SIWN Abstracts Index
A Prefix–Indexing Hierarchical Minimal Cubing Approach for High-Dimensional OLAP
Kongfa Hu, Ling Chen and Yixin Chen
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 1-10
Abstract: The pre-computation of data cubes is critical for improving the response time of OLAP (online analytical processing) systems and accelerating data mining tasks in large data warehouses. However, as the sizes of data warehouses grow, the time it takes to perform this pre-computation becomes a significant performance bottleneck. In a high dimensional OLAP, it might not be practical to build all these cuboids and their indices. In this paper, we propose a multi-dimensional hierarchical cubing algorithm, Prefix-Indexing hierarchical minimal cubing, based on an extension of the previous minimal cubing approach. This method partitions the high dimensional data cube into low dimensional cube segments. Such an approach permits a significant reduction of CPU and I/O overhead. Experimental results show that the proposed method is significantly more efficient than other existing cubing methods.
Keywords: data mining, hierarchical minimal cubing, online analytical processing.
A New Dispatch Strategy of Elevators
Pingli Wang, Bin Song, Gongxuan Zhang and Ling Wang
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 11-16
Abstract: With intelligent group control technique, this paper presents a dispatch strategy of elevators based on accuracy forecasting arrival time, which has the characteristics of strong adaptability, low cost and high reliability. The efficiency of elevator system is improved by using the new dispatch strategy.
Keywords: intelligent group control, adaptability, dispatch.
Semantic Image Segmentation and Detection of Simple Objects
Kaixing Wu, Jing Du, Weiwei Yan and Fanyu Han
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 17-23
Abstract: In this paper, we present a framework for image segmentation and detection of simple objects leading to automatic image annotation. Focusing on semantic analysis of images, it contributes to knowledge-assisted multimedia analysis and bridging the gap between semantics and low level visual features. In order to stress its independence of a specific image segmentation approach we have modified two well known region growing algorithms, i.e., watershed and recursive shortest spanning tree, and compared them to their traditional counterparts. We introduce a methodology to improve the results of image segmentation, based on contextual information. We also propose a context representation approach to use semantic region growing.
Keywords: image segmentation, image annotation, semantic region growing
The Remote Cooperation Diagnosis and Problem Solution Environment in Web Age
Zuoliang Ye, Xinjian Gu, Sheng Li and Junfeng Tian
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 24-30
Abstract: The multi-user cooperative remote diagnosis is an important issue in Internet age. Some test and application have been done to realize simply the diagnosis and maintenance in special field. This research focuses on the cooperative Diagnosis Based on Virtual Network Computing (CDB-VNC), which is a general pattern to solve the remotely cooperative diagnosis problems. An integral cooperative diagnosis platform was built up with screen-sharing, remote control, instant messenger and data transmission. The key technologies, such as cooperative mode, system security, communication protocol, are presented in this paper. The main features of CDB-VNC include that multi-user browsers simultaneously; screen displays synchronously; the local software is operated visually via the Internet. At last the CDB-VNC system is developed and a case is discussed to implement the cooperation diagnosis with CDB-VNC.
Keywords: cooperative remote diagnosis, virtual network computing, remote diagnosis and maintenance, e-maintenance.
Applications of Aspect-Oriented Refactoring in Software System
Jingjun Zhang, Fanyu Han, Hui Li and Yang Zhang
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 31-37
Abstract: Aspect-oriented programming (AOP) has received increased attention due to its power in encapsulating crosscutting concerns in a system through use of a new unit of module called an aspect. This paper introduces AOP into the refactoring, synergistically combines these two techniques to refactor crosscutting elements, and introduces a human guided automated approach to refactoring object oriented programs to the aspect oriented paradigm. The approach is based upon the iterative application of four steps: discovery, enabling, selection, and refactoring. This paper examines the fundamentals of AO refactoring, the steps involved in the process, and presents the results of an evaluation in which one of the crosscutting concerns of a program is refactored.
Keywords: AOP, refactoring, aspect, crosscutting concerns.
An Individualized E-Learning Web Services Prototype
Lipeng Wen and Mike Brayshaw
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 38-44
Abstract: As learners could have their individual requirements in their instruction (e.g., different learning aims, timetables, and results), it is essential to deliver the personalized educational services to students on the Web. Here the individualized creation and control of electronic instructional processes should be achieved on the Internet. So far, existing e-learning tools (e.g., LAMS) con not solve this question. In this paper, a schema-driven approach is designed to integrate and manage the semantic information of the Web services in the e-learning area according to users’ needs, such as the representation of all kinds of learning paths. Then a prototype is designed and implemented to facilitate users to author and control varieties of learning procedures. This tool should hopefully make users to be much more engaged in the individualized designing, performing, and managing of the Web-based educational services.
