Network planning is of key importance during the construction of new communities and cities, in which telephone and data services have to be introduced as a component of the overall master plan of the city. The system accepts the map of a city in the form of its streets and intersection nodes coordinates, the specifications of the available cable sizes, and the cost information for the cables. The system determines the minimum cost network that satisfies the demand and constraints. The problem is treated as a clustering around medoids problem where the distances are represented by weighted shortest paths. In this paper, the partitioning around medoids (PAM) original algorithm have been modified. Results demonstrate the effectiveness and flexibility of the modifying algorithm in tackling the important problem of rural network planning. Comparisons with related work are presented showing the advantages of the CWSP-PAM (Clustering with Shortest Path-PAM) algorithm introduced in this paper.
{"title":"Using of clustering algorithm CWSP-PAM for rural network planning","authors":"L. F. Ibrahim","doi":"10.1109/ICITA.2005.300","DOIUrl":"https://doi.org/10.1109/ICITA.2005.300","url":null,"abstract":"Network planning is of key importance during the construction of new communities and cities, in which telephone and data services have to be introduced as a component of the overall master plan of the city. The system accepts the map of a city in the form of its streets and intersection nodes coordinates, the specifications of the available cable sizes, and the cost information for the cables. The system determines the minimum cost network that satisfies the demand and constraints. The problem is treated as a clustering around medoids problem where the distances are represented by weighted shortest paths. In this paper, the partitioning around medoids (PAM) original algorithm have been modified. Results demonstrate the effectiveness and flexibility of the modifying algorithm in tackling the important problem of rural network planning. Comparisons with related work are presented showing the advantages of the CWSP-PAM (Clustering with Shortest Path-PAM) algorithm introduced in this paper.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121972417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although there are many commercial packages to cater for the needs of any small businesses, those packages are generally very expensive, and incorporate many additional features that are rarely used. In most cases the extensive variety of additional features overcomplicate the system, making it difficult and confusing to use, and often lead to system instability. In this paper we discuss the approach that was used to apply IT technology to tailor make a software package to cater specifically for the needs of an individual business, using very feasible, cheap alternatives to the existing highly specialized and expensive veterinary management systems. The main focus of this paper is to discuss the techniques and design methodologies that were employed throughout the development of the system, and the system architecture used to provide the user interface to the database.
{"title":"Applying information technology to produce affordable IT solutions for small business","authors":"Anthony Van Donselaar, L. Twigg, D. Tien","doi":"10.1109/ICITA.2005.73","DOIUrl":"https://doi.org/10.1109/ICITA.2005.73","url":null,"abstract":"Although there are many commercial packages to cater for the needs of any small businesses, those packages are generally very expensive, and incorporate many additional features that are rarely used. In most cases the extensive variety of additional features overcomplicate the system, making it difficult and confusing to use, and often lead to system instability. In this paper we discuss the approach that was used to apply IT technology to tailor make a software package to cater specifically for the needs of an individual business, using very feasible, cheap alternatives to the existing highly specialized and expensive veterinary management systems. The main focus of this paper is to discuss the techniques and design methodologies that were employed throughout the development of the system, and the system architecture used to provide the user interface to the database.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116836539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the problem of business component reuse is researched in the integration of rapid reconfigurable enterprise information system. The model of function component is provided, which is based on analyzing and abstracting function commonness from different components in business component domain, the compiling parameters of function component denote a business component type, and the running parameters denote the difference of business components. At the same time, the syntax description of the function components is presented. The reuse of business component is improved in enterprise information system integration by designing function component
{"title":"The Research and Design of Business Component Reuse in Enterprise Information System Integration","authors":"Yin-zhang Guo, Guoyou Zhang, Linfu Xie, Yubin Xu","doi":"10.1109/ICITA.2005.276","DOIUrl":"https://doi.org/10.1109/ICITA.2005.276","url":null,"abstract":"In this paper, the problem of business component reuse is researched in the integration of rapid reconfigurable enterprise information system. The model of function component is provided, which is based on analyzing and abstracting function commonness from different components in business component domain, the compiling parameters of function component denote a business component type, and the running parameters denote the difference of business components. At the same time, the syntax description of the function components is presented. The reuse of business component is improved in enterprise information system integration by designing function component","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114747237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a technique which generates encrypted codes from embedded error detection arithmetic coding called continuous error detection (CED). The proposed technique offers secure communication while keeps data free from errors in noisy channel. The proposed codec performs source coding, channel coding and data encryption at the same time. The proposed technique is not affect compression and error detection performance compared to CED.
