{"title":"Defining Requirements for an Incident Management System: A Case Study","authors":"M. Jäntti","doi":"10.1109/ICONS.2009.17","DOIUrl":"https://doi.org/10.1109/ICONS.2009.17","url":null,"abstract":"An incident management process is performed by the service desk that acts as contact point to the users and customers. The service desk records each incident (a failure report or a service request) reported by a user or a customer in the incident management system. Many IT organizations are interested in establishing an incident management system (IMS) that is compliant with IT Infrastructure Library (ITIL) service management framework. In this study, we aim to answer the research question is: what types of requirements should be taken account in building an incident management system. Lessons learned from a tool specification project in healthcare domain are presented. An effective IMS should be capable of handling incidents, service requests, problems and requests for change (RFCs); enable relating several incidents and RFCs to one problem; have a public known error database; and contain information on service level agreements.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129199200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multiple Criteria Decision-Making Method for Enterprise Supply Chain Finance Cooperative Systems","authors":"L. Xiang","doi":"10.1109/ICONS.2009.14","DOIUrl":"https://doi.org/10.1109/ICONS.2009.14","url":null,"abstract":"An enterprise supply chain finance cooperative system that interacts with bank, buyer and supplier environment may not have sufficient knowledge of the environment, and it is the responsibility of the environment observation units to communicate the environment context parameters to the system. This study purpose is to integrate group decision-making (GDM) approach, cooperative neural network (CNN), multi-agent and service-oriented architecture (SOA) with data warehousing to developing a multiple criteria decision-making (MCDM) method for enterprise supply chain finance cooperative system. It consists of three main components. The first component is an enterprise supply chain finance cooperative system model based on multiple criteria decision-making. In the second component, a MCDM method for enterprise supply chain finance cooperative system is proposed. The third component is a MCDM method for enterprise supply chain finance cooperative systems based on shoes manufacturing industry, an example as tested on MCDM problems for supply chain finance is presented to illustrate its effectiveness.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116495073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bandpass Sigma-Delta Modulator for Sensor Signal Processing","authors":"L. Fujcik, R. Vrba","doi":"10.1109/ICONS.2009.38","DOIUrl":"https://doi.org/10.1109/ICONS.2009.38","url":null,"abstract":"This paper presents a system architecture for sensor signal digitization utilizing a bandpass sigma-delta modulator. The first version of the proposed system architecture was implemented in 5V 0.7μm CMOS technology. The first version of the proposed system architecture is useful for our capacitive pressure sensor measurement. The paper describes the possibilities of using the proposed enhanced system architecture in impedance spectroscopy and in capacitive pressure sensor measurement. The bandpass sigma-delta modulators are well suited for wireless applications. This paper shows another way how to use its advantages.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131056228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Real-Time Video Streaming System for Best-Effort IP Networks","authors":"Lassi Lehikoinen, Tomi D. Räty","doi":"10.1109/ICONS.2009.21","DOIUrl":"https://doi.org/10.1109/ICONS.2009.21","url":null,"abstract":"This paper presents an Adaptive Real-Time Video Streaming (AVS) system that delivers real-time video stream from a network camera to multiple video receivers. The system provides an application layer rate-adaptation mechanism that adapts video quality and bit rate according to the network congestion conditions and the available bandwidth. The goal of the system is to improve the smoothness of the video playback at the receivers under varying network conditions. This is performed by concluding the highest possible video bit rate that can be used without facing bandwidth limitation problems. The system was tested and evaluated in private Ethernet Local Area Network (LAN) in which packet loss and limitation on bandwidth was generated by utilizing a network impairment emulation tool. Based on the performed tests, the system behavior was predictable. The research is based on the constructive method of the related publications and technologies and the results are derived by the implemented AVS system.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130843570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tariq Abdullah, L. Mhamdi, B. Pourebrahimi, K. Bertels