Keywords: e-learning, individualized requirements, personalized creation and control of learning processes, schema-driven approach.
Evaluating Academic Process Designer for Workflow Modeling and Analysis
Le Yang, Yongsun Choi, Kwanhee Han, Sungmoon Bae and MinSung Kim
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 45-50
Abstract: Workflow management technology provides flexible and appropriate solutions for facilitating the development of new business processes and the analysis of existing ones. Process designer creates and analyzes process models, and is a key component in a workflow management system (WfMS). But, most of commercial WfMSs do not yet provide process designers with formal analysis based on mathematical background. This limitation has incurred the development of many process designers from the academic side, based on different purposes and techniques. In this paper, we provide an overview of some representative academic process designers evaluated from the perspective of workflow modeling and analysis. This comparative assessment can help in deriving the direction of further development of process designers or integrating them with WfMS.
Keywords: business process, process designer, workflow modeling, workflow analysis.
Normative Business Processes Modeling Based on EDA Model
Zhijun Yan and Kecheng Liu
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 51-58
Abstract: Business process management is of vital importance in organization’s daily operation. Most business process modeling methods are proposed to analyze and design business processes from the control-flow or resources aspect. In this work, the organizational norm is introduced to the business process modeling and agent technology is applied to model the intelligent and autonomous behavior of organizational actors. Based on the EDA (Epistemic- Deontic-Axiological) agent model, organizational concepts and their relation in the semantic level are identified. The role responsible for organizational activities is defined in the semantic model and served as a basis for EDA agent design. Moreover, the control flow information and organization norms are integrated into the business process agent model.
Keywords: agent, business process modeling, EDA model, organizational norm, semantic analysis.
Requirements Representation for Machine-Amenability
Diana Griffiths and Kecheng Liu
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 59-68
Abstract: One of the main time consuming processes in the software lifecycle is the initial stage that produces the specification. This stage includes: articulation of the stakeholders’ requirements; interpretation of the elicited requirements; and negotiation of these elicited requirements to eliminate conflicts. This paper proposes a method of representing requirements in a formal representation that facilitates the addition of a knowledge source to enable the requirements to become machine-amenable. The knowledge repository contains information about the stakeholders words used while eliciting requirements, this is to enable the capture the stakeholders intended meaning. Machine-amenable requirements enable the machine deduction and manipulation using the associated knowledge repository and the machine-amenable requirements. The advantages of representing requirements in a machine-amenable format are presented, followed by the future development of the requirements for automatic analysis and negotiation.
Keywords: machine-amenable requirements, ontologies, requirements representation, XML.
An Analysis of Risks in Collaborative Product Development
Kefan Xie, Qianqian Xia, Gang Chen and Yun Chen
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 69-76
Abstract: Following the process of collaborative product development (CPD), this paper analyzes at length eight types of risk factors and their attributes such as strength, frequency, visibility and affecting scope. Then, a risk factors map is drawn to examine the interaction between the various factors. Finally, a risk early warning mechanism for automotive product development is proposed providing an effective tool for controlling and avoiding CPD risks in early time.
Keywords: collaborative product development, risk analysis, risk early warning, risk control.
Agglomeration Mechanism and Scale of Horizontally Integrated Multinationals Under Limited Number of Enterprises and Monopolistic Competition Frame
Yan-Bo Zhang and Ying Han
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 77-83
Abstract: Under monopolistic competition model of limited number of enterprises and assumption of labor force relatively overmuch, this paper investigates agglomeration mechanism, investment scale of horizontal FDI in host country and whether host country can keep on drawing on more and more horizontal FDI quotients; also tries to study the possible development trend of horizontal FDI in China in the future. The research indicates: In a certain period, the market scale of host country is an important factor to attract horizontal FDI. The adjustment of industry structure, growing up of market and gathering of technology power in developing country, which will be beneficial to acquire more horizontally international direct investment for the developing country. And along with economic development, as long as the growth speed of market scale is bigger than that of production cost, the host country can draw on horizontal FDI constantly. Along with FDI gathering together continuously, the scale of horizontal FDI in host country also increases immediately.
Keyword: multinational enterprise, horizontal FDI, monopolistic competition, agglomeration mechanism.
