{"title":"Measuring the resilience of the global internet infrastructure system","authors":"M. Omer, Roshi Rose Nilchiani, A. Mostashari","doi":"10.1109/SYSTEMS.2009.4815790","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2009.4815790","url":null,"abstract":"Resilience is the ability of the system to both absorb shock as well to recover rapidly from a disruption so that it can return back to its original service delivery levels or close to it. In the aftermath of 9/11 and Hurricane Katrina, there has been an increasing interest in infrastructure resilience. The global submarine fiber optics cable network that serves as the backbone of the internet is a particularly critical infrastructure system that is vulnerable to both natural and man-made disasters. In this paper, we propose a model to measure the base resiliency of this global network, and explore the node to node and global resiliency of the network using existing data demand, capacity and flow information. The base resiliency of the system can be measured as the value delivery of the system after a disruption to the value deliver of the system before a disruption. We further demonstrate how the resiliency of the global internet infrastructure is enhanced through reducing the network vulnerability and increasing its adaptive capacity.","PeriodicalId":131616,"journal":{"name":"2009 3rd Annual IEEE Systems Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115990080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise architecture for complex system-of-systems contexts","authors":"P. Boxer, S. Garcia","doi":"10.1109/SYSTEMS.2009.4815807","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2009.4815807","url":null,"abstract":"An enterprise architecture is an accepted, widely used means for an organization to capture the relationship of its business operations to the systems and data that support them. Increasingly, enterprises are participating in complex system-of-systems contexts in order to meet changing customer demands that require them to collaborate with other enterprises in new and innovative ways. For a complex system-of-systems context, a shortcoming of enterprise architecture is that it presumes a single enterprise or a single, ultimate source of control. This paper explores an approach to reasoning about distributed collaboration in the complex system-of-systems, multi-enterprise context, in which this single, ultimate source of control does not exist. It outlines the ways in which the long-used Zachman Framework for enterprise architecture would need to be modified to account for multi-enterprise collaboration and decentralized governance. It proposes a concept of stratification to meet this need and puts forward the main characteristics of the methods needed to model the stratified relationships of complex systems-of-systems to their contexts-of-use.","PeriodicalId":131616,"journal":{"name":"2009 3rd Annual IEEE Systems Conference","volume":"395 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132020321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Svetlena Taneva, J. Higgins, A. Easty, B. Plattner
{"title":"Approaching the hotspot increases the impact: Process breakdowns in a safety-critical system-of-systems","authors":"Svetlena Taneva, J. Higgins, A. Easty, B. Plattner","doi":"10.1109/SYSTEMS.2009.4815767","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2009.4815767","url":null,"abstract":"This paper reports a study that examines process breakdowns in the operations of a hospital's surgical unit. We find a correlation between the stage in the surgical process in which a breakdown is detected and the breakdown impact. We derive a model of the relationship between breakdown detection, impact, and safety within the surgical domain. We discuss the practical implications for targeted breakdown prevention and detection within the process, and the latent effects on safety.","PeriodicalId":131616,"journal":{"name":"2009 3rd Annual IEEE Systems Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116109557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rationale for human modelling in human in the loop systems design","authors":"D. Fass, Romain Lieber","doi":"10.1109/systems.2009.4815766","DOIUrl":"https://doi.org/10.1109/systems.2009.4815766","url":null,"abstract":"Human modelling in human-in-the-loop systems (HITLS) design can be a complex and dynamic endeavour. Thereby it needs a theoretical framework for grounding methods and models on verified principals and an integrative approach that takes into consideration the specificity of biological organization of living systems, according to the principles of physics, and a coherent way to organize and integrate structural and functional artificial elements. This paper focuses on the rationale of human modelling for HITLS design, in the context of a conceptual framework based on Chauvet's mathematical theory of integrative physiology (MTIP).","PeriodicalId":131616,"journal":{"name":"2009 3rd Annual IEEE Systems Conference","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116564192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent strategies for secure complex systems integration and design, effective risk management and privacy","authors":"E. Hooper","doi":"10.1109/SYSTEMS.2009.4815808","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2009.4815808","url":null,"abstract":"There has been increasing challenges in the effective design of engineering complex integrated systems and Systems-of-systems in engineering and network systems. This is largely due to the integration of complex large data transfers across multiple zones of systems and network integration. The increase in transmission of highly sensitive data and challenges of data protection and of privacy, data loss prevention has major significant implications for systems engineering, systems integration, and systems analysis, design and validation. Furthermore, the design and development of complex integrated systems engineering and network systems lack effective transparency, auditability, validation and implementation of adequate security measures for transfers of highly sensitive metadata across global networks using third party and outsourced networks and the Internet and global privacy regulatory requirements for such data transfer across international borders. The major problem with current state of art approaches of controls for global critical infrastructures of Virtual Private Networks (VPN) depend on inadequate third-party systems. Thus current approaches lack transparency, auditability and validation of the implementation of adequate privacy and security controls for data transfers of highly sensitive metadata across global networks. The additional problem of obscurity has resulted in increasing concealing of unauthorized access, identity thefts, privacy and security breaches of highly sensitive