The paper deals with personalization of navigation in the educational content, introduced in a competence-based instructional design system InterMediActor. The system constructs an individualized navigation graph for each student and thus suggests the learning objectives the student is most prepared to attain. The navigation tools rely on the graph of dependencies between competences, and the student model. We use fuzzy set theory for dealing with uncertainty in the assessment of students: the marks of assessment tests are transformed into linguistic terms, which are assigned to linguistic variables. Fuzzy IF-THEN rules are applied to obtain the appropriate categories of competences in the navigation graph
{"title":"Fuzzy student model in InterMediActor platform","authors":"A. Kavcic","doi":"10.1109/ITI.2004.241784","DOIUrl":"https://doi.org/10.1109/ITI.2004.241784","url":null,"abstract":"The paper deals with personalization of navigation in the educational content, introduced in a competence-based instructional design system InterMediActor. The system constructs an individualized navigation graph for each student and thus suggests the learning objectives the student is most prepared to attain. The navigation tools rely on the graph of dependencies between competences, and the student model. We use fuzzy set theory for dealing with uncertainty in the assessment of students: the marks of assessment tests are transformed into linguistic terms, which are assigned to linguistic variables. Fuzzy IF-THEN rules are applied to obtain the appropriate categories of competences in the navigation graph","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129930689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper presents some aspects of multimedia application in education. Problems of distance education, telework implementation and multimedia in telemedicine in Poland have been discussed. Several examples of multimedia applications, employed by the Faculty of Management at the Technical University of Czestochowa have been supplied
{"title":"Multimedia in education, training and work support","authors":"L. Kieltyka","doi":"10.1109/ITI.2004.241785","DOIUrl":"https://doi.org/10.1109/ITI.2004.241785","url":null,"abstract":"The paper presents some aspects of multimedia application in education. Problems of distance education, telework implementation and multimedia in telemedicine in Poland have been discussed. Several examples of multimedia applications, employed by the Faculty of Management at the Technical University of Czestochowa have been supplied","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"299302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132349084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Balaišis, D. Eidukas, R. Kavoliunas, R. Plėštys, G. Vilutis
A conception of efficiency of electronic network information transmission (ENIT) has been formulated, here the index of efficiency has been suggested. Moreover, mathematical modal of packet information transmission has been made. The manner of evaluation of the whole network efficiency has been serviced. Also there the practical usable opportunity of offered method has been showed
{"title":"Research of network efficiency of information transmission","authors":"P. Balaišis, D. Eidukas, R. Kavoliunas, R. Plėštys, G. Vilutis","doi":"10.1109/ITI.2004.242469","DOIUrl":"https://doi.org/10.1109/ITI.2004.242469","url":null,"abstract":"A conception of efficiency of electronic network information transmission (ENIT) has been formulated, here the index of efficiency has been suggested. Moreover, mathematical modal of packet information transmission has been made. The manner of evaluation of the whole network efficiency has been serviced. Also there the practical usable opportunity of offered method has been showed","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134431283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In search of higher competitiveness, organisations are in search for innovative business models, in order to foster economic benefits. In Slovenia, several clusters are being formed, including Slovenian transport logistics cluster (STLC) as one of the most important cluster. Currently STLC is in the stage of dynamic growth, demanding business model formation and adequate informatization. The main goal is to present the informatization of STLC, bridging the gap between supply chain management (SCM) and e-logistics. The informatization of STLC is presented through several phases. The first phase is business modeling of existing business processes of organizations (AS-IS model). The results of the first phase give us an in-depth view of STLC that is used for future business model setup. Next, TO-BE processes are created which are to be implemented and supported through informatization. The result of informatization project is shown as homogenic and transparent business activity between cluster members. The purposes of STLC informatization are business model creation, standardization of business processes, cost cutting, improved business performance; operational times decrease, asset management, and shipment tracing which are the basics of economic competitiveness
{"title":"E-logistics: informatization of Slovenian transport logistics cluster","authors":"A. Groznik","doi":"10.1109/ITI.2004.242952","DOIUrl":"https://doi.org/10.1109/ITI.2004.242952","url":null,"abstract":"In search of higher competitiveness, organisations are in search for innovative business models, in order to foster economic benefits. In Slovenia, several clusters are being formed, including Slovenian transport logistics cluster (STLC) as one of the most important cluster. Currently STLC is in the stage of dynamic growth, demanding business model formation and adequate informatization. The main goal is to present the informatization of STLC, bridging the gap between supply chain management (SCM) and e-logistics. The informatization of STLC is presented through several phases. The first phase is business modeling of existing business processes of organizations (AS-IS model). The results of the first phase give us an in-depth view of STLC that is used for future business model setup. Next, TO-BE processes are created which are to be