Fostering Innovation in a Mashup-oriented Enterprise 2.0 Collaboration Environment
Javier Soriano, David Lizcano, Miguel A. Cańas, Marcos Reyes and Juan J. Hierro
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 84-94
Abstract: A number of Enterprise 2.0 Collaboration platforms are beginning to proliferate. By leveraging desirable Web 2.0 attributes, these platforms provide enterprises with an ecosystem of employees, partners, suppliers, and customers who collaborate to develop capabilities by collectively generating, sharing and refining business knowledge. This paper advocates the idea that enterprise collaboration must evolve towards a new paradigm in which knowledge workers are considered as co-producers not only of information, but also of software services and applications that promote specific competitive advantages and/or meet their immediate needs, without involving IT departments. Having this in mind, the rationale behind EzWeb, a reference architecture and implementation of an open Enterprise 2.0 Collaboration Platform that empower its users to co-produce and share instant applications is presented. This architecture will help to evolve the above ecosystem into one in which all the stakeholders will also be able to collaboratively develop capabilities and innovate operating procedures by remixing and integrating already available services through the core ideas of enterprise mashups and collaborative resource repositories.
Keywords: enterprise collaboration, Enterprise 2.0, Web 2.0, knowledge work, mashup, innovation.
Research of the Web-based Survey on the Development of E-Business in Mainland China, Canada and Taiwan
Peiji Shao, Jiaming Fang and Diana Kao
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 95-101
Abstract: This paper conducts a survey research on the "related success factors of the development of e-business" through the Internet. The research was taken in Mainland China, Canada and Taiwan at the same time. Among them we investigated in more depth into the companies in Mainland China. We analyze the possibility of carrying on the web-based survey. In addition, this paper also introduces the survey methods, survey processes and the results of the research in these three different regions. This paper demonstrates the following result: the response rates of the web-based surveys in China, Canada and Taiwan are just about 2%. The acceptable response rates of the e-mail/web-based surveys indicated in other literatures (Dillman, 2000; Cobanoglu et al, 2001) may not apply. At the end of this paper, we study how to improve the web-based survey, and present some countermeasures so as to increase the web-based survey response rate.
Keywords: web-based survey, response rate, e-business.
Impact of E-Procurement Systems on UAE Government Services
Enas Alsaffar, Lily Sun and Mohamed Magdy Kabeil
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 102-107
Abstract: This paper aims to explain the current status and investigate the progress of the internet services companies in UAE especially in the area of e-procurement in the government sector. The study starts with an introduction that illustrates how UAE government began encouraging all the government institutions to use the modern technology in all areas especially in e-procurement. A case study about one of the famous companies in UAE is examined and several interviews were conducted with the business and IT managers in this company, also several interviews with some of Tejari's customers in the government sector were conducted. The paper provides an insight into how the company developed their business and how it is progressing in the field in terms of their own strengths and target markets. Some of the critical success and failure factors are discussed also in the paper.
Keywords: Critical success factors, e-government, e-procurement, e-procurement framework.
A High Performance Hierarchy Storage Structure of Semantic Cube in Data Warehouses
Kong-Fa Hu, Zhenzhi Gong and Qing-Li Da
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 108-115
Abstract: The paper proposes to create the highly performance DHSC (Dimension Hierarchy Semantic Cube) with the dimension hierarchy aggregate technique on the Cube. By using the dimension hierarchy of the dimension hierarchy B+ tree, the DHSC can optimize the query efficiency and update efficiency, and also support the cube semantic operation, such as roll up and drill down. The DHSC can incrementally update the all affected ancestor nodes while updating the data cell by insertion and deletion in it. The DHSC can also incrementally update without being recreated while new dimension data are being added in it. As a result, this algorithm can greatly reduce the update time. We have compared the algorithms of DHSC with the other existent ones such as SDDC (Space-Efficient Dynamic Data Cube) by more experiments. The analytical and experimental results show that the algorithms of DHSC proposed in this paper are more efficient than other existent ones.
Keywords: on-line analysis process (OLAP), dimension hierarchy semantic cube (DHSC), dimension hierarchy B+ tree.
Mining Product Features Based on Association Rule and Semantic Comprehension
Maoshu Ni, Hongfei Lin and Zhihao Yang
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 116-123
Abstract: With the rapid development of e-commerce, more and more product reviews are presented on the web by the customers. However, for potential customers or merchants, it is difficult to read through all those reviews. Focusing on this problem, this paper presents a model of mining product features based on association rule and semantic comprehension. This model not only mines product features which customers concerned with, but also extracts review sentences containing these features and identifies their semantic orientation. Therefore, potential customers can be helped to know features and performance of every kind of products. Experiment shows that the precision of the features and sentences orientation identification are satisfactory and the features are more representative.
