The paper presents some aspects of multimedia application in education. Problems of distance education, telework implementation and multimedia in telemedicine in Poland have been discussed. Several examples of multimedia applications, employed by the Faculty of Management at the Technical University of Czestochowa have been supplied
{"title":"Multimedia in education, training and work support","authors":"L. Kieltyka","doi":"10.1109/ITI.2004.241785","DOIUrl":"https://doi.org/10.1109/ITI.2004.241785","url":null,"abstract":"The paper presents some aspects of multimedia application in education. Problems of distance education, telework implementation and multimedia in telemedicine in Poland have been discussed. Several examples of multimedia applications, employed by the Faculty of Management at the Technical University of Czestochowa have been supplied","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"299302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132349084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The article describes a part of our research in the area of (business) process modeling, analysis and execution. It describes the current state of process languages and standards. It concentrates on the process model interoperability and portability problems, which are caused because of huge number of process modeling standards, which often do not even target the same conceptual level of process modeling. It provides an idea how to bring together those standards, using process concepts mapping into Petri nets and incorporating the usage of process patterns. Transformation to strictly formal process languages has a potential to prove itself as a fair solution with the following advantages: the number of mappings among different process languages is reduced and the process model can be analyzed using proven Petri net or general graph algorithms. The development of the approach is still in early phase. Mapping rules to/from process patterns are not strictly defined, neither trivial, therefore, they will be the main focus of our future research
{"title":"Towards true process descriptions interoperability","authors":"T. Rozman, R. Horvat, G. Polančič","doi":"10.2498/CIT.2004.02.11","DOIUrl":"https://doi.org/10.2498/CIT.2004.02.11","url":null,"abstract":"The article describes a part of our research in the area of (business) process modeling, analysis and execution. It describes the current state of process languages and standards. It concentrates on the process model interoperability and portability problems, which are caused because of huge number of process modeling standards, which often do not even target the same conceptual level of process modeling. It provides an idea how to bring together those standards, using process concepts mapping into Petri nets and incorporating the usage of process patterns. Transformation to strictly formal process languages has a potential to prove itself as a fair solution with the following advantages: the number of mappings among different process languages is reduced and the process model can be analyzed using proven Petri net or general graph algorithms. The development of the approach is still in early phase. Mapping rules to/from process patterns are not strictly defined, neither trivial, therefore, they will be the main focus of our future research","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127580288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software systems and applications are increasingly constructed as assemblies of preexisting components. This makes software development cheaper and faster, and results in more favorable preconditions for achieving higher quality. This approach, however, introduces several problems, most of them originating from the fact that preexisting software components behave as black boxes. One problem is that it is difficult to analyze the properties of systems in which they are incorporated. To simplify the evaluation of system properties, different techniques have been developed to predict the behavior of systems on the basis of the properties of the constituent components. Because many cannot be formally specified, these techniques make use of statistical terms such as probability or mean value to express system properties. This paper discusses ethical aspects of the interpretation of such predictions. This problem is characteristic of many domains (data mining, safety-critical systems, etc.) but it is inherent in component-based software development
{"title":"Possible implications of design decisions based on predictions","authors":"Magnus Larsson, Ivica Crnkovic","doi":"10.1109/ITI.2004.242582","DOIUrl":"https://doi.org/10.1109/ITI.2004.242582","url":null,"abstract":"Software systems and applications are increasingly constructed as assemblies of preexisting components. This makes software development cheaper and faster, and results in more favorable preconditions for achieving higher quality. This approach, however, introduces several problems, most of them originating from the fact that preexisting software components behave as black boxes. One problem is that it is difficult to analyze the properties of systems in which they are incorporated. To simplify the evaluation of system properties, different techniques have been developed to predict the behavior of systems on the basis of the properties of the constituent components. Because many cannot be formally specified, these techniques make use of statistical terms such as probability or mean value to express system properties. This paper discusses ethical aspects of the interpretation of such predictions. This problem is characteristic of many domains (data mining, safety-critical systems, etc.) but it is inherent in component-based software development","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"694 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126194425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper deals with personalization of navigation in the educational content, introduced in a competence-based instructional design system InterMediActor. The system constructs an individualized navigation graph for each student and thus suggests the learning objectives the student is most prepared to attain. The navigation tools rely on the graph of dependencies between competences, and the student model. We use fuzzy set theory for dealing with uncertainty in the assessment of students: the marks of assessment tests are transformed into linguistic terms, which are assigned to linguistic variables. Fuzzy IF-THEN rules are applied to obtain the appropriate categories of competences in the navigation graph
