{"title":"A system supporting tests of real-time telecommunication platforms","authors":"M. Czarkowski, S. Kaczmarek, R. Kawiak","doi":"10.1109/INFTECH.2008.4621588","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621588","url":null,"abstract":"The aim of this paper is to present a test system, which has been created for testing real-time telecommunication platforms. The system has been created as an automate test tool, that can execute and analyze tests without the supervision of the test personnel. This paper describes the design of the tool, which is based on the concept of software agents that allowed achieving full automation of the test procedure. Attention is paid to the systempsilas usage in performance tests, where the test system utilizes hardware traffic generators that can generate vast amount of traffic, simulating data streams from many users, and where hardware traffic analyzers are used for processing this data and providing statistics which are used in the testpsilas analysis. The system has been initially created to conduct performance tests on the Intelpsilas UMTS Radio Network Controller, but its design allowed using it testing other telecommunication platforms.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125680416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing scientific production","authors":"C. Teixeira, J. S. Pinto, J. A. Martins","doi":"10.1109/INFTECH.2008.4621581","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621581","url":null,"abstract":"A substantial amount of universitiespsila and institutespsila funding derives from their scientific achievements. Researchers are encouraged to publish new findings and ideas at an ever growing rate. How can the university keep track of the research of hundreds of scientists? How can the university rate departments and distribute funding according to scientific achievements? We present a distributed model for these tasks: a dedicated system for registering information about scientific publications (eABC); a dedicated system for harvesting statistics and respond to queries on scientific production; a dedicated system to maintain digital copies of the scientific publications (SInBAD) and finally a dedicated system to manage researchers CV (Curriculum@ua). The main challenges in each of these systems will be presented, along with a brief description of each one.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133031116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defining trustworthiness in Semantic Web by ontological assertions","authors":"K. Goczyła, T. Zawadzka, M. Zawadzki","doi":"10.1109/INFTECH.2008.4621582","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621582","url":null,"abstract":"The paper introduces the model of knowledge management system that handles some aspects of trustworthiness. A method of defining trustworthiness in semantic Web and reasoning over knowledge enriched with trust information is presented. The method provides a way of building trustworthiness information into the assertional part of an ontology. Defining trustworthiness is meant as assigning a set of features to unary and binary assertions. The model defines a ldquotrust ontologyrdquo - an ontology that allows for assigning some features to specified assertions. There is also explained how Semantic Web agents could express their requirements for trust while querying a knowledge management system. The paper concludes with some implementation aspects of a prototype system that incorporates the presented model.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131993463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speedup of branch and bound method for hardware/software partitioning","authors":"M. Strachacki","doi":"10.1109/INFTECH.2008.4621608","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621608","url":null,"abstract":"This paper presents sensitivity analysis of branch and bound (B&B) method used for hardware/software partitioning task. The impact of all B&B parameters on computation time is theoretically analyzed and results of experiments are presented. Results show that most sensitive parameters are a lower bound function, a selection rule, a branching rule and an initial solution. To shorten B&B computation time these parameters have to be set properly and additional pre-optimization step should be applied. This pre-optimization step uses simulated annealing to set parameters in limited time. Results of experiments show that the computation time speedup x130 is achieved on average. This hybrid optimization is the most efficient presented so far.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"37 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification of the fit to user profiles for UML tools","authors":"A. Bobkowska, M. Weihs","doi":"10.1109/INFTECH.2008.4621673","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621673","url":null,"abstract":"The fit of a tool to user profile has impact on the extent to which the tool supports the tasks performed by users during their work. It is related to effectiveness of use. As UML tools are usually general-purpose modeling tools, the question is whether they really support specific groups of their users. The research presented in this paper includes: identification of profiles of UML tools users, identification of features of UML tools which have impact on the fit to the profiles, a model for relating the profiles and the features of UML tools, a prototype of a tool for evaluating the fit to user profiles and case studies of applying this tool for evaluation.