data, interception through the man-in-the-middle and intermediary systems. The paper examines the effectiveness, resiliency, robustness, scalability and adaptability in the design, safety, security and usability of engineering complex integrated systems and network systems for complex large data transfers across multiple zones of systems and network integration and security.","PeriodicalId":131616,"journal":{"name":"2009 3rd Annual IEEE Systems Conference","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114333660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System design and analysis of a web-based application for sensor network data integration and real-time presentation","authors":"Patricia Morreale, Ryan Suleski","doi":"10.1109/SYSTEMS.2009.4815798","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2009.4815798","url":null,"abstract":"The design of wireless sensor network applications is an emerging area of research. The volume of data collected by a sensor network of any type can be overwhelming and the associated challenges of application processing and presentation are significant. The design of a wireless network sensor information and identification system (WiNS Id) database which archives the data reported by distributed sensors is outlined here, as well as the implemented support for queries and data presentation. The innovations in this research include near real-time support for data presentation and visual presentation of sensor nodes reporting in a geographical and temporal context. WiNS Id provides support for pattern identification and data mining in sensor systems.","PeriodicalId":131616,"journal":{"name":"2009 3rd Annual IEEE Systems Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122135071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Competencies required for successful acquisition of the Next Generation Air Transportation System","authors":"J. Armstrong, Devanandham Henry","doi":"10.1109/SYSTEMS.2009.4815838","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2009.4815838","url":null,"abstract":"The Federal Aviation Agency (FAA) is facing the challenge of significant increases in workload for the air traffic control system. The Next Generation Air Transportation System (NextGen) efforts are aimed at providing the changes to the system needed to meet that challenge. In order to be prepared, the FAA is looking at the competencies needed to develop and deploy the improvements in an effective and efficient manner. As part of this work, Stevens Institute of Technology has been tasked to review the competencies needed for systems engineering, systems integration, and software engineering. This paper reviews the initial efforts and approach to define a competency model that best fits the needs of the NextGen program.","PeriodicalId":131616,"journal":{"name":"2009 3rd Annual IEEE Systems Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127660479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creating life time value for hardware systems creative maintenance and new market","authors":"S. Fukuda","doi":"10.1109/SYSTEMS.2009.4815842","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2009.4815842","url":null,"abstract":"It is discussed if we can change our maintenance to be more creative so as to satisfy our customers expectations that our hardware products would adapt better and work better or would be “customized better” in their present environments and in the present situations, we could create life time value for our hardware systems and could bring more profits in the long run than we try to increase one time values by adding more and higher functions to our systems.","PeriodicalId":131616,"journal":{"name":"2009 3rd Annual IEEE Systems Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114601186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SOA as a catalyst to empower the warfighter through improved enterprise data access over the GIG","authors":"D. Farroha, B. Farroha","doi":"10.1109/SYSTEMS.2009.4815770","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2009.4815770","url":null,"abstract":"As private industry and the Department of Defense (DoD) move toward Enterprise Architectures (EA), CIOs have been lauding Service Oriented Architecture (SOA) as the approach to meet enterprise needs. It is clear that SOA addresses many challenges that face the DoD from information sharing to the fiscal issues of maintaining an IT infrastructure (networks, routers, desktops, peripherals, technology refresh, etc). Many large enterprises have investigated SOA, and have or will embrace it as a strategic course, no matter what underlying technology is used. However, SOA cannot be realized without the application of tried and true Systems Engineering principles with a balance between process and agility. The bottom line is that SOA must deliver a solution that crosses organizational, political and cultural boundaries as well as address the issues of information sharing regardless of where that information is actually stored. When the DoD reaches a SOA solution that supports the enterprise, the IT investments decisions should be much easier and affordable. The overall affect to programs should be easier to share, easier to enhance, easier to upgrade, easier to extend and ubiquitous data access across the enterprise. This paper explores SOA as the means to provide an Enterprise Architecture to enable information access through the implementation of data services for our strategic war-planners to our tactical war-fighters.","PeriodicalId":131616,"journal":{"name":"2009 3rd Annual IEEE Systems Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124564606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimal hybrid fault recovery for a team of unmanned vehicles","authors":"M. M. Tousi, K. Khorasani","doi":"10.1109/SYSTEMS.2009.4815805","DOIUrl":"https://doi.org/10.1109/SYSTEMS.2009.4815805","url":null,"abstract":"In this paper, an optimal hybrid fault recovery methodology is developed for a team of unmanned vehicles by taking advantage of the cooperative nature of the system to accomplish the desired mission requirements in the presence of faults/failures. The proposed methodology is hybrid and consists of a low-level (an agent level) and a high-level (a team level) fault recovery protocols. The high-level fault recovery is formulated in the discrete-event systems (DES) supervisory control framework, whereas the low-level fault recovery is based on classical control techniques. A reconfiguration strategy is proposed and designed so that the team is recovered from faults with the minimum cost to the team. Simulation results are provided to illustrate the effectiveness of our proposed approach.","PeriodicalId":131616,"journal":{"name":"2009 3rd Annual IEEE Systems Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127976487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}