{"title":"Secure embedded error detection arithmetic coding","authors":"P. Teekaput, S. Chokchaitam","doi":"10.1109/ICITA.2005.247","DOIUrl":"https://doi.org/10.1109/ICITA.2005.247","url":null,"abstract":"This paper presents a technique which generates encrypted codes from embedded error detection arithmetic coding called continuous error detection (CED). The proposed technique offers secure communication while keeps data free from errors in noisy channel. The proposed codec performs source coding, channel coding and data encryption at the same time. The proposed technique is not affect compression and error detection performance compared to CED.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127616869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The essence of keeping score about everything cannot be overemphasized. A performance measurement system may provide an early warning detection system indicating what has happened; diagnose reason for the current situation; and indicate what remedial action should be taken. Businesses rely on performance measurement systems to provide a feedback on the health of the business. The balanced scorecard (BSC) framework suggests the use of non-financial performance measures via three additional perspectives, i.e. customer, internal business process, learning and innovation to supplement traditional financial measures, believing that if used in that way, the scorecard addresses a serious deficiency in traditional management systems: their inability to link a company's long term strategy with its short term actions. This paper highlights the issues and combination of factors that influences the adaptation of the balanced scorecard model to the IT function and draws attention to cases of organisations that have attempted to implement the balanced scorecard to their IT departments, highlighting their challenges and rewards.
{"title":"Adaptation of the balanced scorecard model to the IT functions","authors":"H. Jahankhani, Justus I. Ekeigwe","doi":"10.1109/ICITA.2005.52","DOIUrl":"https://doi.org/10.1109/ICITA.2005.52","url":null,"abstract":"The essence of keeping score about everything cannot be overemphasized. A performance measurement system may provide an early warning detection system indicating what has happened; diagnose reason for the current situation; and indicate what remedial action should be taken. Businesses rely on performance measurement systems to provide a feedback on the health of the business. The balanced scorecard (BSC) framework suggests the use of non-financial performance measures via three additional perspectives, i.e. customer, internal business process, learning and innovation to supplement traditional financial measures, believing that if used in that way, the scorecard addresses a serious deficiency in traditional management systems: their inability to link a company's long term strategy with its short term actions. This paper highlights the issues and combination of factors that influences the adaptation of the balanced scorecard model to the IT function and draws attention to cases of organisations that have attempted to implement the balanced scorecard to their IT departments, highlighting their challenges and rewards.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125609878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distance-learning engineering courses supporting remote laboratory experimentation, afford a number of critical benefits including flexible access to resources. Creating an effective and integrated learning environment, which allows the access, control and monitoring of embedded devices and instrumentation over the Internet is challenging. Recent advances in Web technologies and applications have enabled increased levels of functionality and accessibility for remote laboratories. However, remote learning by its very nature provides limited educator assistance and from a students' perspective it is inevitable that at some stage of the experimental process, context specific help will be required. This paper addresses the support for intelligent user help in the context of remote experimentation for embedded systems and presents a semi-automated user-assistance system, which supports the current remote experimentation laboratory available at the University of Ulster. An example micro controller experiment is used to demonstrate the effectiveness of the user-help system
{"title":"Intelligent User-Support in Learning Environments for Remote Experimentation","authors":"J. Harkin, M. Callaghan, T. McGinnity, L. Maguire","doi":"10.1109/ICITA.2005.163","DOIUrl":"https://doi.org/10.1109/ICITA.2005.163","url":null,"abstract":"Distance-learning engineering courses supporting remote laboratory experimentation, afford a number of critical benefits including flexible access to resources. Creating an effective and integrated learning environment, which allows the access, control and monitoring of embedded devices and instrumentation over the Internet is challenging. Recent advances in Web technologies and applications have enabled increased levels of functionality and accessibility for remote laboratories. However, remote learning by its very nature provides limited educator assistance and from a students' perspective it is inevitable that at some stage of the experimental process, context specific help will be required. This paper addresses the support for intelligent user help in the context of remote experimentation for embedded systems and presents a semi-automated user-assistance system, which supports the current remote experimentation laboratory available at the University of Ulster. An example micro controller experiment is used to demonstrate the effectiveness of the user-help system","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125985142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Q. Tran, B. Henderson-Sellers, J. Debenham, Cesar Gonzalez-Perez
Evaluation of the MAS-CommonKADS approach for the development of agent-oriented software leads us to propose a number of conceptual modelling elements for inclusion in the metamodelling-based OPEN method engineering approach. In order to support the concepts in MAS-CommonKADS using this existing process framework (namely OPEN), we identify three new tasks, together with two new subtasks and ten additional work products that need to be added to the existing OPEN repository. Using method engineering, it then becomes possible to generate a tailored agent-oriented methodology from this suite of method fragments.