{"title":"Resource Discovery with Dynamic Matchmakers in Ad Hoc Grid","authors":"Tariq Abdullah, L. Mhamdi, B. Pourebrahimi, K. Bertels","doi":"10.1109/ICONS.2009.39","DOIUrl":"https://doi.org/10.1109/ICONS.2009.39","url":null,"abstract":"Nodes in an ad hoc grid are characterized by heterogeneity, autonomy, and volatility. These characteristics result in varying workload of the resource manager in the ad hoc grid. Therefore it is required to develop a resource al-location mechanism that can balance the workload of there source manager, hereafter referred to as matchmaker, and can enable the ad hoc grid to self-organize itself. In this paper, we define a mechanism that dynamically promotes and demotes nodes as matchmaker(s) and matchmakers back to the normal nodes in an ad hoc grid environment. The proposed mechanism uses the matchmaker workload as the basic criterion for promotion and demotion of the matchmaker(s). Simulation results show that our approach per-forms better than previously proposed solutions.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"80 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133264778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-sensor Logical Decision Making in the Single Location Surveillance Point System","authors":"M. Nieminen, Tomi D. Räty, M. Lindholm","doi":"10.1109/ICONS.2009.18","DOIUrl":"https://doi.org/10.1109/ICONS.2009.18","url":null,"abstract":"As demand for surveillance of physical locations increases, automated decision making software can help maintain the rising costs of human monitoring. The variety in different types of sensors is also growing, and making use of their consolidated data can improve the decision making process. Using the constructive research method, we aim to define a design of a surveillance system's decision making component that utilizes data fusion from multiple types of sensors. As a solution we present the Logical Decision Making Server (LDMS), used in the Single Location Surveillance Point (SLSP), a system designed for monitoring an indoors location. The decision making capabilities in the LDMS are based on user-configurable security rules, which allow security personnel to define threats based on current and recent event reports from any or all of the environment’s sensors. The LDMS has been successfully developed and integrated into an SLSP implementation.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131993875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Runtime Diversity against Quasirandom Faults","authors":"A. Gerstinger","doi":"10.1109/ICONS.2009.22","DOIUrl":"https://doi.org/10.1109/ICONS.2009.22","url":null,"abstract":"Complex software based systems that have to be highly reliable, are increasingly confronted with fault types whose corresponding failures appear to be random, although they have a systematic cause. This paper introduces and defines these \"quasirandom\" faults. They have certain inconvenient common properties such as their difficulty to be reproduced, their strong state dependence and their likelihood to be found in operational systems after testing. However, these faults are also likely to be detected or tolerated with the help of diversity in software, and even low level diversity which can be achieved during runtime is a promising means against them. The result suggests, that runtime diversity can improve software reliability in complex systems.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122896777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technologies for the Pseudonymization of Medical Data: A Legal Evaluation","authors":"T. Neubauer, Mathias Kolb","doi":"10.1109/ICONS.2009.48","DOIUrl":"https://doi.org/10.1109/ICONS.2009.48","url":null,"abstract":"Privacy is one of the fundamental issues in health care today. Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients’ privacy, approaches for protecting privacy often do not comply with legal requirements or basic security requirements. This paper highlights research directions currently pursued for privacy protection in e-health and evaluates common pseudonymization approaches against legal and technical criteria. Thereby, it supports decision makers in deciding on privacy systems and researchers in identifying the gaps of current approaches for privacy protection as a basis for further research.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124807444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Bartusek, E. Gescheidtová, L. Homolová, Z. Dokoupil
{"title":"Use of Magnetic Resonance to Determine the Circumference of Radial Slices of Norway Spruce","authors":"K. Bartusek, E. Gescheidtová, L. Homolová, Z. Dokoupil","doi":"10.1109/ICONS.2009.10","DOIUrl":"https://doi.org/10.1109/ICONS.2009.10","url":null,"abstract":"In the study of the growth of softwoods an interesting parameter is the rate of the growth of their needles. This parameter is significant in the evaluation of how economically trees use water, in particular the consumption of water in their growth in thickness and height. This is important in the study of the assimilation characteristics of plants and in the determination of physiological parameters of woods. The aim of the present study is to calculate, as accurately as possible, the total surface of Norway spruce needles on the basis of the circumference and shape of their radial slices.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123764618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Sysml to Describe a New Methodology for Semiautomatic Software Generation from Inferred Behavioral and Data Models","authors":"I. G. Alonso, M. P. A. G. Fuente, J. Brugos","doi":"10.1109/ICONS.2009.50","DOIUrl":"https://doi.org/10.1109/ICONS.2009.50","url":null,"abstract":"This article describes a new methodology designed for semiautomatic generation of software applications using the new standard of OMG consortium: SYSML. The methodology has behavior and data model inference steps. Both data and behavior are inferred, the first by XSD-Schema inference and the latter by Business Process Mining inferences. The paper describes how by using SYSML a better description of the methodology is given, a description that allows making a better design than using UML standard tools.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127884861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}