an example of a z-axis interconnects construction for a flip-chip plastic ball grid array package with a 150 m die pad pitch is given. The processes and materials used to achieve smaller feature dimensions, satisfy stringent registration requirements, and achieve robust electrical interconnections are discussed.On the Functional Characterization of “Intelligent” Materials Y. M. HaddadDept. of Mechanical Engineering, University of Ottawa, Canada

The paper discusses possible forms of intelligence that may be incorporated in various classes of engineering materials. Basic mechanisms of intelligent materials are described, and implementation of these in the microstructure of the material, as well as associated algorithms and techniques are illustrated. Different models pertaining to the functional characterization of intelligent material systems are presented.

Protecting Wireless Computer Networks by Using Intrusion Detection AgentsDragan PleskonjicBEG Finsoft, Belgrade, Serbia & Montenegro

Wireless (Wi-Fi) networks based on IEEE 802.11 family of standards have been spreading its coverage last years and this trend is expected to grow. Every day more and more people use this type of networks to access Internet, company or other types of networks. Today’s wireless networks are vulnerable in many ways (rogue access points, hijacking sessions, eavesdropping, illegal use, unauthorized access, denial of service attacks, floods, stealing data and other types of misuse and attacks etc). People are worried about unknowingly exposing their computers to illegal access through the air, from an undefined location. On wired networks the intruder can access by wire, but in wireless environments the intruder

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

34

can access the network from anywhere in the neighborhood. At the present time there are IDS’s but mostly deployed on wired networks, and based on rules and signatures of already known and analyzed intrusions.

These systems can’t answer the demand in environments where new intrusions are occurring every day due their legacy IDS’s limitations. Intrusion detection agent presented in this paper is part of WIDS – wireless intrusion detection system. WIDS Agent is software installed on mobile computer device. It detects intrusions and attacks by analyzing traffic and making conclusions and denies it. It works as standalone module or coupled (in contribution) with WIDS Sensor and Server that are also part of this system. Position of application is on personal computer (PC), including Pocket PC (PPC), other PDA devices and similar computerized and mobile devices. This system has capabilities such as: self learning, autonomy and decision, self-decision and self defense including alerting. This is multidimensional system in development which is intended to cover most of wireless networks specific vulnerabilities and intrusion. It should work in real-time and defend user i.e. his computer or system against majority of intrusions nevertheless of fact if they are already known or new kind of attacks. System is integrated in clients and performs local data collection and filtering, works as local detection engine cooperating with neighboring WIDS agents (cooperative detection engine). It provides local response and/or global response against intrusion. Also, this system works in the closest relationship with firewall software and devices, antivirus software, network management and other security tools.

Keywords: wireless, intrusion, detection, system, agent, sensor, server, IEEE 802.11, Wi-Fi, WPA, AES, rogue access point

The Shortest Way in SpaceHironori A. FujiiDept. Aerospace Eng., Tokyo Metropolitan Institute of Technology, Japan

The shortest way is a much attractive concept when one would move from one place to another one. Space structures on orbits move in effect of both of the central and rotational force fields. The effect of the both fields complicates the path of the movement due to the effect of the Coriolis force, which is a parameter of both of the velocities of the movement and the rotation of orbit. The straight line is not the shortest path in space but is any curve, which changes as the velocity of the movement changes. The present paper studies a method to find the shortest way in space for a particle moving in both of the central and rotational force fields. The Coriolis force, the double of the movement velocity multiplied by the rotational velocity, drives the movement way to curve and is defined as control force acting on the motion. The metric of the movement is employed to measure the length of the movement path and its integral is defined as the total length of the movement. The problem of finding the

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

35

shortest way is formulated as the optimal control problem with defining the Coriolis force and the movement length as the control force and the performance index, respectively. Through employment of canonical transformations the problem thus formulated is reduced to the Vakonomic mechanical system. The reduced system is shown to be a two-point boundary-value problem and is analyzed numerically. The results of the numerical analysis are compared with a result of the problem employed with the usual feedback control and the performance of the shortest way in space is examined to some extents. The path is identical for the movement and also for the reverse movement to prove the property of the shortest way.

Keywords: The shortest way, Rieman Metric, Space structures, Vakonomic mechanical system, Coriolis force

“Multi-tasking” in Laser Scanning Confocal Microscopy towards Cell ProfilingPavle R. AndjusCenter for laser microscopy, School of Biology, University of Belgrade, Serbia and Montenegro

Confocal microscopy is a revolutionary (since late 1980's), form of light microscopy that by way of collecting single molecule fluorescence, allows one to visualize deep into cells and tissues, to create 3D images, or to follow specific cellular reactions over extended period of time. The technique became widely available with the introduction of small reliable lasers («laser scanning confocal microscopy») and powerful and inexpensive computers. Results on neural cell and tissue preparations will be shown that demonstrate 2D & 3D structures of fixed material as well as time-series recordings of intracellular ion concentration changes «in vivo». Emphasis will be given on software solutions to image acquisition and analysis towards high-throughput cell profiling.