Keywords: customer reviews, mining product features, association rule, semantic comprehension.
A Selection Algorithm of Load Balance Migrating Objects Based on Object Attributes
Gong-Ye Zhou and Yi Dai
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 124-131
Abstract: In Object-Based Storage System (OBSS), it is able to reduce average I/O task response time by improving degree of parallel data storage. Synthesizing the attributes of objects in Object Storage Device (OSD), including granularity and accessing frequency, and I/O task’s queue time, based on revenue/expenditure analytical method, a selection algorithm of load balance migrating objects is proposed. The experiment results suggest that this strategy can enhance the system’s capability of parallel data storage extraordinarily, and reduce objects’ I/O task average response time.
Keywords: object-based storage system; load balance; granularity; migration probability.
The Application of Formal Concept Analysis: The Design and Realization of CAT with Cognitive Diagnosis
Shuqun Yang, Shengzhen Cai, Shuliang Ding and Qiulin Ding
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 132-138
Abstract: Concept lattice has been proved to be a useful tool for machine learning and knowledge discovery. In this paper, combined with the Attribute hierarchy Method (AHM), Formal Concept Analysis (FCA) is firstly applied into Computerized Adaptive Testing (CAT). Concept lattices are served as the model of CAT with cognitive diagnosis (CD). The algorithm of constructing of concept lattices for CAT is discussed in detail. The technology of item bank construction, Item Selection Strategies in CD-CAT and Estimation Method are considered to set up the relationship between concept lattices and CD-CAT, by which a CD-CAT is designed. The result of Monte Carlo study shows that examinees’ knowledge states are well diagnosed and the precision in examinees’ abilities estimation is well.
Keywords: formal concept analysis, computerized adaptive testing, cognitive diagnosis.
A Requirement Analysis Methodology with Object-Oriented Modular Petri Nets
C. H. Wang, C. L. Hsu and F. J. Wang
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 139-149
Abstract: The quality of requirements development is one of the most important factors for the success of a project. Use case approach is a functional requirement elicitation technique, commonly used in industrial applications. However, informal descriptions and verifications in this approach might cause additional costs and errors into the later stages. Object-oriented (OO) solutions are widely accepted in software development. The process of transforming functional requirements into OO designs is experience dependent still. In this paper, we present a new methodology to help solve the above problems in the earlier phases of requirements development. Our methodology is based on an OO Petri net with modularity, which is named OOMPNets provided in this paper. The methodology includes a systematic procedure to 1) extract the involved domain objects from scenario of use case stated in natural language; 2) represent the scenario from the viewpoints of associated actors and domain objects with OOMPNet; 3) arrange the nets of involvements upon scenario to analyze; 4) convert the nets into design. We demonstrate an application of ATM service functions to indicate the contributions.
Keywords: use case approach, functional requirement, object-oriented development, Petri nets.
Technology of Spam Filtering Based on Latent Semantic Analysis
Qiuyu Zhang and Jingtao Sun
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 150-156
Abstract: with the rapidly increasing of Spam, more people are much concerned about anti-Spam problem. At present, there exists a Spam filtering system which its filtering ability is becoming feeble because of metamorphous feature phrase in Spam. So we present a novel approach to automatically recognize the metamorphous feature phrase by expanding latent semantic analysis (ELSA). ELSA is used to mark latent feature phrase, so the semantic analysis is introduced to the Spam filtering technique. It also overcomes the problem which is the filtering system working mechanically because of lack of apriori information in the traditional latent semantics analysis. Experimental results show that it outperformed the Naďve Byes filter algorithm in efficiency and performance, and the increase of recall rate of anti-Spam is about 14%. Thus, it can be a novel method to improve the ability of E-mail filtering model.
Keywords: expanding latent semantic analysis; singular value decomposition, Spam filtering; metamorphous feature phrase.
Coordinated Attacks Detection Based on Event Sequence Matching
Kuo Zhao, Kuo Tang, Dong Guo, Yanmei Huo and Liang Hu
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 157-162
Abstract: The complexity of coordinated attacks is difficult to detect efficiently by using the traditional methods such as misuse detection or anomaly detection. In this paper, we make an extension to the scope of event. An event is not only referred to alerts generated by IDS but also to events in network management or corresponding audit records in an operating system. Then we build a time series model based on temporal actions of coordinated attacks, and propose a comprehensive detection framework of coordinated attacks based on event sequence matching. The design and implementation of a hash-based sequence matching algorithm are provided. A distinctive feature of this detection framework is its ability to account for concurrent interdependent attackers’ actions.
