Home | About Chair | About University | About Department | News | Study Plans | Publications | Researches |
Prof. H.Meladze:
3. Published (with N. Skhirtladze, I. Bliadze, R. Bochorishvili, P. Tsereteli) the book : Model + Algorithm + Program = Informatics, Tbilisi University Press, Tbilisi, 2000 (in Georgian). Short Reference of this book:
Prof G. Beltadze:
Prof. J.Peradze:
Prof . T.Vashakmadze:
Associated Prof. Zurab Gegechkori:
Associated Prof. Nugzar Papukashvili:
Associated. Prof. Anzor Shapatava
Associated Prof. Paata Tsereteli: Associated. Prof. Simon Razmadze Published following books:
Now was published the book Windows 98. Step by Step. Georgian edition. Published by Bakur Sulakauri, Publishing, Tbilisi, Geotgia, 2000. Editor Associated. Prof. Simon Razmadze
Associated. Prof. Teimuraz Kiviladze Senior Teacher Giuli Gunava Assistant Eka Gordeziani: 1.Read the report on Work-shop of INRIA-VIAM (Tbilisi, September, 2000); 2. Participated and reported on scientific conference, dedicated to "Student days", Javakhishvili State University (Tbilisi, May 2000).
Assistant Anna Sikharulidze
Assistant Michael Tsiklauri: Assistant Eka Katamadze: Prizes and Awards, Participate in competitions for getting grants
The Project-Proposals were represented with: INTAS Report 1.
TITLE, REFERENCE NUMBER a) Title: A New Approach to Analysing Fuzzy Data and Decision-making Regarding the Possibility of Earthquake Occurrence b) Reference No.: INTAS-97-2126 c) Project Coordinator: Francisco Criado Torralba d) Report Period: October 1998-October 2000 Georgian, German and Spanish
Maths Teams The main task of the mathematical teams was to create a mathematical model and formulate recommendations for decision-making regarding the three principal elements of an earthquake (place, time, magnitude). At
present, the situation is complicated by the enormous accumulation of
scarcely regulated information and the lack of analysis on its nature,
which is so necessary for developing fast and effective data processing
methods. This is one of the most important aspects of the task in hand
(and the project, for that matter). The approach being used was
determined by the following factors: 1.
The researchers’ vision of the present state of the earthquake
problem. 2.
The type of precursors characterising the region and available
for measurement in real conditions. 3.
The nature of information and its analysis. 4.
A suitable selection of data processing methods. During
the initial period dedicated to gathering and processing available
information, the overall conclusion was that this information was of a
probabilistic-possibilistic nature, which was revealed by a detailed
analysis. Based on these findings, the so-called fuzzy discrimination
analysis (see Annex #? (“A New Approach to Analysing Fuzzy Data and
Decision-making Regarding the Possibility of Earthquake Occurrence”)),
along with the connectivity analysis (see Annex #? (“A New Approach to
Analysing Fuzzy Data and Decision-making Regarding the Possibility of
Earthquake Occurrence”)), was chosen as the most effective method for
processing primary data. In the final stage of forecasting earthquake
occurrence fuzzy grade statistics were applied, since such an approach
enables one to view the dynamics of the decision-making process (see
Annex #? Software “Micisdzvrebi”). The
created model made it possible to evaluate the associated probabilities
and consequently that of the fuzzy measure. Evaluation was carried out
by the principle of least effort, which in this case reduces to the
principle of maximum entropy (see Annex #? (“Principle of least effort
and evaluation of the probabilities of fuzzy random events”)). To
make the final “classic” decision an additional principle was
needed. For example, the decision can be made according to the maximum
of the possibility distribution function EMBED Equation.3
of the decisions fuzzy subset (generalised solution), or as the final
decision one can accept the non-fuzzy subset nearest to fuzzy EMBED
Equation.3. The
aforesaid discrimination and connectivity analyses gave the forecasting
development dynamics over ten days of observation. But a proper forecast
at an arbitrary moment in time, based on the said observation, had to be
made with the aid of fuzzy grade statistics using the results of the
said analyses. The
new method proposed here for analysing fuzzy data for decision-making
regarding the possibility of earthquake occurrence considers the
fuzziness of precursors and demarcation lines of fuzzy grades. The
membership functions of precursors and fuzzy grades are designed on the
basis of Choquet’s second order upper and lower capacities.