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

36

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

37

Talented Students Forum Abstracts

IPSI-2005 MONTENEGRO September 24 – October 1, 2005

38

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

39

Bringing the Free Software to the Public: Creating the GNUzilla Magazine ProjectIvan CukicFaculty of Mathematics, Belgrade, Serbia & Montenegro

The main problem in Serbia is the fact that the public is uninformed (or even misinformed) about Free Software and its advantages. Past attempts to change the situation have produced a number of websites dedicated to the GNU/Linux operating system but most of them are dead today. The creation of the GNUzilla magazine was the ìbig thingî because Free Software users were in need for their own media. The proof that this concept holds water is that each issue of the magazine was downloaded more than 3000 times (expectations were 500 per issue at most).

Acceleration of WatermarkingIvana Vujovic, Darko Jovic, Veljko Milutinovic IPSI Belgrade, Serbia and Montenegro

Watermarking is a process of embedding information into digital data in a secret and inconspicuous way. Today watermarking is widely used in applications of copyright protection, fingerprinting, copy protection, content authentication, data hiding, etc. We can classify watermarking in two general categories: spatial domain and frequency domain watermarking. In frequency domain watermarking, media is transformed from spatial to frequency domain, then some watermarking algorithm is applied, and finally watermarked data is transformed back to spatial domain. Additionally, for some media types, certain decoding and encoding operations can take place before and after watermarking algorithm is applied. In this paper, methods for acceleration of watermarking process will be presented. These methods are not referring to watermarking algorithm itself, but rather to optimizations of spatial/frequency domain transformations, as well as optimizations of encoding/decoding operations.

Multi-Domain Metadata AgentsDarko Jovic, Jovan Popovic, Veljko MilutinovicIPSI Belgrade, Serbia and Montenegro

This research is based on the assumption that more important and useful data (or metadata) about stored information can be gleaned and collected from the storage systems and the servers that use them. The proposition is that this additional metadata can then be used to allow improved, more automated, information lifecycle management (ILM) solutions. The current methods of implementing ILM are slow and human labor intensive. In order to make ILM more efficacious and cost effective in the future, more of the storage, data, and information management needs to be automated. This paper focuses on metadata agents which collect metadata from multiple domains like infrastructure data, file activity data, content data, etc. This multi-domain metadata can then be used to more efficacious manage data in the storage system.SwanLink Network Application

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

40

Fred B. Holt, Virgil Boussa, Andrija Bosnjakovic, Nenad Korolija, Predrag Minic, Jovan Popovic IPSI Belgrade, Serbia and Montenegro

This paper presents a new intensity-based technique for interactive teaching over the network. The goal of this project is to develop a network layer for P2P communication between network nodes. Application provides environment in which potential users are informed about what other users are working on their workstations. Each user can draw, input text and images, and post that to other users on the network. The paper discusses several practical aspects of problems that affect the accuracy of the method and proposes some solutions.

Virtualization Layer for Automated Storage ManagementZoran Babovic IPSI Belgrade, Serbia and Montenegro

The task of the virtualization layer is to provide global name space feature to the consumer of the storage with ability to move, relocate, and replicate the files, without affecting client’s view of the files. Such virtualization layer provides strong base for efficient information lifecycle management that means automatically managing data from its creation to deletion. The environment is a typical enterprise storage system that evolves pool network attached storage devices, including NAS appliances, SAN, servers and clients with shared storage. The main issue is choice of the efficient way to track the class of the storage where files reside and in the same time to provide transparent view of the file names to the client. We consider both block oriented and object based file systems, in order to solve the problem. Some topics about independency of the virtualization layer to the remaining part of system are also mentioned.

MPEG1/2 MultiplexerZoran Babovic, Jelena Krunic, Nenad KorolijaIPSI Belgrade, Serbia and Montenegro

MPEG Multiplexer is software tool for multiplexing MPEG video and MPEG Audio Streams into an MPEGSystem Stream. It is full implementation of ISO/IEC 13818-1 (MPEG2 System) and ISO/IEC 11172-1 (MPEG1 performance. An easy interface is provided to the programmer which wants to exploit this software in own Project. Both version, for Windows and Linux, are available.

Media-Retrieval from Partial DownloadsJelena Krunic, Zoran Babovic IPSI Belgrade, Serbia and Montenegro

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

41

Only a very small part of a media file is required is required for watermark detection (for example: a few seconds from 90 minutes of playing time of a typical movie are sufficient). This may decrease the processing and verification time while tracing illegal copies on the internet. Downloading content from peer-to-peer networks often produces partial downloads, which are not viewable on media players. Our software tool identifies type of the partially downloaded file first, and thereby decides if parsing is possible. If parsing is possible, media file is parsed in the second phase, thus identifying successive blocks and extracting correct sequences, both audio and video joined, or separated, that are playable on the media player. We support parsing of MPEG1, MPEG2, DIVX, and XVID media files.

Data Assurance in a Conventional File SystemSasa Rudan (1), Aleksandra Kovacevic (1), Charles Milligan (2)1. IPSI Belgrade, Serbia and Montenegro2. StorageTek, United States of America

The goal of this research is to find a mechanism to guarantee that a file stored in a conventional file system, on disk, has not been modified. Our proposal for achieving that goal is a smart card based DSFS (Digital Sealed File System). The main idea is to send only the hash value of a document to the SmartCard together with the unique document identification. After creation of public/private key pair and hash value encryption, SmartCard destroys private key. This yields a final signature and public key as output. Therefore, sending confidential key material from SmartCard to a system is completely avoided. Since hash value is small data, limited bandwidth to the card for transferring large documents for encryption is not a problem. However, there are some possible drawbacks of the proposed idea. An attacker is able to circumvent the signing process in SmartCard and to act as SigningTool. Moreover, publishing of public key is the issue of the DSFS architecture and public key distribution is too complex and unreliable solution. Here we describe a possibility of overcoming these problems.

