The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper presents a systematic approach for evaluating entropic potentials and their defining characteristics under different circumstances. These characteristics are informative and allow for better organization of monitoring and control. They can serve as a foundation for easily understood cognitive images of a system state. The technology presented in the following paper is adapted to the conditions...
In a process-based organization, while actors perform their actions, multiple business transactions instances are running concurrently. Due to this raising complexity, during the business operation many risks may manifest when comparing the prescribed business transactions with its instances. The manifestation of a risk is a non-conformance behavior during the execution of transactions. Some risks...
Emergence of honeynet, which is a network of honeypots, has changed the phase of internet security and information gathering about intruders. In improving deception of the honeynet which in turn increases the workload of attackers, most honeynet deployments are geared towards improving on the deception deal by using MAC addresses, IP addresses and protocols on host machine. Attackers gain access to...
This research paper demonstrates the development of methodologies for application monitoring and continuous performance assurance. The proposed approach is derived from the classical continuous improvement concept e.g. PDCA (Plan-Do-Check-Act) cycle, which has been adapted to most of the real industrial and production environments. The approach consists of four phases : Monitor, Analysis, Recommendations...
Sometimes information systems fail or have operational and communication problems because designers may not have knowledge of the domain which is intended to be modeled. The same happens with systems for monitoring. Thus, an ontological model is needed to represent the organizational domain, which is intended to be monitored in order to develop an effective monitoring system. In this way, the purpose...
This paper will be based on some related standpoints of monetary integration theory to discuss the feasibility of implementing monetary integration in East Asia. And basic on this, this paper will also analyze the three evolution phases that East Asia implement regional currency cooperation.
Poor risk management is currently a blazing issue in project management, it is counted as a major aspect contributing to project failure. This paper is focused much more on how poor risk management leads to failure of projects, it also examines the major reasons that are associated with failure of project management. In more details of the article is the literature review that supports how poor risk...
Citizen science is a form of research collaboration involving members of the public in scientific research projects to address real-world problems. Often organized as a virtual collaboration, these projects are a type of open movement, with collective goals addressed through open participation in research tasks. Existing typologies of citizen science projects focus primarily on the structure of participation,...
Social service project is a kind of social activity which aims to provide service and whose quality is mostly decided by service quality. Service quality, in essence, is a perception, a result after customers compare the service they have experienced with their expectation. Therefore, service quality management becomes the core of social service project management. Major approaches to improve quality...
As information technology becomes more important to build enterprises' competitive advantage, transforming their IT organization from technology provider to service provider by introducing IT service management (ITSM) processes is also becoming imperative. Configuration management is one of processes in ITSM which plays a key role for successful implementing ITSM. In this paper, we give a set of suggested...
Darknet sensors have the interesting property of collecting only suspicious traffic, including misconfiguration, backscatter and malicious traffic. The type of traffic collected highly depends on two parameters: the size and the location of the darknet sensor. The goals of this paper are to study empirically the relationship between these two parameters and to try to increase the volume of attackers...
Software-based self-test (SBST) is increasingly used for testing processor cores embedded in SoCs, mainly because it allows at-speed, low-cost testing, while requiring limited (if any) hardware modifications to the original design. However, the method requires effective techniques for generating suitable test programs and for monitoring the results. In the case of processor core testing, a particularly...
Work on the construction site is known to be inefficient due to workers spending much time waiting for materials, transporting materials and from frequent interruptions of tasks. Studies on the construction site typically use statistical measures to analyse the sampled data about work and such measures, while very useful, can overlook important features of the data. In this paper we apply a previously...
Due to the continuously growing possibilities provided by technology and its wider application, today's IT products are becoming more and more complex both from technical and managerial standpoints. Very often, multiple parties are involved in their development. Consequently, the organization of the integration and testing of these products gets increasingly complex. Organisations already encounter...
A process is an important concept in modern software development. Only when the activities are organized in process descriptions, can these be communicated, followed, observed, and improved. The basis for understanding what testing is, is therefore the understanding of the testing process. This paper presents the general concept of a process, and expands on this to present a suggestion for a generic...
Management of testing provides high level control on testing and monitoring of testing provides both high level and detailed insight in the testing activities. The combination of management and monitoring gives a strong grip on test processes and test projects. This is required to manage risk, to increase efficiency and to provide transparency into development and test processes for various stakeholders...
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
The Open Distributed Processing Reference Model (ODP-RM) provides viewpoints and abstract infrastructure guidelines that can be used for a basis for enterprise architecture, especially for an inter-enterprise architecture. The ODP-RM does not prescribe methodology for modeling itself, but provides common vocabulary and focus for description. This paper performs a brief analysis of the ODP-RM (and...
ldquoDevelopment for advanced thermoelectric conversion systemsrdquo supported by the new energy and industrial technology development organization (NEDO) has been successfully completed as one of the Japanese national energy conservation projects. Three types of the cascaded thermoelectric modules operating up to 850 K in high electrode temperature and two types of Bi-Te thermoelectric modules operating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.