Consequently, the sample numbers in a certain grade of forecasting
factor occurring in the each forecasting grades of decisions are fuzzy
numbers, instead of frequency numbers of the classical classification.
Therefore, a sample represents not only itself but a group which is
close to it. Such a method of processing insufficient and confusing data
more accurately and reliably represents a practical case of earthquake
forecasting. This method is presented in the form where the number of
precursors, triggering factors, the interval range of each grade of
decisions can be selected arbitrarily. Research
carried out in connection with the project showed that methods of fuzzy
mathematics can be considered as the conceptual base for decision-making
in forecasting problems. Associated Prof. Temur Zarqua formed four teams in Informatics from CSIT students which secured first, four-six places in North –West European (Caucasus region) Semifinal Competition (Tbilisi, December, 2000). Several combined teams participated in the Olympiad: I team: T. Arobelidze, B. Bartaya, G. Mania II team: D. Mishelashvili, A. Gvinepadze, A. Mania III team: C. Tvalodze, D. Ratiani, G. Khetsuriani At faculty is issued from 1968 year the international scientific journal
Editor in Chief: T. Vashakmadze, Prof ( Javakhishvili Tbilisi State University, Tbilisi, Georgia ) Vice Editor: Richard Megrelishvili, Prof. (Javakhishvili Tbilisi State University, Tbilisi, Georgia) Scientific Secretaries: Eka Gordeziani – Applied Mathematics; Anna Sikharulidze – Computer Science Sciences Editorial board: Ivo Babuska, Prof ( Texas State University,Austin USA ); Vladimir Chavchanidze, Acad. (Javakhishvili Tbilisi State University, Tbilisi, Georgia); Phylippe J. Ciarlet, Acad. (Pier&Mary Curie University, Paris, France); Francisco T. Criado, Prof ( Malaga State University, Malaga, Spain ); Tamaz Gachechiladze, Assist. Prof. (Javakhishvili Tbilisi State University, Tbilisi, Georgia); Tamaz Gamkrelidze, Acad. (Javakhishvili Tbilisi State University, Tbilisi, Georgia); Robert P. Gilbert, Prof. ( Delaware State University, Newarc, USA); Moris Jibuti, Assist. Prof. (Javakhishvili Tbilisi State University, Tbilisi, Georgia); Nugzar Jikia, Assist. Prof. (Javakhishvili Tbilisi State University, Tbilisi, Georgia); Konstantine Kamkamidze, Prof. (Geogian Technical University, Tbilisi, Georgia); Guram Kharatishvili, Acad. (Javakhishvili Tbilisi State University, Tbilisi, Georgia); Revaz Kordzadze, Prof. (Javakhishvili Tbilisi State University, Tbilisi, Georgia); Vladimir Makarov, Prof. (Shevchenko Kiev State University, Kiev, Ukraine) Hamlet Meladze, Prof. (Javakhishvili Tbilisi State University, Tbilisi, Georgia); Michael Naranjo, Prof. ( Pascal State University, Klemont Ferrand, France) Guram Tsertsvadze, Prof. (Javakhishvili Tbilisi State University, Tbilisi, Georgia); Nikoloz Vakhania, Corr.Mem. Georg. Scien. Acad. ( Institute of Computatinal Mathematics Georgian Academy of Sciences, Tbilisi, Georgia). In the 1st volume of the journal are published the following articles of stuff of chair:
The following Aspirants and Scientific Degree Competiters study at the department researching the following themes:
In 2000 the first stream of Master's Degree Students of our department successfully qraduated from the University. The following students, who presented above listed defence papers, were awarded Masters Degree:
At present time there are 10 Masters' Degree students studying at the department. Their MA topics are as follows:
A scientific conference of Georgian mathematicians, dedicated to a
jubilee of Academician Ilya Vekua, will be held on 21st of April, 2001
in Sukhumi Branch (Sukhumi University) of Tbilisi State University. The works of conference will be published. Iv. Javakhishvili Tbilisi State University Department of Mathematical Maintenance of Computers and Information Technologies Republican Rehabilitation Center for Children 2nd Scientific Student C O N F E R E N C E "Computer Technologies in Medicine and Biology" June 8th, 2001 Since 1995 The Faculty of Applied Mathematics and Computer Science has new elective specializations in different fields of study, which include medicine and biology. Starting from the second year of learning students hear lectures about the basics in these fields from the leading specialists. From the very first steps The Republican Rehabilitation Center for Children has taken part in this affair. This form of study serves the wide educational idea of the University and the development of use of highly professional computer technologies in unrelated areas. The student conference was intended to analyze the results, to find new tasks, to attract more specialists and organizations. The 2nd conference was held on June 8th, 2001, with the following agenda:
Reports 1. Frequential analysis of kinematics of extremities during pathologies and norm. Fourier analysis of dinamometric data time series was performed. Spectral differences were detected between healthy children and children with cerebral palsy. Irine Shakhnazarian (TSU, Senior) 2. The evaluation of human movement coordination with the cross correlation method. Time correlation of right and left lower extremities was calculated based on the data collected with the help of the computer system for gait analysis. Nino Shubitidze (TSU, Senior) 3. The use of ECG registration computer system. The computerized system for ECG, RR intervalograph and spirometric data collection was described. Raw data of about 50 school children was also presented. David Metivishvili, Soso Donghuzashvili (Tbilisi State Medical University, VI Year) 4. Digital filtration of ECG. Algorithms of ECG signal filtration of periodic and aperiodic artifacts and noise were demonstrated. Oksana Maisuradze (TSU, Senior) 5. Programming interpretation of ECG components. ECG wave detection algorithms were presented for model and real signals. Diana Jirashvili (TSU, Senior) 6. The Fourier analysis of the array of RR intervals during the study of HRV regulation. The report was based on actual data and demonstrated how sympathetic and parasympathetic activities could be quantitatively separated with the use of Fourier analysis. Medea Bokeria (TSU, Sophomore) 7. Image identification computer training apparatus for children with disabilities. Special keyboard, Software and hardware were created for rehabilitation of children with perceptual disabilities. Dimitry Rakhviashvili (TSU, Junior) 8. The study of the frequential distribution of letters in Georgian texts, intended for the optimal arrangement of the alphabet on the keyboard. The modern Georgian texts were studied in order to evaluate the frequency of single and paired symbols for the optimal arrangement of letters on the keyboard. Sopho Beradze, Lasha Gigitelashvili, George Gordeladze, George Meladze, Ivane Nadiradze (TSU, Juniors) 9. The evaluation of fingers- flexibility during the use of keyboard. Special software was created for the collection of data and statistical comparison of left and right hand finger flexibility. Sopho Beradze, Lasha Gigitelashvili, George Gordeladze, George Meladze, Ivane Nadiradze (TSU, Juniors) 61th Student Scientific Conference took place in 18 - 21 April 2001 year. Our department students represented their works with success. The following papers were emphasited Artificial Neural Networks: Few
applications to the task of Classification. Artificial Neural Networks (ANNs) are quite popular again, after being forgotten for almost 20 years. This fall of interest was caused by early unsuccessful experiments, and the latest breakthroughs in mathematics and computer science brought back the lost appeal of working in this field to the scientists. A lot of ways of ANNs practical applications have been studied and much of their potential remains still undiscovered. The ANNs natural ability to classify samples is the most impressive. This ability is the single most frequent usage of neural networks: having demonstrated impressive results with such tasks as voice recognition, printed and handwritten text recognition and even game playing, this alone is enough to prove the ANNs right to exist. Though the artificial neural networks are still quite far away from their biological prototype v the human brain, which has evolved during the millions of years and now is the most complex structure the human has ever come across, the ANNs are still capable of solving many problems which would be very difficult, if not impossible, to solve in a traditional way. The ANN studies are certainly on the cutting edge of the today's technology and promises yet to advance the whole Computer Science and even change the way we look at the computers. The author has written several programs to study the behavior of different types of artificial neural networks when applied to the tasks of classification. Two board games have been written v Backgammon and Reversi (Othello). The heuristic search routine of these programs use ANNs as the static evaluation function and networks are taught to approximate the unknown (ideal¦ evaluation function by observing the course of game and learning to predict the next move's evaluation. This self-learning technique is called Temporal Difference learning and is based on the very popular Back-propagination learning algorithm. The Backgammon game has a very high branching factor and relatively difficult rule set, which requires a lot of computing power and longer learning times. To compensate v a special multi-processor version of the game was written, with the sole purpose of playing the ANN against itself on a powerful multi-processor computer, to accumulate knowledge for the single processor version. Another program written by the author is the simple symbol classification program, which demonstrates the ability of the different networks to learn various patterns and generalize. The idea behind the program is to provide simple platform for early testing of the different types of artificial neural network architecture. All three programs have been written for the WIN32 platform, except the parallel version of the Backgammon, which is source-wise portable between WIN32 and LINUX/UNIX. Languages used are C/C++ and Delphi. Interface between the threads of the parallel version is based on the MPI (Message Passing Interface) function library.