The Solution for Distributed Management of Digital Signatures in Highly-loaded SAN SystemsSasa Rudan, Aleksandra Kovacevic, Zoran Babovic, Darko JovicIPSI Belgrade, Serbia and Montenegro

New SAN (Storage Area Network) systems deal with billion of files. These files are usually stored on classical hard-disk based storages. This environment very soon pointed out inefficiency of hierarchical file systems.

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

42

New concepts of raw file systems use digital signatures as URIs (Uniform Resource Identifier) for stored files. This implies need for extremely fast digital signature management, i.e. searching, storage, and deletion of digital signatures in domain of 220*8=2160≈1048 values. This paper presents solution for distributed digital signature management in the highly-loaded SAN environment with one frontal (gateway) server and eight background (parallel) storage nodes.

Experimenting on Selection as a Part of Genetic AlgorithmMarija Radovic Serbia and Motenegro

Genetic algorithm as part of evolutionary computing is very important and has shown to be very efficient in solving many complex problems, like some NP-complete problems (traveling salesman problem, knapsack problem, etc.). Selection is a very important component of Genetic Algorithms. And in this paper, some of the methods for selection have been described (Roulette Wheel Selection, Rank Selection, Steady-State Selection, Tournament Selection, etc.), and also some of the results of experiments that have been acted upon them.

Technology Roadmapping - The Right Way for Developing a ProjectAleksandar KovacevicIPSI Belgrade, Serbia and Montenegro

Technology roadmapping is a form of technology planning and it can help companies dealing with their competitive environment. Roadmapping is widely adopted in industry. In collaboration with computer science, technology roadmapping makes a powerful way of communication between product teams with purpose to link business strategy, product plans, and technology development. It is the process of creating time-based representations of information designed to support a specific aim or decision process. When used as part of a strategic planning operation, roadmapping promotes innovation by forecasting the elements needed to focus on future technological needs or market demands.

Problem Solving with Interpretive Structural ModelingAleksandar KovacevicIPSI Belgrade, Serbia and Montenegro When a company or project team introduce themselves with complex problem, they use a way of collective thinking such as brainstorming, or some similar method. Interpretive Structural Modeling (ISM) makes a pictorial representation of all connections between ideas generated by the team members. It helps team to get the clear picture of a problem and to get a key idea for solving the problem more likely. With a computer support and some mathematical logical analysis, ISM is the method that demands every possible

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

43

linkage between ideas and generates priority levels, categorizes ideas or shows the connection between ideas.

Advanced IPSI Research in Infrastructure for E business on the Inter-netZoran Babovic, Andrija Bosnjakovic, Olivera Gajcanski, Ivana Vujovic, A. Vranes, Darko Jovic, Aleksandar Kovacevic, Nenad Korolija, Jelena Krunic, Marija Miletic, Predrag Minic, S. Mrvaljevic, S. Omerovic, Aleksa Prijic, Marija Radovic , Sasa Rudan, Aleksandar Stanic , Jovan Popovic, M. Jovic

This presentation defines the major bottlenecks in the research related to the infrastructure for e-business on the Internet (hardware, software, system, and communications), and follows in two parts. In part one, for each one of the major 4 bottlenecks, an overview is given about the ongoing research at Stan-ford, MIT, and UC Berkeley. In part two, for the same 4 bottlenecks, an over-view is given about the recent (past 5 years) and ongoing research done at the University of Belgrade (leaded by Professor Milutinovic), for industry in the USA, and for selected universities in EU. Results of this research include prototypes for a number of commercial products and about 40 papers pub-lished recently in IEEE journals. Topics covered by the research and this pre-sentation include: On-chip and on-board accelerators for PC software, micro-processor improvements for modern e-business, efficient integration of com-puting and communications, genetic Internet search, customersatisfaction based Internet search, medical issues on the Internet, engines for e-education, e-tourism, technology transfer, and scientific interchange on the Internet, semantic web analysis, etc. Each particular topic can be expanded into a self-contained separate talk.

Recommended Mutation in GA TSP with Weather-Forecast and Tanker HistoryOgnjen SobajicThe Faculty of Mathematics, Serbia and Montenegro

In order to improve fitness function value of the solution we've found, our team recommends several heuristics. Bad fitness factor could be caused by a storm or some not so good weather condition in a region. The first approach is simply to avoid it by changing the path between two nodes in the graph into a curve. This solution might be unstable because shifting all the incoming-time can increase costs. The second one is simply to change orientation of the path in a given solution so that high percentage to storm can be avoided. Other approaches are based on local path mutation.