implemented and supported through informatization. The result of informatization project is shown as homogenic and transparent business activity between cluster members. The purposes of STLC informatization are business model creation, standardization of business processes, cost cutting, improved business performance; operational times decrease, asset management, and shipment tracing which are the basics of economic competitiveness","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132914172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper describes possible enhancements of peer-to-peer (P2P) file transfer by providing users with a remote control system in order to initiate the start of file transfer on their machine(s). In addition, control and monitoring of the file transfer can be performed on their machine(s) even if users are logged off and regardless of possible technical limitations such as use of firewall. Users are able to obtain control and/or monitoring in a few various ways including the use of cell phones. The paper also describes a variety of authentication methods, work with more central servers, and work with firewalls and explains file transfer between peers that cannot establish a direct connection. Furthermore, the paper identifies a range of potential problems that could arise from building the system
{"title":"Some possible enhancements of P2P file transfer related to passive users and remote control of transfer","authors":"B. Milašinović, K. Fertalj","doi":"10.1109/ITI.2004.242575","DOIUrl":"https://doi.org/10.1109/ITI.2004.242575","url":null,"abstract":"The paper describes possible enhancements of peer-to-peer (P2P) file transfer by providing users with a remote control system in order to initiate the start of file transfer on their machine(s). In addition, control and monitoring of the file transfer can be performed on their machine(s) even if users are logged off and regardless of possible technical limitations such as use of firewall. Users are able to obtain control and/or monitoring in a few various ways including the use of cell phones. The paper also describes a variety of authentication methods, work with more central servers, and work with firewalls and explains file transfer between peers that cannot establish a direct connection. Furthermore, the paper identifies a range of potential problems that could arise from building the system","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116244457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main objective is to present the impacts of information technology (IT) and enterprise resource planning (ERP) systems in business process renovation projects. A case study of business process reengineering project and the implementation of the SAP software solution in PLIVA (PLIVA Pharmaceuticals, Inc) is presented
{"title":"Case study of PLIVA Pharmaceuticals Inc. - aligning ERP system implementation with business process change","authors":"V. Vukšić, M. Spremić","doi":"10.1109/ITI.2004.242947","DOIUrl":"https://doi.org/10.1109/ITI.2004.242947","url":null,"abstract":"The main objective is to present the impacts of information technology (IT) and enterprise resource planning (ERP) systems in business process renovation projects. A case study of business process reengineering project and the implementation of the SAP software solution in PLIVA (PLIVA Pharmaceuticals, Inc) is presented","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115730323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
General conception of efficiency of electronic devices (ED) manufacturing process control was presented. New efficiency evaluation index was introduced. Key efficiency evaluation principles were covered. Block scheme of ED manufacturing process was presented. Quality transfer function was described. Manufacturing quality control structure of ED printed mounting unit (PMU) was examined. Overall (systemic) influence of separate control versions on its efficiency was emphasized. The necessity of analysis and synthesis of PMU quality control systems was emphasized. Method for calculating task fulfillment probability of two-level hierarchical control management system was introduced
{"title":"Efficiency of electronic device manufacturing process control","authors":"N. Bagdanavičius, A. Žickis","doi":"10.1109/ITI.2004.242268","DOIUrl":"https://doi.org/10.1109/ITI.2004.242268","url":null,"abstract":"General conception of efficiency of electronic devices (ED) manufacturing process control was presented. New efficiency evaluation index was introduced. Key efficiency evaluation principles were covered. Block scheme of ED manufacturing process was presented. Quality transfer function was described. Manufacturing quality control structure of ED printed mounting unit (PMU) was examined. Overall (systemic) influence of separate control versions on its efficiency was emphasized. The necessity of analysis and synthesis of PMU quality control systems was emphasized. Method for calculating task fulfillment probability of two-level hierarchical control management system was introduced","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114898711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enterprise information system management is the operation of different corporate databases, applications, and more and more often of integration and interoperability of legacy systems, acquired through mergers and acquisitions. These legacy systems produce structured or semistructured data that add to the vast amounts of data that a company generates every day. This data needs to be communicated between heterogeneous systems within the same company and eventually beyond the company's walls. Transformations of communicated data are required to enable companies to tightly integrate their systems into a cohesive infrastructure without changing their applications and systems. We present a transformation system that uses a grammar-based approach to provide direct integration of applications and systems at the data level. Sequences of transformations allow flexible and effective exchange of data between heterogeneous systems resulting in a single information network
