{"title":"Nesting System with Quantization and Knowledge Base Applied","authors":"L. Koszalka, G. Chmaj","doi":"10.1109/ICONS.2007.36","DOIUrl":"https://doi.org/10.1109/ICONS.2007.36","url":null,"abstract":"Nesting algorithms deal with placing two- dimensional shapes on the given canvas. In this paper a binary way of solving the nesting problem is proposed. Geometric shapes are quantized into binary form, which is used to operate on them. After finishing nesting they are converted back into original geometrical form. Investigations showed, that there is a big influence of quantization accuracy for the nesting effect. However, greater accuracy results with longer time of computation. The proposed knowledge base system is able to strongly reduce the computational time.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125126709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Rule based static configuration validation technique in an Autonomous Distributed Environment","authors":"R. Kalyanaraman","doi":"10.1109/ICONS.2007.6","DOIUrl":"https://doi.org/10.1109/ICONS.2007.6","url":null,"abstract":"In a heterogeneous and complex distributed systems environment, (e.g. business integration), many software systems interchange information, each system stores environment information configuration files. At any given point of time, the interactions are based on these configurations only. Every time a system boots up it validates its own configuration. Whenever there is a failure of a component or its offline without updating, it may lose out on the current context of the environment (changes in the configuration of other systems). E.g. : DHCP induced IP/port change or a queue name change. Restarting the system without these updates may lead to several problems like erroneous/inconsistent output or failure of the component it selves. To prevent such errors we look in to building autonomy in to such systems by configuration validation. A rule based technique was devised (for individual components in a typical business integration subsystem). To Adapt to such a continuously changing environment (e.g. and to build autonomy (self-configure /self-protect/ self-correct). The rules are run either before restart of a component and whenever the administrator feels such a need arises (E.g: when a dependent enterprise system is restarted). These rules are either discovered from failure scenarios induced by configuration/dependent third- party errors or directly from rules used for monitoring various components at runtime. The rules primary check the third- party/dependency configurations, data interchange formats, enterprise data store connection parameters and software usage links. The recommended storage format is XML. An optional action tag can be utilized to perform corrective actions once a configuration error is discovered. There are options to specify the path of a operating system script or a Java class implementing a pre-defined interface. In a test environment these rules were executed by a static analyzer tool. It discovered 30% of potential fatal errors (leading to business down situations) and 82% of config based errors. Also these rule formats are reusable across systems and domain specific /standard based rules are interchangeable for similar software products e.g. FTP/email related rules. Also rules can be discovered from log/trace files for specific configuration errors.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125977682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Health Maintenance Embedded Systems in Home Care Applications","authors":"V. Srovnal, M. Penhaker","doi":"10.1109/ICONS.2007.29","DOIUrl":"https://doi.org/10.1109/ICONS.2007.29","url":null,"abstract":"In this article there are described applications of embedded systems for diagnostic and maintenance planning in healthcare applications. During the recent years, there was a rapid growth in the development of maintenance telemedicine systems and monitoring devices for patients with chronic diseases and those requiring continuous telemonitoring treatments. However most of these systems only provide telemonitoring services or basic information about the health condition of the patients. For this reason an intelligent home health care embedded system that can provide to the patients with diagnosis their health status at home is developed. As a result different types of pluggable medical transducers for patients with different illnesses can be flexibly connected to the interface of the embedded system. The home care systems are possible to use as predictive diagnostic systems.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127133926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Haze, R. Vrba, L. Fujcik, J. Forejtek, P. Zavoral, M. Pavlík, L. Michaeli
{"title":"A Novel Band-Pass Sigma-Delta Modulator for Capacitive Pressure Sensing","authors":"J. Haze, R. Vrba, L. Fujcik, J. Forejtek, P. Zavoral, M. Pavlík, L. Michaeli","doi":"10.1109/ICONS.2007.4","DOIUrl":"https://doi.org/10.1109/ICONS.2007.4","url":null,"abstract":"The paper deals with bandpass sigma-delta modulator (BP SDM), which is used for conversion of signal from capacitive pressure sensor. This approach is absolutely new and unique, because this kind of modulators is utilized only for wireless and video applications. The main advantage of BP SDM is due to its defined band. That is why it is resistant against offsets of its subcuircits. Another important advantage is low power consumption, since the BP SDM digitizes only narrow band instead of whole Nyquist band with similar dynamic range. The paper shows basic ideas of this approach and simulation results with ideal and real modulator. The main stages are implemented in switched-capacitor (SC) technique. The modulator layout is presented as well.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128058606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated Framework and a Dynamic Model of Customer Relationship System","authors":"L. Yuhui, Li Bo, Duan Wancun","doi":"10.1109/ICONS.2007.13","DOIUrl":"https://doi.org/10.1109/ICONS.2007.13","url":null,"abstract":"Today's business managers is facing increased pressures to develop and retain economically valuable customers. They are attempting to find out what rules the development of customer relationship (CR) follows when their carrying out customer relationship management (CRM). Regarding CR as a system engineering, this paper develops a conceptual integrated framework of customer relationship system (CRS), the framework including five aspects of market, process, behavior, evaluation and data, and describes each of the five aspects as a model. Based on the framework, this paper also proposes a dynamic model of CRS theoretically, and describes in detail these aspects of market, process and evaluation. The dynamic model indicates the development of CR depends on current customer state, evaluation of value from customer and enterprise, as well as value-equipoise condition between customer and enterprise. The dynamic model of CRS expresses the basic dynamic characteristic of CR.