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129214221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Presenting a framework for agile enterprise architecture","authors":"B. Rouhani, H. Shirazi, A. F. Nezhad, S. Kharazmi","doi":"10.1109/INFTECH.2008.4621684","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621684","url":null,"abstract":"All enterprises require EA in order to use its benefits, but it is crucial for this project to be applied with formal stakeholderspsila satisfaction. A suitable framework for the enterprise requirements can be planned by the use of agile methods and its practices, in which we cannot only increase the percentage of prosperity but also we can return the asset to stakeholders as soon as possible. We put our whole creativity in what makes it better. As applying the framework, some continual reviews will correct activities. By the use of this framework the risk of the project can be reduced and also the simultaneous cooperation of enterprise architecture and project team is a reliable guarantee for prosperity. Then holding various meetings among stakeholders and presenting the rudimentary models and at last acceptance of them by the stakeholders cause our framework to proceed in a reliable way. Besides all of the stakeholderspsila viewpoints are put in the architecture, so in this way all of their needs are provided. Another point is that several educational classes will be held during its implementation for people involved in, so that the essential statement is taught to them and they can use it wherever necessary. One of the other benefits of this framework is to use a repository in order to keep information, survey, adjust models and use of agile method in all the steps of the framework Finally it is vital to say that this framework is better, faster and cheaper than the classical one.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127257203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge base views","authors":"P. Piotrowski","doi":"10.1109/INFTECH.2008.4621585","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621585","url":null,"abstract":"The paper introduces an extension to the NeeK language [2, 5]. In the current shape NeeK allows for selection of fragments of a given ontology. The selected part is automatically mapped to a database schema by data views implementation [7]. Experience with a real system using data views has shown that the resulting database schema does not necessarily reflect the needs of the business logic of an application that uses a specific data view. As a work around database views were used on top of data views to modify the schema. Analogous experience with object views, an ontology-object mapping similar to object-relational mappings like Java Persistence API [1], has shown that straight forward mapping of a given ontology is not always sufficient. The modification of NeeK language proposed in the paper allows for minimizing the need of using database views for data views and additional code for of object views. This extension can be seen as a special case of ontology mapping, but focuses on solving particular problems of NeeK rather than being a complete ontology mapping language.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"8 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133322639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"I-GEMS and Global Security","authors":"T. Kochanski, Andrzej Rucinski","doi":"10.1109/INFTECH.2008.4621696","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621696","url":null,"abstract":"This paper describes the role of the IEEE Global Education for Microelectronic Systems Initiative (I-GEMS) and its role in the nascent discipline of global security engineering and critical embedded systems engineering. Design for globalization defines the process for developing critical embedded systems in the global era. Our work specializes in systems that perform key monitoring and control functions for critical infrastructure and other applications that demand high levels of reliability.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115752984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An intelligent image processing sensor - the algorithm and the hardware implementation","authors":"M. Wójcikowski, R. Zaglewski, B. Pankiewicz","doi":"10.1109/INFTECH.2008.4621663","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621663","url":null,"abstract":"This paper describes the idea and the implementation of the robust algorithm dedicated to extraction of moving vehicles from real-time camera images for the evaluation of traffic parameters, such as the number of vehicles, their direction of movement and their approximate speed. The authors, apart from the careful selection of particular steps of the algorithm towards hardware implementation, also proposed novel improvements, resulting in increasing the robustness and the efficiency. A single, stationary, monochrome camera is used, simple shadow and highlight elimination is performed. The occlusions are not taken into account, due to placing the camera at a location high above the road. The algorithm is designed and implemented in pipelined hardware in FPGA, therefore high frame-rate efficiency has been achieved. The possible applications of the proposed algorithm and its implementation are in the area of intelligent image processing sensors in low-power, cost-effective sensor network applications, i.e. for detecting the moving vehicles on the road.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121768869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Knowledge Management in DMAIC methodology of Six Sigma projects","authors":"S. Jalali, M. Shafieezadeh, M. Naiini","doi":"10.1109/INFTECH.2008.4621692","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621692","url":null,"abstract":"Six Sigma as a powerful approach moves toward continuous and sustainable improvement by increasing customer satisfaction, and decreasing activity time and number of failures. On the other hand, Knowledge Management (KM) is a modern approach that deals with the greatest capital of organization i.e. knowledge. Although creation of more organizational knowledge for performance improvement, organization deployment, competitiveness increase, and acquiring more benefit were the overall aims of these two approaches, and Six Sigma achievements are also based on proper knowledge and its flow, a logical relationship can be seen between them. In addition, each of them aims to support growth, profitability and power another one. In this article, after reviewing the literature of studies on this relation, the link between KM and Six Sigma is investigated, and finally usage of KM tools in parts of DMAIC methodology as a practical and effective methodology for Six Sigma, have been covered.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125373963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}