Programming Language Java and
Network Concepts in Java Java is Object-Oriented programming language developed by Sun Microsystems especially for Internet-programming; According to it's function, Java creators main intent was to replace any platform dependence from the language - the compiled Java source fail or the Virtual Code is the same for any platform (Windows, PC, Mac, Silicon Graphics etc.), it¦s converted to the user operation system and processor compatible code by the Web-Browser. As CGI vscripts, Java Virtual Code is loaded into the user's Web-Browser from the Web-Server, but against them, is interpreted and then launched by the Web-Browser, not by the Web-Server. Sun created Java for Internet programming ,but except Java Applets v special programs launched by the Web-Browser, it's possible to write usual programs on Java called Java Application (which are not launched by the Browser); difference between Java Applet and Java Application is optional. The main aspect of Internet-programming is security factors, which is goodly implemented in Java. By introducing of internal security capabilities, Java creators strongly reduced computer virus propagation possibilities by the Java Applets . Java's popularity mostly depends on the easiness of this language and great possibilities in creating of graphic and special effects for Web - sites. As mentioned above, Java was developed especially for Internet-programming - so network concepts are very important in this language. Standard Java SDK contains special classes which makes network programming very easy in Java. Mainly, Java is oriented on TCP\IP protocol, that is, network Java programs communicate using TCP\IP sockets protocol, so network security factors becomes very important. Java has great abilities to cope with security problems using SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. Secure Sockets Layer (SSL) is the most widely used protocol for implementing cryptography on the Web. SSL uses a combination of cryptographic processes to provide secure communication over a network. SSL provides a secure enhancement to the standard TCP/IP sockets protocol used for Internet communications. SSL was developed by Netscape in 1994, and with input from the Internet community, has evolved to become a standard. It is now under the control of the international standards organization, the Internet Engineering Task Force (IETF). The IETF has renamed SSL to Transport Layer Security (TLS), and released the first specification, version 1.0, in January 1999. TLS 1.0 is a modest upgrade to the most recent version of SSL, version 3.0. The differences between SSL 3.0 and TLS 1.0 are minor. One of the reasons SSL is effective is that it uses several different cryptographic processes. SSL uses public key cryptography to provide authentication, and secret key cryptography and digital signatures to provide for privacy and data integrity. The Java Secure Socket Extension (JSSE) 1.0.2 enables secure Internet communications. It provides a framework for a Java version of the SSL and TLS protocols and includes functionality for data encryption, server authentication, message integrity, and optional client authentication. Using JSSE, developers can provide for the secure passage of data between a client and a server running any application protocol, such as Hypertext Transfer Protocol (HTTP), Telnet, or FTP, over TCP/IP. By abstracting the complex underlying security algorithms and "handshaking" mechanisms, JSSE minimizes the risk of creating subtle, but dangerous security vulnerabilities. Furthermore, it simplifies application development by serving as a building block which developers can integrate directly into their applications. JSSE 1.0.2 supplements the Java 2 SDK, Standard Edition (J2SDK) by providing extended networking socket classes. It also provides a socket factory framework for encapsulating socket creation behavior and provides a limited public key certificate API that is compatible with JDK1.1-based platforms. The JSSE 1.0.2 API is capable of supporting SSL versions 2.0 and 3.0 and Transport Layer Security (TLS) 1.0. These security protocols encapsulate a normal bi-directional stream socket and the JSSE 1.0.2 API adds transparent support for authentication, encryption, and integrity protection.