{"title":"Fuzzy student model in InterMediActor platform","authors":"A. Kavcic","doi":"10.1109/ITI.2004.241784","DOIUrl":"https://doi.org/10.1109/ITI.2004.241784","url":null,"abstract":"The paper deals with personalization of navigation in the educational content, introduced in a competence-based instructional design system InterMediActor. The system constructs an individualized navigation graph for each student and thus suggests the learning objectives the student is most prepared to attain. The navigation tools rely on the graph of dependencies between competences, and the student model. We use fuzzy set theory for dealing with uncertainty in the assessment of students: the marks of assessment tests are transformed into linguistic terms, which are assigned to linguistic variables. Fuzzy IF-THEN rules are applied to obtain the appropriate categories of competences in the navigation graph","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129930689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enterprise information system management is the operation of different corporate databases, applications, and more and more often of integration and interoperability of legacy systems, acquired through mergers and acquisitions. These legacy systems produce structured or semistructured data that add to the vast amounts of data that a company generates every day. This data needs to be communicated between heterogeneous systems within the same company and eventually beyond the company's walls. Transformations of communicated data are required to enable companies to tightly integrate their systems into a cohesive infrastructure without changing their applications and systems. We present a transformation system that uses a grammar-based approach to provide direct integration of applications and systems at the data level. Sequences of transformations allow flexible and effective exchange of data between heterogeneous systems resulting in a single information network
{"title":"Legacy system integration using a grammar-based transformation system","authors":"G. Menkhaus, U. Frei","doi":"10.2498/CIT.2004.02.04","DOIUrl":"https://doi.org/10.2498/CIT.2004.02.04","url":null,"abstract":"Enterprise information system management is the operation of different corporate databases, applications, and more and more often of integration and interoperability of legacy systems, acquired through mergers and acquisitions. These legacy systems produce structured or semistructured data that add to the vast amounts of data that a company generates every day. This data needs to be communicated between heterogeneous systems within the same company and eventually beyond the company's walls. Transformations of communicated data are required to enable companies to tightly integrate their systems into a cohesive infrastructure without changing their applications and systems. We present a transformation system that uses a grammar-based approach to provide direct integration of applications and systems at the data level. Sequences of transformations allow flexible and effective exchange of data between heterogeneous systems resulting in a single information network","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128502286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The motivation to write this work was induced by the need to evaluate the parameters of security systems, to analyze in detail the processes, which occur in security system evaluation and suggest the possible ways of their optimization. The concept, which is formulated, enables strategic control of integrated security systems (ISS) considering from the influence-reaction parameter point. Reaction strategy algorithm selection allows minimizing reaction time to danger influence and maximizing efficiency of security system. Modern computer technologies allow real time strategies simulation and ISS reaction control. The analysis of the event stream's experimental data and integrated security system's net model simulation algorithms enable the further development and perfection of the security system
{"title":"Optimizing strategic control of integrated security systems","authors":"M. Zilys, A. Valinevicius, D. Eidukas","doi":"10.1109/ITI.2004.242465","DOIUrl":"https://doi.org/10.1109/ITI.2004.242465","url":null,"abstract":"The motivation to write this work was induced by the need to evaluate the parameters of security systems, to analyze in detail the processes, which occur in security system evaluation and suggest the possible ways of their optimization. The concept, which is formulated, enables strategic control of integrated security systems (ISS) considering from the influence-reaction parameter point. Reaction strategy algorithm selection allows minimizing reaction time to danger influence and maximizing efficiency of security system. Modern computer technologies allow real time strategies simulation and ISS reaction control. The analysis of the event stream's experimental data and integrated security system's net model simulation algorithms enable the further development and perfection of the security system","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124145217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main objective is to present the impacts of information technology (IT) and enterprise resource planning (ERP) systems in business process renovation projects. A case study of business process reengineering project and the implementation of the SAP software solution in PLIVA (PLIVA Pharmaceuticals, Inc) is presented