Bar Code TechnologyIvan Ivanov, Milorad Ignjatov, Aleksandra JankovicIPSI Belgrade, Serbia and Montenegro

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

44

Bar Code is an automatic identification technology that allows data to be collected accurately and rapidly. A Bar Code symbol consists of a series of parallel, adjacent bars and spaces. Predetermined width patterns are used to code actual data into the symbol. To read information contained in a Bar Code symbol, a scanning device is moved across the symbol from one side to the other. As a scanning device is moved across the symbol, the Bar Code width pattern of bars and spaces is analyzed by the Bar Code decoder, and the original data is recovered. The most visible application of this technology is the supermarket industry, where it has been in use since 1970. Bar Code is now the automatic identification technology, for virtually any application. There are a variety of different types of bar code encoding schemes or "symbologies", each of which were originally developed to fulfill a specific need in a specific industry: UPC, EAN, PDF417, Data Matrix, etc.

Power System QualityNenad KorolijaIPSI Belgrade, Serbia and Montenegro

Classically, the aim of the electric power system is to generate electrical energy and to deliver this energy to the end-user equipment at an acceptable voltage. Voltage quality is concerned with deviations of the voltage from the ideal. The ideal voltage is a single frequency sine wave of constant amplitude and frequency. Current quality is concerned with the deviation of the current from the ideal. Power quality is the combination of voltage quality and current quality. Power quality disturbances come in two types, based on the way a characteristic of voltage or current is measured: variations and events.

Melanoma of the Oral Cavity and MesopharynxKatarina Stankovic, Marko Jovic, Dejan Stefanovic, Aleksandra Jovic-Vranes, Boris VranesMelanoma of the oral cavity and mesopharynx is very rare neuroectodermal tumor with high malignancy features. The most frequent localization of the oral cavity melanoma are mucous membrane of the soft palate, alveolar addition of the upper and lower jaw, labial and buccal mucous membrane, tongue and palatal tonsils. This case report shows M.D. a 56 years patient with following tumor localizations: 1. hard palate 2. soft palate 3. left palatal tonsil 4. left lateral wall of the mesopharynx. During two years of follow up patients we notice relapse of the disease.

Individually Driven e-Learning SystemD. Jovanović(1), Sasa Rudan(1)

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

45

1. The Advanced School of Electrical Engineering, Serbia and Montenegro

E-Learning is one of most interested trends in computer science and in psychology. Several applications have already been implemented and many project initiatives have been started. Although such systems come with interesting advantages, there are still many unsolved problems. Enriching common learning content by applying multimedia did not meet the general expectation to decrease drop out rates of e-Learners using such systems. Additionally, most e-Learners complain about a "one-size-fits-all" philosophy, a resulting cognitive overload and consequently the lack of personalization of existing applications. In this paper a user-centric approach is presented in order to improve the usability and acceptance, thus, making e-Learning systems more successful. Focusing the e-Learners requirements learning fragments are introduced. Depending on the user's skills, learning styles and learning strategies these learning fragments are individually combined to an e-Learning system. The necessary user profile is incrementally determined by observing the users learning activities. Based on these observation results the e-Learning system is dynamically adapted to the current user's profile.

Multimedia "Riding Multi-Headed Dragon"Rudan SinisaFaculty of Electrical Engineering, Belgrade, Serbia and Montenegro

Like a giant baby, multimedia keeps amusing us from its very start but also for all of this time it cannot get on a firm footing. Multi-headed giant always overgrows its feet. In order to keep riding on its exponentially growing backs, we asked for help expert systems, artificial intelligence, and fuzzy logic. We describe it, beginning with XML and CSS, leading to MPEG-7 and MPEG-21, in order to reach intelligent media annotation, thus allowing content-based image/video retrieval and searching. Now we are trying to put all of its heads under one cap by using languages like SMIL. Hypermedia, Media Semantics and Semantic Web leaded to development of Semantic Web Services. As the war trophy from all of these fights, we have multimedia in E-Commerce, have developed Human-Centred Multimedia Information Systems and we are still riding. But the giant keeps growing.

Keywords: E-Commerce, expert systems, fuzzy logic, hypermedia, media semantics, multimedia, multimedia content describing

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

46

IPSI Awarded Abstracts

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

47

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

48

TV is Dead – Long Live the WEB (SSGRR-2000)Harold Kroto, Nobel LeaurateUniversity of Sussex, United Kingdom

Science, Engineering and Technology are as vital to our intellectual and cultural development (particularly our children’s) as they are to our training to get along in the Modern World. Some efforts to redress the problems involved in the general Public awareness and understanding of science and engineering (PAUSE) issues are being initiated via the Vega Science Trust (www.vega.org.uk), which aims to take advantage of the revolution in TV and Internet communications technology to improve matters. The best scientists and science communicators are being recorded and the programmes are being broadcast on BBC-TV and the Internet. Furthermore School/University outreach programmes are being developed and Vega is piloting ways in which members of the Science, Engineering and Technology (SET) community can, as individuals and groups, make important contributions. Excerpts from SET programmes will be presented. These efforts present a perspective on SET which places the cultural factors in the foreground and focuses on the intrinsic charisma of science which is hidden from many. It is now cruical that the society in general and the scientific community in particular accept that serious problems are involved in communicating science and the Internet is set to play a major role. Before the invention of the printing press there was only one book in the west – the bible – and it was hand-written by monks. After the invention the printing press book – writing and reading was democratized and this was truly the beginning of general education. In a similar way the birth of the Internet has democratized broadcasting – the broadcasting channels no longer control the dissemination of recorded material – individuals and groups of individuals can now do it themselves and so the Internet has enabled broadcasting to fulfill the promise it has always had – to be a superb educational medium.