Keywords: coordinated attacks, event sequence, matching.
A Simple and Efficient Approach for Retrieving Live HTML-based Internet Information
Nader Mohamed and Jameela Al-Jaroodi
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 163-170
Abstract: Dynamic HTML documents on the Internet contain useful information that can be reused by other applications. Unlike XML documents, the problem with HTML documents is that they do not have any semantics for the data in the page. Although a programmer can write a program that retrieves a peace of information from a specific HTML document available on the Internet, it will be very difficult to write several different programs to retrieve information from different dynamic HTML pages with varying formats. This paper develops a simple and generic approach to retrieve dynamic HTML Internet-based information. In this approach, several techniques that can be used to retrieve data from dynamic HTML documents are developed. These techniques were developed as a Java class which programmers can use to integrate and reuse HTML Internet Information for other real-time applications that need this information for their operations. The integrated Internet information can be weather information, stock prices, and top news. A number of experiments were conducted to measure the performance of these techniques. In addition, the paper discusses a number of applications that may benefit from this approach.
Keywords: HTML information retrieval, internet information, Java.
Measuring One-Way Packet Delay Variation in IP Networks: Concepts and Experiences
Ming Chen, Changyou Xing and Ke Ding
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 171-181
Abstract: Network Delay Variation is of great influence to real time applications. In this paper firstly a definition of one-way delay variation metric VD in IP networks is given, and then we propose the principle of constructing sample measurement packet sequence and present a related measurement algorithm Tjitter. To measure VD, a tool named TJTool is also implemented, which can measure VD easily without keeping the clock synchronization between measurement points. Then we give the definition and architecture of delay variation test bed. At last we implement a delay variation test bed TjitterBed under Linux’s user mode. Experiment results show that these conceptions are rational.
Keywords: algorithm, IPDV, network measurement, measurement tools, testbed.
SVVM: The Securized Virtual Virtual Machine
Mohammed Nadjib Tabbiche and Abdellah Chouarfia
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 182-187
Abstract: This work allowed us the installation of a simple PKI, using OpenSSL, in order to allow the certification of the VVMs, the checking of the identities of different VMLets scripts loaded to the top of the µVM using VMLet from safety. In other terms, each MVV must have a means of identification in a surer and reliable of a way personal (the owner of VMLets) using a X.509 certificate. This operation must be carried out without degrading the performances and the reliability of the dynamic and reflexive compiler, the µVM.
Keywords: VVM (Virtual Virtual Machine), µVM (the Micro-Virtual Machine), dynamic adaptation, security, PKI (Public Key Infrastructure), certificate.
Modal Policy Driven Heterogeneous Network Measurement Platform
Guomin Zhang, Ming Chen and Huan Xiong
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 188-194
Abstract: With the development of Mobile Ad hoc Network (MANET), the combination of fixed network and MANET has become the current research hot spot. MANET is highly dynamic in nature, as formed over wireless links that are susceptible to failure. Strict requirements on stability and reliability provide a strong motivation for monitoring and evaluating the running state of this kind of heterogeneous network. Therefore, a modal policy driven Heterogeneous Network Measurement Platform (HNMP) is proposed. HNMP provides a scheduling and controlling mechanism independent of network measurement tools and application. The tightly-coupled resource management mechanism of HNMP can ensure the reliable running and collaborating of heterogeneous measurement tools under unreliable network environment. Moreover, it enhances the flexibility and scalability of platform. Finally, a brief account of the prototype system is also given.
Keywords: MANET, modal policy, network measurement, state-consistent.
DDoS Attack Detection and Defense based on Feature and Data Fusion
Shaohua Teng, Wei Zhang, Zhaohui Zhu and Naiqi Wu
Systemics and Informatics World Network, Vol. 8, May 2010, pp. 195-205
Abstract: Based on the analysis of damage and principle of DDoS attack, a detection algorithm model on DDoS attack is designed and realized, and a tracking method on DDos attack is then given. Attack based on TCP’s 3-way handshake protocol is the most common DDoS attack, for which a defense method is given in the last.
Keywords: DDoS, intrusion detection, multi-agent, feature fusion, defense.
Copyright © 2010 Systemics and Informatics World Network