{"title":"Legacy system integration using a grammar-based transformation system","authors":"G. Menkhaus, U. Frei","doi":"10.2498/CIT.2004.02.04","DOIUrl":"https://doi.org/10.2498/CIT.2004.02.04","url":null,"abstract":"Enterprise information system management is the operation of different corporate databases, applications, and more and more often of integration and interoperability of legacy systems, acquired through mergers and acquisitions. These legacy systems produce structured or semistructured data that add to the vast amounts of data that a company generates every day. This data needs to be communicated between heterogeneous systems within the same company and eventually beyond the company's walls. Transformations of communicated data are required to enable companies to tightly integrate their systems into a cohesive infrastructure without changing their applications and systems. We present a transformation system that uses a grammar-based approach to provide direct integration of applications and systems at the data level. Sequences of transformations allow flexible and effective exchange of data between heterogeneous systems resulting in a single information network","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128502286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Every modern institution involved in higher education needs a learning management system (LMS) to handle learning and teaching processes. It is necessary to offer e.g. electronic lecture materials to the students for download via the Internet. In some educational contexts, it is also necessary to offer Internet tutorials to be able to give the students more personal support and accompany them through the whole lecture period. Many organisations have introduced commercial LMS and gained the experience that monolithic solutions do not fulfil the dynamic requirements of complex educational institutions and are very cost-intensive. Therefore, many universities face the decision to stick to their commercial LMS or to switch to a potentially more cost-effective and flexible solution, for instance by adopting available open source LMS. Since we have made profound experience in developing and operating an open source LMS, this contribution enlightens the main characteristics of this alternative. This paper describes a use case dealing with a full product lifecycle (development, deployment, use and evaluation) of an open source LMS at the University of Muenster (Germany). It identifies relevant instruments and aspects of system design which software architects in practical application domains should pay attention to
{"title":"Developing, deploying, using and evaluating an open source learning management system","authors":"H.L. Grob, F. Bensberg, Blasius Lo, Dewanto","doi":"10.2498/CIT.2004.02.08","DOIUrl":"https://doi.org/10.2498/CIT.2004.02.08","url":null,"abstract":"Every modern institution involved in higher education needs a learning management system (LMS) to handle learning and teaching processes. It is necessary to offer e.g. electronic lecture materials to the students for download via the Internet. In some educational contexts, it is also necessary to offer Internet tutorials to be able to give the students more personal support and accompany them through the whole lecture period. Many organisations have introduced commercial LMS and gained the experience that monolithic solutions do not fulfil the dynamic requirements of complex educational institutions and are very cost-intensive. Therefore, many universities face the decision to stick to their commercial LMS or to switch to a potentially more cost-effective and flexible solution, for instance by adopting available open source LMS. Since we have made profound experience in developing and operating an open source LMS, this contribution enlightens the main characteristics of this alternative. This paper describes a use case dealing with a full product lifecycle (development, deployment, use and evaluation) of an open source LMS at the University of Muenster (Germany). It identifies relevant instruments and aspects of system design which software architects in practical application domains should pay attention to","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"455 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122600119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The motivation to write this work was induced by the need to evaluate the parameters of security systems, to analyze in detail the processes, which occur in security system evaluation and suggest the possible ways of their optimization. The concept, which is formulated, enables strategic control of integrated security systems (ISS) considering from the influence-reaction parameter point. Reaction strategy algorithm selection allows minimizing reaction time to danger influence and maximizing efficiency of security system. Modern computer technologies allow real time strategies simulation and ISS reaction control. The analysis of the event stream's experimental data and integrated security system's net model simulation algorithms enable the further development and perfection of the security system
{"title":"Optimizing strategic control of integrated security systems","authors":"M. Zilys, A. Valinevicius, D. Eidukas","doi":"10.1109/ITI.2004.242465","DOIUrl":"https://doi.org/10.1109/ITI.2004.242465","url":null,"abstract":"The motivation to write this work was induced by the need to evaluate the parameters of security systems, to analyze in detail the processes, which occur in security system evaluation and suggest the possible ways of their optimization. The concept, which is formulated, enables strategic control of integrated security systems (ISS) considering from the influence-reaction parameter point. Reaction strategy algorithm selection allows minimizing reaction time to danger influence and maximizing efficiency of security system. Modern computer technologies allow real time strategies simulation and ISS reaction control. The analysis of the event stream's experimental data and integrated security system's net model simulation algorithms enable the further development and perfection of the security system","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124145217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}