Computer Networks and Network
Software On a large network spreading over a large area appears a necessity of communication between people in an interactive mode. It is certainly good to have a possibility of voice communication but it is not always available due to the low transmission line capacity on some network areas ( one of the reasons may be modems working on the dedicated lines at the speed of 33.6 kbs). As the people who communicate have already got some skill in typing it results in appearance of such programs as Chats which give one a possibility to communicate by means of typing texts. In fact a company which has a large network and a filial at a long distance will spend much less money on discussing some project if it uses chat instead of telephone line. It is also possible to exchange files during the talk. Well known programs of such kind on the Internet are ICQ and mIRC. I have the first one at my disposal and so I decided to write a program of second type. I named it Lan_mIRC. I divided the main task into two parts:
The program was written in Dephi5 programming environment. Description: How the programs work: So a client sends to the server a message which has a
type like:
Field3: Always contains only information or may be blank if a command was sent to the server. Server understands the following commands:
Server has got the following tables (yet they are program-realized, but I-m intending to link them to SQL). To each new channel a personal descriptor ID_Channels is added and to each client - ID_Users.
The same method is used for creating the link table TRelations
Server analyses the table and understands that there are two users on the channel #mirc(1) and they are 12 and 32 i.e. Lera and Lilu, it also will determine whom they are communicating with on the channels 2 and 3. During communication between the two clients a similar table is created (ID_Users and ID_Users again). When the server gets a new message he searches for a channel descriptor, which is present on this channel and transmits this message to all the users on the channel. He also sends it to the user who send it so server can check if all the users on the channel got this message. After the client has connected to the server the timer is turned on which pings the client during some period of time and if client didn-t answer three extra pings are sent. If no answer is received than it is considered that the client had left the chat and a this client record is deleted and all the users are informed about this and links in table TRelations are destroyed. Field1: Field2: Detaches nickname and puts it in brackets <>. Example<Drey> /getlist - the list of channels is sent , channels are listed separated by comma Example: #mirc, #new, #Moscow
Computer Hardware Testing The tasks that have been discussed here are quite close to such real tasks that is the damage of the computer hardware.
Use of ports of input-output for management of peripheral devices of the personal computer In a theoretical part of work the basic principles of work of input-output ports of the personal computer and peripheral devices connected to them are stated. The given practical part of work serves an illustration of principles stated in a theoretical part. The author offers the following development: The device connected to LPT to port of the personal computer, which represents the block of management of movement of a video camera, thus was developed both mechanical part and electronic. The software developed for management by the given device, supporting 3 control modes. The program is prepared for work in operational systems: Device and principle of management. The device is the two-channel receiver TTL of signals acting from LPT port. The mechanical part is based on application of exact stepper engines, used in disk drives, for moving device of reading - recording The circuit of management represents the standard circuit of inclusion of the stepper engine, which is complex enough, from the point of view of electronics, and consequently is not resulted, here is given only block diagram with the explanatory of work of the device. As it is visible from the circuit, the device consists of three functional sites:
The device uses 4 lines of LPT port - conclusions 2, 3, 4, 5. + 25 Ground. The step of the engine makes 0.8 degrees - so it was possible to achieve very exact focusing on the object. The power block of the device converts ~220 into +5 / + 12 volts. The circuit is constructed in such a manner that each channel of management (they are two) uses two lines of transfer. On the first line the strobing signal is transferred, which forces the engine to pass 1 step. ( it is reached by sending logical 1 in a line of the data with number 0 - of LPT port, program delay with length in 1 millisecond, and subsequent returning of a line in logic low status. The second line of the data (number 1) is used for a choice of a direction of rotation of the engine, logical 1 corresponds rotation clockwise, 0 -against. The absolutely similar process goes in the other channel, (movement in second planes) but here are already used lines with numbers 2, 3 v of LPT port (conclusions 4,5). Video camera is connected on USB trunk, data are deduced directly on the monitor, with an opportunity of recording of the image. Software The program allows user to operate movement of a video camera in two planes. Three control modes are supported.
Program is realized in Delphi 5 environment, with usage of functions, written on ASSEMBLER. The program is designed for work in operational systems WINDOWS 95/98/ME. Send comments to Dmitri_tb@mail.ru or call: 995 32 936572 |
© Chair Computer Software & Information Technologies, 2001