Electronic Business and Education (SSGRR-2001)Bob Richardson, Nobel LaureateCornell University, United States of America

There is no longer any question that the Internet and electronic communication are the major new tools for collaborative advances in the creation of new knowledge and in future learning. There are countless

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

49

examples of highly successful professional courses taught on the Internet. Similarly, international and multidisciplinary collaborations in scientific research based upon little contact other than through electronic communication dominate the scientific literature. Perhaps the most profound examples of distance collaboration in science are found in astronomy. The Hubble telescope has permitted astronomers to gather breathtaking images from the most remote observatory imaginable – one in orbit around the earth. A significant challenge remains. The challenge is to devise a remote mode for nonverbal communication about difficult concepts. In the shared creation of new ideas and knowledge, facial expressions and body gestures frequently play an important role in peer interactions. As the speed and bandwidth of electronic communication increase, we have the prospect that the important elements of human contact can be imitated. Without the development of sympathetic peer or mentor relationships, distance learning will remain quite sterile.

E-Business and E-Challenges (SSGRR-2002)Jerome Friedman, Nobel Laureate MIT, United States of America

The development of Homo sapiens has been a history of innovations, from the earliest crude tools to the modern technological society of today. The growth of science and technology has been exponential during the last century; and under the right circumstances, this rapid growth can be expected to continue. The major innovations of the future - those that will shape the society of the future - will require a strong foundation of both basic and applied research. It is ironic that quantum mechanics, one of most abstruse conceptual frameworks in physics - one that was developed to explain atomic spectra and the structure of the atom, lies at the foundation of some of our most important technological developments, because it provided the understanding of semiconductors that was essential for the invention of the transistor. Quantum mechanics thus contributed directly to the development of technologies that gave us world wide communication, computers with their applications to all phases of modern life, lasers with many diverse uses, consumer electronics, atomic clocks, and superconductors - just to mention a few. The internet and the World Wide Web, which are profoundly reshaping the way that we communicate, learn, and engage in commerce, owe their origins in a deep sense to the physicists of the past who worked to understand the atom. In modern industrial nations, quantum mechanics probably lies at the basis of a sizable fraction of the gross national product. This is but one example, and there are many others in all areas of science that demonstrate this point. It is clear that innovation is the key to the future and the human drive to understand nature is the key to future innovation. Society must do all that it can to preserve, nurture and encourage curiosity and the drive to understand.

The Next Generation of IP – Flow Routing (SSGRR-2003)IPSI-2005 MONTENEGRO

September 24 – October 1, 2005

50

Lawrence G. Roberts, The Father of the InternetUnited States of America

For the last 33 years IP routers have not changed, they still support only “best effort” traffic. However, the bandwidth available to people has been increasing rapidly with the advent of broadband access. The result is that many new services are now desired that require far better QoS than “best effort” IP can support. Also, with broadband, the problem of controlling the total usage and carrier expense has become important. Thus, it has become critical to improve both the delay performance and the control of bandwidth for IP service, much as was accomplished in ATM. Also, call rejection for high bandwidth streaming services like video is required instead of random discards if quality is to be maintained. All these problems can be solved with no change to TCP/IP by routing flows rather than packets. This requires keeping some state information for the duration of the flow, but this information can be captured on the fly as the first packet goes by. This permits an IP flow router to achieve all the capabilities of an ATM switch, but without the call setup delay and at a lower cost than a conventional IP router.

Number and Organization of Primary Memory Objects in the Brain (IPSI - 2004 Montenegro)P.G. de Gennes, Nobel LaureateCollege de France, France

A memory area contains a large number (N ~10) of neurons, each of which is connected with ma neighbors (number of efferents:Z ~104). But the connections are poor: the probability for one connection to be efficient is p ~10-2. This is important: different memory objects must be independent. We discuss how a definite memory object can be stored on a cluster of well connected neurons, and what is the statistics of these clusters. The average number M of neurons per cluster is contained within two limits: if M is too small, the memory is not faithful. If M is too large, the storage capacity is too small. Various consequences of this picture will be presented.

Mastering the e-Science Herbert Simon, Nobel LaureateUnited States of America

Our generation like all its predecessors leaves many tasks – hopefully no more than it inherited – for the next generation to take up; but even knowing that it must be so does not remove one’s sense of loss in the parting.

Computer Architecture: Concepts and Systems Kenneth Wilson, Nobel LaureateUnited States of America

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

51

The coming of the computer has created a revolution as profound as the change from the Middle Age to the Renaissance. Many of the changes that took place around the time of the Renaissance – the invention of printing the development of systematic experimental science, the invention of oil painting – have analogs today, made possible by the computer.

Neural Networks: Concepts, Applications, and Implementations Leon Cooper, Nobel LaureateUnited States of America

When interest in neural networks revived some fifteen years ago, few people believed that such systems would ever be of any use. Computers worked too well; it was felt that they could be programmed to perform any desired task.

New Space Technology: 1km Tether to 100,000km Space ElevatorHironori A. Fujii, The Father of Space Elevator Japan

Tether technology is a very old technology used for human activity in fabric works for clothes, fishing and hunting, building, and tethering horses and dogs. The tether technology is now becoming one of new and promising technologies for human space activities as spacecraft thrusters, power generators, and important elements of space infrastructures. The present paper addresses some recent works of the author on the space tether technology applied to an aurora experiment using a sounding rocket, a space solar power satellite and a space elevator for lifting us from the Earth to space.