{"title":"Case study of PLIVA Pharmaceuticals Inc. - aligning ERP system implementation with business process change","authors":"V. Vukšić, M. Spremić","doi":"10.1109/ITI.2004.242947","DOIUrl":"https://doi.org/10.1109/ITI.2004.242947","url":null,"abstract":"The main objective is to present the impacts of information technology (IT) and enterprise resource planning (ERP) systems in business process renovation projects. A case study of business process reengineering project and the implementation of the SAP software solution in PLIVA (PLIVA Pharmaceuticals, Inc) is presented","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115730323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Every modern institution involved in higher education needs a learning management system (LMS) to handle learning and teaching processes. It is necessary to offer e.g. electronic lecture materials to the students for download via the Internet. In some educational contexts, it is also necessary to offer Internet tutorials to be able to give the students more personal support and accompany them through the whole lecture period. Many organisations have introduced commercial LMS and gained the experience that monolithic solutions do not fulfil the dynamic requirements of complex educational institutions and are very cost-intensive. Therefore, many universities face the decision to stick to their commercial LMS or to switch to a potentially more cost-effective and flexible solution, for instance by adopting available open source LMS. Since we have made profound experience in developing and operating an open source LMS, this contribution enlightens the main characteristics of this alternative. This paper describes a use case dealing with a full product lifecycle (development, deployment, use and evaluation) of an open source LMS at the University of Muenster (Germany). It identifies relevant instruments and aspects of system design which software architects in practical application domains should pay attention to
{"title":"Developing, deploying, using and evaluating an open source learning management system","authors":"H.L. Grob, F. Bensberg, Blasius Lo, Dewanto","doi":"10.2498/CIT.2004.02.08","DOIUrl":"https://doi.org/10.2498/CIT.2004.02.08","url":null,"abstract":"Every modern institution involved in higher education needs a learning management system (LMS) to handle learning and teaching processes. It is necessary to offer e.g. electronic lecture materials to the students for download via the Internet. In some educational contexts, it is also necessary to offer Internet tutorials to be able to give the students more personal support and accompany them through the whole lecture period. Many organisations have introduced commercial LMS and gained the experience that monolithic solutions do not fulfil the dynamic requirements of complex educational institutions and are very cost-intensive. Therefore, many universities face the decision to stick to their commercial LMS or to switch to a potentially more cost-effective and flexible solution, for instance by adopting available open source LMS. Since we have made profound experience in developing and operating an open source LMS, this contribution enlightens the main characteristics of this alternative. This paper describes a use case dealing with a full product lifecycle (development, deployment, use and evaluation) of an open source LMS at the University of Muenster (Germany). It identifies relevant instruments and aspects of system design which software architects in practical application domains should pay attention to","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"455 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122600119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
General conception of efficiency of electronic devices (ED) manufacturing process control was presented. New efficiency evaluation index was introduced. Key efficiency evaluation principles were covered. Block scheme of ED manufacturing process was presented. Quality transfer function was described. Manufacturing quality control structure of ED printed mounting unit (PMU) was examined. Overall (systemic) influence of separate control versions on its efficiency was emphasized. The necessity of analysis and synthesis of PMU quality control systems was emphasized. Method for calculating task fulfillment probability of two-level hierarchical control management system was introduced
{"title":"Efficiency of electronic device manufacturing process control","authors":"N. Bagdanavičius, A. Žickis","doi":"10.1109/ITI.2004.242268","DOIUrl":"https://doi.org/10.1109/ITI.2004.242268","url":null,"abstract":"General conception of efficiency of electronic devices (ED) manufacturing process control was presented. New efficiency evaluation index was introduced. Key efficiency evaluation principles were covered. Block scheme of ED manufacturing process was presented. Quality transfer function was described. Manufacturing quality control structure of ED printed mounting unit (PMU) was examined. Overall (systemic) influence of separate control versions on its efficiency was emphasized. The necessity of analysis and synthesis of PMU quality control systems was emphasized. Method for calculating task fulfillment probability of two-level hierarchical control management system was introduced","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114898711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper describes possible enhancements of peer-to-peer (P2P) file transfer by providing users with a remote control system in order to initiate the start of file transfer on their machine(s). In addition, control and monitoring of the file transfer can be performed on their machine(s) even if users are logged off and regardless of possible technical limitations such as use of firewall. Users are able to obtain control and/or monitoring in a few various ways including the use of cell phones. The paper also describes a variety of authentication methods, work with more central servers, and work with firewalls and explains file transfer between peers that cannot establish a direct connection. Furthermore, the paper identifies a range of potential problems that could arise from building the system
{"title":"Some possible enhancements of P2P file transfer related to passive users and remote control of transfer","authors":"B. Milašinović, K. Fertalj","doi":"10.1109/ITI.2004.242575","DOIUrl":"https://doi.org/10.1109/ITI.2004.242575","url":null,"abstract":"The paper describes possible enhancements of peer-to-peer (P2P) file transfer by providing users with a remote control system in order to initiate the start of file transfer on their machine(s). In addition, control and monitoring of the file transfer can be performed on their machine(s) even if users are logged off and regardless of possible technical limitations such as use of firewall. Users are able to obtain control and/or monitoring in a few various ways including the use of cell phones. The paper also describes a variety of authentication methods, work with more central servers, and work with firewalls and explains file transfer between peers that cannot establish a direct connection. Furthermore, the paper identifies a range of potential problems that could arise from building the system","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116244457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}