{"title":"The System for Detecting Lead in Solders","authors":"Machan Ladislav, P. Steffan","doi":"10.1109/ICONS.2009.42","DOIUrl":"https://doi.org/10.1109/ICONS.2009.42","url":null,"abstract":"This article describes the design system for the determination of lead in solders used in electrotechnic industry. It were studied and proved methods of electrochemical detection focused on heavy metals. The general aim is principles of quantitative heavy metal detection by the electrochemical methods, optimal method selection and construction of detecting instrument.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133770496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tripuresh Pandey, Brijmohan Singh, D. S. Kushwaha, A. Misra
{"title":"Authentication and Billing Framework for Service Oriented Architecture","authors":"Tripuresh Pandey, Brijmohan Singh, D. S. Kushwaha, A. Misra","doi":"10.1109/ICONS.2009.25","DOIUrl":"https://doi.org/10.1109/ICONS.2009.25","url":null,"abstract":"The current business environment has become still more demanding in which organizations are under increasing pressure not only to increase revenue but also to respond quickly to changing market conditions. These organizations shall only be successful if they transform themselves and adapt on demand businesses paradigm. There is constant demand for innovation and shorter time to market for products and services. All this has led to newer software engineering paradigms of Service Oriented Software Engineering (SOSE),Software as a Service (SaaS) & Service Oriented Architecture(SOA). These paradigms come with associated security risk.This paper presents a frame work wherein authentication of the clients and billing of services used by client is carried out.In order to mitigate the security risks, our proposed architecture changes the key within a time period which is less than the minimum successful brute force time of our encryption algorithm.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131388039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extracting Value from P2P Content Delivery","authors":"R.K. Ege, Li Yang, R. Whittaker","doi":"10.1109/ICONS.2009.35","DOIUrl":"https://doi.org/10.1109/ICONS.2009.35","url":null,"abstract":"The Internet has enabled sharing of data on an unprecedented scale. Data of all forms and shapes is becoming easily accessible. Peer-to-peer content delivery approaches enable massive scale in the amount of data volume that can be efficiently delivered. The openness of delivery demands adaptive and robust management of intellectual property rights. In this paper we propose a framework to address the central issues in content delivery: a scalable peer-to-peer-based content delivery model, paired with an access control model that balances trust in end users with a risk analysis to the data provider. Our framework will enable data providers to extract the maximum amount of return, i.e. value, from making their original content available. We provide a tool to leverage the greatest amount of reward from the intellectual property that is released to the Internet.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128834990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Agents and Their Ontology Serving a Federated Identity Platform","authors":"F. Layouni, Y. Pollet","doi":"10.1109/ICONS.2009.30","DOIUrl":"https://doi.org/10.1109/ICONS.2009.30","url":null,"abstract":"Like the Web services, federated identity wins gradually businesses. The creation of an infrastructure of federated identity is a viable alternative to current systems.For employees or users, a federated identity leads to a better experience of the Internet, a greater level of customization, more security and a real control of this identity. In this work we will propose choreography for a platform of federated identity based on mobile agents whose benefits will offer more autonomy and flexibility. The use of agents will be accompanied by a definition of ontology allowing them to rely on a single vocabulary, a structured description to better operate and cooperate.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"426 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116006847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Bartusek, E. Gescheidtová, R. Kizek, Z. Dokoupil
{"title":"Data Processing in Studying the Growth of Early Spruce Embryos, Using MR Imaging Techniques","authors":"K. Bartusek, E. Gescheidtová, R. Kizek, Z. Dokoupil","doi":"10.1109/ICONS.2009.11","DOIUrl":"https://doi.org/10.1109/ICONS.2009.11","url":null,"abstract":"The technique of MRI (Magnetic Resonance Imaging) can be used to determine the number of hydrogen nuclei in biological tissues or when monitoring the growth of tissue culture. To assess the growth rate, the increase in the content of proton nuclei, and the shape of clusters of early growing somatic embryos, examinations were conducted using the MR techniques [1]. The measurements were part of research aimed at verifying the hypothesis of increased water content during the growth of tissue culture contaminated with cadmium. The culture to be measured was placed in the working space of a tomograph and a suitable direction of the slice plane was chosen, in which the MR image was then measured. The intensity of an image weighted by spin density is proportionate to the number of proton nuclei in the chosen slice, and the MR image is the mapping of their distribution in the cluster of growing tissue culture under examination [2]. The same technique was used to characterize the growth of early spruce embryos contaminated with lead and zinc. In the course of long-term measurements it is not possible to guarantee the stability of MR system and therefore the results were first normalized. The intensity integral was calculated from the MR images, which characterizes the number of protons of the growing cluster. The changes in the integral during the growth were established. The growth of tissue culture was evaluated from the size of clusters in diffusion images, which characterizes the change in the volume of clusters. The techniques for processing the data measured are given in the present paper.