Design is an Art FormMichael Flynn, Father of Computer Architecture RevolutionUnited States of America

Design is an art form in which the designer selects from a myriad of alternatives to bring the "optimum" choice to a user. In many complex systems the notion of "optimum" is difficult to define. Indeed, the users themselves will not agree, so the "best" system is simply the one in which the designer evaluates the options and takes the responsibilities.

Are We Going Towards Artificial Man? Humanoid Robots: Past, Present State and the Future

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

52

Miomir Vukobratovic, The Father of Zero Point Moment in RoboticsSerbia and Montenegro

Rapid development of humanoid robots brings about new shifts of the boundaries of Robotics as a scientific and technological discipline. New technologies of components, sensors, microcomputers, as well as new materials, have recently put up the barriers to real-time integrated control of some very complex dynamic systems such as humanoid robots are, which already today possess about fifty degrees of freedom and are updated in microseconds of controller signals. In view of the above statements, the work for the first time raises the essential question on the justifiability of increasing the number of degrees of freedom of humanoid robots, having in mind that for the overall skeletal activity man has at its disposal roughly about 650 muscles of human body which could be approximately expressed by more than three hundreds equivalent degrees of freedom, i.e. the same number of biological actuators.

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

53

Authors

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

54

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

55

A

Alain Lepage - 9Alexey J. Skopin - 9Aleksandar Kovacevic – 44, 45Aleksandra Jankovic – 46Aleksandra Jovic-Vranes - 47Aleksandra Kovacevic – 43, 44, 45Aleksa Prijic – 45Aleksandar Stanic - 45Alvaro Araujo Pinto - 28Andreas Buscher - 23Andrija Bosnjakovic – 45A.S.M. Hoque – 10A. Vranes - 45

B

B. Chan - 34Bill Palmer - 10Bob Richardson - 51Boris Delibasic – 15Boris Vranes - 47Brenda Anugwom - 11B. Djordevic - 11B.M. Alom - 10

C

Chaodit Aswakul - 13Charles Milligan – 14, 43Chatkwan Wannasiri - 13

D

Dag von Lubitz –14Darko Jovic – 41, 44, 45D. Jovanović - 47Darko Krulj – 15David Fraga Aydillo – 28

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

56

Dejan Stefanovic - 47

Dennis S. Karjala – 15Doug Vucevic – 17Douglas M. Cotner – 18Dragan Solesa – 18Dusko Spasovski - 19

E

Eija Paavillianen – 23Emir Skejic - 19

F

F.D. Egitto - 34Fred B. Holt- 42Furst Karin – 16, 17

G

Gabriel Neumann – 21Ghislain Hoffman - 25Gihyun Jung - 24

H

Harold Kroto – 51Heli Ruokamo – 18, 19Herman Tromp - 25Hideaki Miyashita - 21Herbert Simon - 53Hironori A. Fujii – 36, 54

I

Ivan Cukic - 41Ivana Vujovic – 41, 45Ivan Ivanov – 46Ivan Seder - 21

J

Jan Egil – 16Jaecheol Ryou - 22Jelena Krunic – 42, 43, 45Jerome Friedman – 52Jianlong Chen - 32

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

57

Jihyun Park – 22Joongsoon Jang - 24Jose Carlos Teixeira – 22Jose G. Vargas-Hernandez – 23Jose Manuel Moya Fernandez - 28Jovan Popovic – 42, 45Juan-Mariano de Goyeneche y Vazquez de Sellas - 28Julita Sansoni - 23Junil Kim - 22

K

Karabeg Dino – 16, 17K.J. Blackwell – 34Katarina Stankovic - 47Kathryn Hoehn Anderson - 23Kenneth Wilson – 53Ki-Song Yoon – 22, 23Koenraad Vandenborre - 25Kyunghee Choi - 24

L

Lawrence G. Roberts - 52Leon Cooper – 54Lo Pan - 32

M

Marija Radovic – 44, 45Marija Miletic - 45Marie-Luise Friedemann – 23Marc Rabaey – 25Marko Jovic - 47Michael Flynn – 54Miika Lehtonen – 19Mikael Salaun - 30Milan Martic – 15Milan Obric - 18Milija Suknovic - 15Milutin Cupic - 15Milorad Ignjatov - 46Miomir Vukobratovic – 55Mirko Novak - 25

N

Nenad Korolija – 42, 45, 46IPSI-2005 MONTENEGRO

September 24 – October 1, 2005

58

N. Macek – 11Nedzad Repcic - 26Nilmini Wickramasinghe – 14Nowduri Srinivas - 27

O

Octavio Nieto-Taladriz Garcia - 28Ognjen Sobajic – 45Olivera Gajcanski - 45

P

Pavle R. Andjus - 37Paivi Astedt-Kurki – 23Pattamaporn Busapathumrong - 28Pirkko Hyvonen - 19P.G. de Gennes - 53Predrag Minic – 42, 45