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130149200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation and Evaluation of Common Cause Failures","authors":"J. Borcsok, S. Schaefer, E. Ugljesa","doi":"10.1109/ICONS.2007.25","DOIUrl":"https://doi.org/10.1109/ICONS.2007.25","url":null,"abstract":"Success of many modern applications is highly dependent on the correct functioning of complex computer based systems. In some cases, failures in these systems may cause serious consequences in terms of loss of human life. Systems in which failure could endanger human life are termed safety-critical. The SIS (safety instrumented system) should be designed to meet the required safety integrity level as defined in the safety requirement specification (safety requirement allocation). Moreover, the SIS design should be performed in a way that minimizes the potential for common mode or common cause failures (CCF). A CCF occurs when a single fault result in the corresponding failure of multiple components. Thus, CCFs can result in the SIS failing to function when there is a process demand. Consequently, CCFs have to be identified during the design process and the potential impact on the SIS functionality have to be understood. This paper gives details about the estimation and evaluation of common failures and assesses a loo2 system. It is a survey paper that presents the newest developments in common cause failure analysis.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126756878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Context-aware and Adaptive Learning Schedule framework for supporting learners' daily routines","authors":"J. Yau, M. Joy","doi":"10.1109/ICONS.2007.3","DOIUrl":"https://doi.org/10.1109/ICONS.2007.3","url":null,"abstract":"A learning context describes the current situation of a learner related to a learning activity, and continually changes in a mobile learning environment. As a result, context-awareness in mobile learning has become an essential part when designing more adaptive mobile learning systems. In this paper, we introduce our novel Context- aware and adaptive learning schedule framework which makes use of a learning schedule to support the students' daily routines, adapts the activities to the student's learning styles and then selects the appropriate activity for the learner based on their current learning context.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129316847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software development for safety-related systems","authors":"J. Borcsok, S. Schaefer","doi":"10.1109/ICONS.2007.50","DOIUrl":"https://doi.org/10.1109/ICONS.2007.50","url":null,"abstract":"Safety-related systems mostly comprise hardware and software solutions. Due to the increasing application of complex hardware and software systems, the software systems have to be considered regarding safety as well as hardware systems. The development of a safety-related software system is similar to the development of a safety-related hardware systems. But there are still no generally accepted methods for developing safety-critical software. One has to use the methods, which fit best to the actual requirements. However, the calculation of reliability and availability for safety-related software systems is far more complex.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":" 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113951617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dealing with execution-overruns to improve the temporal robustness of real-time systems scheduled FP and EDF","authors":"Lamine Bougueroua Esigetel","doi":"10.1109/ICONS.2007.18","DOIUrl":"https://doi.org/10.1109/ICONS.2007.18","url":null,"abstract":"This paper presents a mechanism for execution-overrun management in preemptive real-time systems composed of sporadic tasks. We consider faults due to Worst Case Execution Time violations. Based on fault prevention, we determine the allowance of a task defined as the maximum extra duration that can be granted to a faulty task without compromising the timeliness constraints of the tasks. We propose a solution to implement the allowance principle that we call the Latest Execution Time (LET), defined for a task as the latest absolute time a faulty task can proceed with its execution without compromising the real-time constraints of all the tasks in the system. This mechanism enables to cope with execution overruns before a deadline miss and is not based on execution overruns handlers. We show how to determine the LET based on existing real-time feasibility conditions for Fixed Priority (FP) and Earliest Deadline First (EDF) schedulings. We compare the performances of the LET mechanism with FP and EDF scheduling to classical execution overrun management solutions.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Programmable Hardware and the New Analog Capacity","authors":"T. Giuma, A. Ebenal","doi":"10.1109/ICONS.2007.41","DOIUrl":"https://doi.org/10.1109/ICONS.2007.41","url":null,"abstract":"This paper will explore the evolutionary development of programmable devices and the emergent capacity to configure programmable analog devices. The architectures, research, current trends and a simulated example will be included in this investigation of programmable hardware. In the near future there will be one device that will be an all around programmable piece of hardware that will allow the user to implement analog as well as digital signal processing. The progressive enhancements of programmable devices that are making it possible to produce field programmable analog arrays (FPAA) and field programmable mixed signal arrays (FPMA) are also discussed.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121710171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}