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116173600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaboration Strategies for Distributed Teams: A Case Study of CAD Systems Integration","authors":"Kurt E. Madsen","doi":"10.1109/ICONS.2009.46","DOIUrl":"https://doi.org/10.1109/ICONS.2009.46","url":null,"abstract":"Software development becomes more challenging when teams are geographically distributed. One cause is that certain activities in the development lifecycle are inherently collaborative. This paper presents our experiences applying strategies that improved collaboration on our global team. Our experiences are drawn from a project in which we developed a system to integrate a computer-aided design tool with an online parts library.First, we identify common barriers to collaboration and the challenges they presented to our team. Barriers such as language differences, time zones, and miscommunication hindered our progress by creating challenges such as ambiguity in requirements, misunderstandings of design intent, and rework. Next, we present the strategies we used to overcome these barriers. Our approach led to a successful project with a few detours along the way.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125379701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System Dynamics Based Risk Management for Distributed Information Systems","authors":"Denis Trček","doi":"10.1109/ICONS.2009.40","DOIUrl":"https://doi.org/10.1109/ICONS.2009.40","url":null,"abstract":"Networked information systems have not been restricted to closed organizations environments for more than a decade. They are now crucial in supporting operations of infrastructure, ranging from power plants to air-control systems. These networked information systems, essentially forming the current internet, are thus highly sensitive kinds of infrastructure where security plays a central role. However, assuring their security has to address certain specific aspects with regard to risk management. This paper presents a new approach to support decision making in this complex area. It is based on a generic risk management model for distributed information systems that deploys system dynamics. Such an approach provides many advantages, like suitability for interdisciplinary use, providing a graphical view on the system structure and components relationships, real-time support for “what-if” scenarios, and the possibility for inclusion in automated decision support systems. It is especially suitable for education and risk awareness programs in organizations.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125459033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signature Matching Applied to Simulation/Frame Duality","authors":"Vincent Albert, A. Nketsa","doi":"10.1109/ICONS.2009.32","DOIUrl":"https://doi.org/10.1109/ICONS.2009.32","url":null,"abstract":"A component-based framework for Modeling and Simulation (M&S) is proposed as a solution for handling the complex problem of analyzing the validity of a M&S enabling product. Validity refers to the degree that a model and its behavior are suitable representations of the real system and its behavior with respect to an intended purpose of model application. A set of properties related to simulation limitations and capabilities is proposed. Structured by a formal framework, those properties allows simulation user specifying their expected degree of validity to reach their intended purpose. Then compatibility rules are specified and signature matching is used to check the compatibility between the M&S enabling product and its intended purpose.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126949635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified Multi-layer Feedback Delay Network for Auditory Space Simulation","authors":"M. Balík","doi":"10.1109/ICONS.2009.52","DOIUrl":"https://doi.org/10.1109/ICONS.2009.52","url":null,"abstract":"This paper deals with a feedback delay network that has the feedback implemented with unitary matrix. The main contribution is the description of implementation of modified multi-layer feedback delay networks for computationally effective and high-quality multi-channel simulation of an auditory space. This new reverberation digital system is prepared for real-time processing and it meets the requirement for simulation with 8-channel output. This new system also provides a better control of simulation parameters that provides fine and accurate auditory space modeling than it has been common up to now with the perceptual approach to auditory space simulation.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125228987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Whole Brain CT Perfusion Maps","authors":"Petr Maule, J. Klecková, V. Rohan","doi":"10.1109/ICONS.2009.37","DOIUrl":"https://doi.org/10.1109/ICONS.2009.37","url":null,"abstract":"Current method of brain perfusion examination using computed tomography (CT) is based on dynamic observation of contrast medium bolus flowing through brain bloodstream at a pre-selected brain layer. Observed area dimension depends on instrument possibilities, amount of contrast medium and radiation dose. This examination produces maps showing values of Cerebral Blood Flow (CBF), Cerebral Blood Volume (CBV), and Mean Transmit Time (MTT). Presented method shows how to generate perfusion maps for whole brain. It is done by combination of Non-Contrast-CT examination (NCCT) with Angiographic-CT examination (CTA). Generated maps have the same character as CBV maps.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134103568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}