R

R. Stojanovic - 29Rita Kerr - 23Ronny Weinkauf - 21

S

Saiful Islam – 10S. Miskovic – 11Sang-Bum Park - 31Sangyong Lee - 24Sasa Rudan – 43, 44, 45, 47Sinisa Rudan - 47S. Omerovic - 45S. Stojanovic - 29S. Strbac – 11Seppo Tella – 19Sergio Beker - 30Seungkyu Park – 24Shrigovind Tiwari - 32Soo-Yong Lee – 31S.R. Krasniak - 34Steven M. Halladay – 14Sun Lun Ping – 32Sushil Kulkarni - 33_____________________________________T

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

59

Taeyoung Park - 24Teresa Gaspar – 22Terje Gjengedal - 33Tobias Neumann - 21

V

Veljko Milutinovic - 41Virgil Boussa – 42V.R. Markovich - 34

Y

Yang Dong - 30Yeonjeong Jeong – 22, 23

Z

Zdenek Votruba - 25Zoran Babovic – 42, 43, 44, 45

IPSI-2005 MONTENEGROSeptember 24 – October 1, 2005

60

Schedule

General Conference Schedule

Saturday, September 24, 2005:Arrival day (Registration: 18:00 – 22:00)

Sunday, September 25, 2005:09:15 - 20:15 (Bus Tour of Montenegro)20:15 Welcome Dinner at the Sveti Stefan Island Hotel (Registration: 18:00 – 22:00) Monday, September 26, 2005:09:15 - 11:15 Speakers Meet Chairmen in Casino (Registration: 08:00 – 12:00)11:30 - 13:30 Opening Ceremony (Welcome Addresses + Keynotes)13:45 - 15:45 Cocktail16:00 - 18:00 Special Event: DataMining and SemanticWeb (Tutorial Presentation)18:15 - 20:15 Special Event: Modern University of the Future (Panel Discussion)20:15 Regular Dinner

Tuesday, September 27, 2005:09:15 - 13:30 and 16:00 - 20:15 Technical Presentations20:15 Regular Dinner

Wednesday, September 28, 2005:09:15 - 13:30 and 16:00 - 20:15 Technical Presentations20:15 Regular Dinner

Thursday, September 29, 2005:09:15 - 13:30 and 16:00 - 20:15 Technical Presentations and Closing Ceremony20:15 Regular Dinner

Friday, September 30, 2005:09:15 - 18:00 Boat Tour of Montenegro Coast (weather permitting) 20:15 Regular Dinner

Saturday, October 1, 2005:Departure day (registration desk open till noon)

Hotel Breakfast: 07:00 - 11:00

Lunch: On your own (not included in the conference package)

Hotel Dinner: 20:00 – 23:00 (piano from 20:00 till 22:00)

After-Dinner Music on Selected Days (Live on Sunday and Friday):22:00 – 01:00

Important Note: Boat trip of Adriatic represents a crown of this conference.Options to expect:(a) Boat Jadran is a medieval replica(b) Boat Jadranka (another boat) belongs to the President of the country(c) Another boat selected by the organizersThe trip is scheduled for Friday.

IPSI - 2005 MONTENEGRO Conference Schedule

Saturday, September 24, 2005:Arrival day (Registration: 18:00 to 22:00)

Sunday, September 25, 2005:09:15 - 20:15 (Bus Tour of Montenegro)20:15 Welcome Dinner at the St. Stefan Island Hotel (Registration: 18:00 – 22:00)

Monday, September 26, 2005:09:15 - 11:15 Speakers Meet Chairmen in Casino (Registration: 08:00 – 12:00)11:30 - 13:30 Opening Ceremony (Welcome Addresses + Special Keynotes) Erich Neuhold “Semantic Web” Borko Furht “Visions of Engineering in the New Global Economy”13:45 - 14:00 Cocktail14:00 - 16:00 Break16:00 - 18:00 Special Event: DataMining and SemanticWeb (Tutorial Presentation by Veljko Milutinovic)18:15 - 20:15 Special Event: Modern University of the Future (Panel Discussion)20:15 Regular Dinner

Tuesday, September 27, 2005:09:15 - 09:45 Hirronori A.Fuji “The Shortest Way in Space”

09:45 - 10:15 Steven M. Halladay, Charles A. Milligan “Knowledge vs. Intelligence”10:15 - 10:45 Terje Gjengedal “ICT in Emerging Energy Markets”10:45 - 11:15 Pirkko Hyvonen, Miika Lehtonen,Heli Ruokamo, Seppo Tella “Emotionality, Experientiality and Sensationality in Network-Based Mobile Education: Looking into the Potential of Affordances”

11:15 - 11:30 Break

11:30 - 12:00 Hideaki Miyashita “Meaning of ‘Individuals Diversity’ for Information-System-Design-as Organization-Design and Significance of ‘Web-based’ as Design Solution”12:00 - 12:30 Kathryn Hoehn Anderson, Marie-Luise Friedemann, Paivi Astedt-Kurki, Andreas Buscher, Rita Kerr “Strategies to Incorporate Family Health Assessment and Intervention in Clinical Practice through On-Line Teaching”12:30 - 13:00 Mirko Novak, Zdenek Votruba “Prediction Diagnostic for Warning of Catastrophes”13:00 - 13:30 Sushil Kulkarni “Envelope Model: Data Exccess from any where”