{"title":"Conceptual modelling within the MAS-CommonKADS plus OPEN method engineering approach","authors":"Q. Tran, B. Henderson-Sellers, J. Debenham, Cesar Gonzalez-Perez","doi":"10.1109/ICITA.2005.104","DOIUrl":"https://doi.org/10.1109/ICITA.2005.104","url":null,"abstract":"Evaluation of the MAS-CommonKADS approach for the development of agent-oriented software leads us to propose a number of conceptual modelling elements for inclusion in the metamodelling-based OPEN method engineering approach. In order to support the concepts in MAS-CommonKADS using this existing process framework (namely OPEN), we identify three new tasks, together with two new subtasks and ten additional work products that need to be added to the existing OPEN repository. Using method engineering, it then becomes possible to generate a tailored agent-oriented methodology from this suite of method fragments.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zaobin Gan, Dengwen Wei, Jinlong Zhang, V. Varadharajan
Requirements analysis is not only the most important stage of information systems development but also a complex and time-consuming process. Tools play an important role in supporting and automating software requirements analysis. They become indispensable in dealing with large and complex systems. This paper first introduces a business-processes-oriented requirements analysis model. And a business-process-oriented software requirements automatic generator (SRAG) is herein presented, alongside the design of a prototype.
{"title":"Business-process-oriented software requirements automatic generator","authors":"Zaobin Gan, Dengwen Wei, Jinlong Zhang, V. Varadharajan","doi":"10.1109/ICITA.2005.90","DOIUrl":"https://doi.org/10.1109/ICITA.2005.90","url":null,"abstract":"Requirements analysis is not only the most important stage of information systems development but also a complex and time-consuming process. Tools play an important role in supporting and automating software requirements analysis. They become indispensable in dealing with large and complex systems. This paper first introduces a business-processes-oriented requirements analysis model. And a business-process-oriented software requirements automatic generator (SRAG) is herein presented, alongside the design of a prototype.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127962441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Repainting a small damaged area on a car panel may lead to repainting the whole panel if there was inaccurate colour match. This would be time-consuming and expensive. Therefore it is very important to achieve an accurate colour matching which leads to a neat repainting job as well as cost-effective. Although the initial colour code of the car is usually provided by the car manufacturing company, it actually changes with time due to weather conditions and successive car washing with various detergents. The paper describes the design and development of a prototype unit for colour detection. The unit captures a picture for small undamaged part of the car panel. This picture is passed to a program for analyzing and coding the actual colour to its basic colour percentages. Although the proposed system focuses on car repainting application, it may also be used in other industries such as in printing industry.
{"title":"Automatic colour detection for car repainting","authors":"I. Al-Bahadly, H. Darhmaoui","doi":"10.1109/ICITA.2005.80","DOIUrl":"https://doi.org/10.1109/ICITA.2005.80","url":null,"abstract":"Repainting a small damaged area on a car panel may lead to repainting the whole panel if there was inaccurate colour match. This would be time-consuming and expensive. Therefore it is very important to achieve an accurate colour matching which leads to a neat repainting job as well as cost-effective. Although the initial colour code of the car is usually provided by the car manufacturing company, it actually changes with time due to weather conditions and successive car washing with various detergents. The paper describes the design and development of a prototype unit for colour detection. The unit captures a picture for small undamaged part of the car panel. This picture is passed to a program for analyzing and coding the actual colour to its basic colour percentages. Although the proposed system focuses on car repainting application, it may also be used in other industries such as in printing industry.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130170243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Packet classification is important for supporting multi-field packet routing, quality of service (QoS), real-time data streaming applications and firewalls. Existing schemes in IPv4 uses the 5-tuple approach, giving much overhead in the dataplane processing. With the introduction of IPv6 flow label field which facilitates labeling of packets belonging to the same flow; classification can now be done using the 3-tuple approach. In this paper, we propose 3-tuple packet classification algorithm using hierarchical-trie data structure that has low storage requirement and optimum search speed. Packet filters are evaluated based on hierarchical approach, starting from flow label followed by source and destination addresses. A hashing model with collision resolution for addresses that minimizes memory consumption is also being described. The time complexity of the lookup process is bounded by the length of header fields and is independent of the trie size.
{"title":"IPv6 packet classification based on flow label, source and destination addresses","authors":"Eric C. K. Poh, H. Ewe","doi":"10.1109/ICITA.2005.165","DOIUrl":"https://doi.org/10.1109/ICITA.2005.165","url":null,"abstract":"Packet classification is important for supporting multi-field packet routing, quality of service (QoS), real-time data streaming applications and firewalls. Existing schemes in IPv4 uses the 5-tuple approach, giving much overhead in the dataplane processing. With the introduction of IPv6 flow label field which facilitates labeling of packets belonging to the same flow; classification can now be done using the 3-tuple approach. In this paper, we propose 3-tuple packet classification algorithm using hierarchical-trie data structure that has low storage requirement and optimum search speed. Packet filters are evaluated based on hierarchical approach, starting from flow label followed by source and destination addresses. A hashing model with collision resolution for addresses that minimizes memory consumption is also being described. The time complexity of the lookup process is bounded by the length of header fields and is independent of the trie size.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134570939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}