The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Conceptual elevation of data in business process modeling was first formulated in 2003. The research community responded to this new idea enthusiastically. In the past decade, there have been numerous research activities concerning the interactions between business processes/activities and data in many aspects of business process management. Many of the advancements have or will have impacted on design/modeling,...
The analysis of scientific simulation data enables scientists to derive insights from their simulations. This analysis of the simulation output can be performed at the same execution site as the simulation using the same resources or can be done at a different site. The optimal output frequency is challenging to decide and is often chosen empirically. We propose a mathematical formulation for choosing...
Concepts such as price, performance, time to completion (availability), probability of failure and nonrepudiation are key to developing a comparison service in order to establish Service Level Agreements (SLA) or design better mechanisms to improve performance in Cloud Computing Systems (CCS). This work presents our design of a performance analysis platform that includes an infrastructure, a framework...
The main objective of this study is to generate an optimum solution for capacity planning and appointment scheduling issues, which are frequently encountered in clinical flows with various route and treatment periods at dental hospitals. With this study, given the flow of different existing treatment processes belonging to patients are optimized, and also the continuity of the system is ensured by...
As an integral part of the Ethernet standard IEEE 802.3, the Ethernet Powerlink protocol is widely used in the automation industry. It is a software-based solution and achieves some real-time capabilities. It satisfies data transmission demands by guaranteeing communication with very high speed and accuracy. In effort to make implementing Powerlink protocol easier, we build a formal Powerlink model...
Nowadays, the big data analysis is more and more widely used in information and telecommunication domain. Benefits from the big data analysis, both the telecommunication operators and Internet service providers could analyze user's interests more effective and predict user's expectation more accurate thus significant improve and add value of their services. Identity management in big data analysis...
Incorporating ubiquitous wireless sensor networks (WSNs) and powerful cloud computing (CC), Sensor-Cloud (SC) is attracting growing attention from both academia and industry. However, pricing for SC is barely explored. In this paper, filling this gap, five SC pricing models (i.e., SCPM1, SCPM2, SCPM3, SCPM4 and SCPM5) are proposed first. Particularly, they charge a SC user, based on 1) the lease period...
The article proposes and describes the elements of the generalized formal model of big data. It is analyzed the peculiarities of the application of the proposed model components.
Cyber-human systems support the increasingly complex and coupled relationships between humans and machines. This paper demonstrates that within a state based behavioral view that supports state refinement, the addition of event refinement is a natural way to define complex behavior in these systems. The paper provides a meta-model of terms and relationships which the systems analyst can use to create...
Information is one of the most important inputs for the activities in the transportation systems. The demands for information can be derived from the functions. Since modelling and analysis of particularly complex systems requires different techniques depending on the application purposes new methods have been introduced by us in order to facilitate the integration intentions. Our objective was to...
Data analysis of an oscillating flapping wing is conducted for developing a transfer function model especially for heave force data series from the CFD environment for different geometries of flapping wings. The wing experiences a combination of vertical and angular oscillatory motion, while travelling at constant forward speed. The vertical motion is induced by the random motion of the ship in waves,...
Design-time analysis and verification of distributed real-time embedded systems necessitates the modeling of the time-varying performance of the network and comparing that to application requirements. Earlier work has shown how to build a system network model that abstracted away the network's physical medium and protocols which govern its access and multiplexing. In this work we show how to apply...
The emergence of virtualization and security problems of the network services, their lack of scalability and flexibility force network operators to look for “smarter” tools for network design and management. With the continuous growth of the number of subscribers, the volume of traffic and competition at the telecommunication market, there is a stable interest in finding new ways to identify weak...
A survey of software and technology architecture about systems dedicated for analysis of Online Social Networks (OSN) will be presented. Based on the comparison and own experiments a novel approach proposed. The steps of experiments are described. The proposed solution is applied for Twitter and Facebook.
This paper deals with the application of Fuzzy Transform in Control System Identification. The fuzzy transform method is design as a pair of two transform. The first one maps a continuous function to a real vector. The second one, inverse transform, is naturally a mapping from the space of real vectors to the space of continuous function. Later on, more and more applications had been appearing to...
The guest editors of this special issue of IEEE Software invited submissions that reflected the benefits (and drawbacks) of software analytics, an area of explosive growth. They had so many excellent submissions that they had to split this special issue into two volumes--you'll see even more content in the September/October issue. They divided the articles on conceptual grounds, so both volumes will...
The high-volume, low-latency world of network traffic presents significant obstacles for complex analysis techniques. The unique challenge of adapting powerful but high-latency models to realtime network streams is the basis of our cyber security project. In this paper we discuss our use of NoSQL databases in a framework that enables the application of computationally expensive models against a real-time...
Documenting and maintaining the traceability between architectural models and code is one of the foremost challenges of model-based software development. Yet, traceability is rarely captured immediately while models and code co-evolve but usually recovered later. By then key people may have moved on or their recollection of facts may be blurred or inconsistent. In previous work, we proposed a language...
The modern satellite communication depends on satellite-station data links widely. The transmitting reliability of satellite-station data links is one of the most important factors for satellite navigation and nature disaster remote sensing. The satellite-station data links must be flexible enough to be established and eliminated, so it is a multi-state system. The space and atmosphere will affect...
Distributed cognition is a useful approach to study the interaction between agents (humans or artefacts) in a system, such as the collaboration involved in air traffic control. When taking a distributed cognition perspective, information processing can be directly observed. This provides the opportunity to explore how information moves through a system, and to identify specific areas where (pervasive)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.