13:30 - 16:00 BREAK

16:00 - 16:30 Pavle Andjus, Aleksandar Bajic “Multi-Tasking” In Laser Scanning Confocal Misroscopy towards Cell Profiling16:30 - 17:00 Dusko Spasovski “Evidence-based Medicine and Internet”17:00 - 17:30 Alain Lepage “Political System’s Evaluation Using Markov Model with Sustainability and Safety Reverse Processes”17:30 - 18:00 Karabeg Dino, Furst Karin, Jan Egil Hagen “Memetic Engineering – Authentic Travel International Example”

18:00 - 18:15 Break

18:00 - 18:30 Furst Karin, Karabeg Dino “What is Authentic Travel – An Experiment in Polyscopic Knowledge Representation”

18:30 - 19:00 Marc Rabaey, Koenraad Vandenborre, Herman Tromp, Ghislain Hoffman “Aligning Business Integration with ICT Capabilities: A Holistic Approach”19:00 - 19:30 Jihyun Park, Yeonjeong Jeong, Ki-Song Yoon, Jaecheol Ryou “Design a License Server to Protect the Multi-level Distributed Digital Content" 19:30 - 20:00 S. Stojanovic, R. Stojanovic, I. Obradovic “Internet Based Telemedicine Services in Montenegro-Challenges and Experiences”

20:15 Regular Dinner

Wednesday, September 28, 2005:09:15 - 09:45 Dennis S. Karjala “UNIX, Linux, and the Software Copyright”

09:45 - 10:15 V. R. Markovich, F. D. Egitto, S. R. Krasniak, B. Chan, K. J. Blackwell “Z-Axis Interconnection for Enhanced Wiring in Organic Laminate Electronic Packages” 10:15 - 10:45 Dragan Solesa, Milan Obric, Heli Ruokamo “Professional Competences of Media Designers”10:45 - 11:15 Douglas M. Cotner “The Urban Ecological Entropic Black Hole (IES) A Measured Discourse Concerning the Mega-City, Within the Context of Both a Contemporary and Future Sustainable World Environment”

11:15 - 11:30 Break

11:30 - 12:00 Zoran Babovic “Media-Retrieval from Partial Downloads”12:00 - 12:30 Sang-Bum Park “An Analysis of the Impact of the 1997 Economic Crisis on the Dynamic Relationship between Interest Rates and Inflation: The Case of Korea”12:30 - 13:00 Yang Dong “A Study on Chinese Learners’ Communication Strategies”13:00 - 13:30 Bill Palmer “The Chemical and Educational Achievements of Henry Edward Armstrong (1848 -1937)”

13:30 - 16:00 BREAK

16:00 - 16:30 Darko Krulj, Milutin C., Milan Martic, Milija Suknovic, Boris Delibasic “New Approach to Data Warehouse Development”16:30 - 17:00 Ivan Cukic “Bringing the Free Software to the Public: Creating the GNUzilla Magazine Project”17:00 - 17:30 Jose Carlos Teixeira, Teresa Gaspar “Advanced E-learning Environment to Increase the Quality of the Global Learning Process” 17:30 - 18:00 Doug Vucevic “Project is a Problem Scheduled for Solution”

18:00 - 18:15 Break

18:00 - 18:30 Shrigovind Tiwari “Engineering Vacuum Using High Density Packets of Electrons for Space Flight Applications”

18:30 - 19:00 Soo-Yong Lee “An Analysis of How Co-movement and Causality of International Interest Rates Affects the Mechanical Industry of Korea”19:00 - 19:30 Mikael Salaun, Sergio Beker “Autonomic Information Networking: BRAIN”19:30 - 20:00 Junil Kim, Yeonjeong Jeong, Ki-Song Yoon “A Study on the Multiple Packaging Techniques for Digital Rights Management of Discrete Media”

20:15 Regular Dinner

Thursday, September 29, 2005:09:15 - 09:45 Ivan Seder, Ronny Weinkauf, Tobias Neumann, Gabriel Neumann “Reusable agent-based Framework for Deployment in Multiagent Systems”09:45 - 10:15 David Fraga Aydillo, Juan-Mariano de Goyeneche y Vazquez de Sellas, Jose Manuel Moya Fernandez, Alvaro Araujo Pinto, Octavio Nieto-Taladriz Garcia “Advantages and Disadvantages of Distributed Systems' Classical

Approaches Applied to Next Generation Domotics”10:15 - 10:45 Y. M. Haddad “On the Functional Characterization of “Intelligent” Materials”10:45 - 11:15 Chatkwan Wannasiri, Chaodit Aswakul “Performance Evaluation of Optimal Interconnection-based Routing Algorithms in Multi-operator Telecommunication Network”

11:15 - 11:30 Break

11:30 - 12:00 Nenad Korolija “Power System Quality”12:00 - 12:30 Sasa Rudan “Individually Driven e-Learning System“12:30 - 13:00 Sinisa Rudan Multimedia”Riding Multi-Headed Dragon”13:00 - 13:30 Sangyong Lee, Joongsoon Jang, Seungkyu Park, Kyunghee Choi, Gihyun Jung, Taeyoung Park “A Test Automation Tool for Car Temperature Controller"

13:30 - 16:00 BREAK

16:00 - Panel Discussion and Ad-Hoc Presentations of Belgrade Students

Notes