Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture

PDF

2009

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 33

Full-Text Articles in Entire DC Network

النتائج المالية لشهادة التسجيل للحصول على الآيزو في الشركات الصناعية المساهمة العامة, Philadelphia University Nov 2009

النتائج المالية لشهادة التسجيل للحصول على الآيزو في الشركات الصناعية المساهمة العامة, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani Aug 2009

Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani

International Conference on Information and Communication Technologies

Significant technological advancement in the current electronic era has influenced the work processes of private and government business entities. E-Government is one such area where almost every country is emphasizing and automating their work processes. Software architecture is the integral constituent of any software system with not only cumbersome modeling and development but require heedful evaluation. Considering this aspect we have highlighted in this paper, security evaluation of an ongoing e-society project ESAM using Architectural Tradeoff Analysis Method (ATAM). ESAM is a Web based system intended to provide e-services to the Swedish community residents. ATAM is primarily used for architectural …


Decision Making, Philadelphia University Aug 2009

Decision Making, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Architectural Mismatch: Why Reuse Is Still So Hard, David Garlan, Robert Allen, John Mark Ockerbloom Jul 2009

Architectural Mismatch: Why Reuse Is Still So Hard, David Garlan, Robert Allen, John Mark Ockerbloom

John Mark Ockerbloom

In this article, David Garlan, Robert Allen, and John Ockerbloom reflect on the state of architectural mismatch, a term they coined in their 1995 IEEE Software article, "Architectural Mismatch: Why Reuse Is So Hard." Although the nature of software systems has changed dramatically since the earlier article was published, the challenge of architectural mismatch remains an important concern for the software engineering field.


The Application Of Fuzzy Logic To The Modeling Of Product Density For Children Ready-Made Clothes, R. W. Hndoosh Jun 2009

The Application Of Fuzzy Logic To The Modeling Of Product Density For Children Ready-Made Clothes, R. W. Hndoosh

R. W. Hndoosh

The main objective of this research is to design a program model for a new product density estimation by implementing fuzzy logic techniques. This model is designed depending upon some of the factors influencing product density. The model consists of conditional rules. Mamdani fuzzy inference system is used for reasoning process because it is an efficient type of fuzzy inference for knowledge to make decision processing. The model is designed using MATLAB as the programming tool for writing the model's programs. The model is applied to real data average taken from Mosul factory for children Ready-Made clothes. The results obtained …


Intentional Learning Agent Architecture, Budhitama Subagdja, Liz Sonenberg, Iyad Rahwan Jun 2009

Intentional Learning Agent Architecture, Budhitama Subagdja, Liz Sonenberg, Iyad Rahwan

Research Collection School Of Computing and Information Systems

Dealing with changing situations is a major issue in building agent systems. When the time is limited, knowledge is unreliable, and resources are scarce, the issue becomes more challenging. The BDI (Belief-Desire-Intention) agent architecture provides a model for building agents that addresses that issue. The model can be used to build intentional agents that are able to reason based on explicit mental attitudes, while behaving reactively in changing circumstances. However, despite the reactive and deliberative features, a classical BDI agent is not capable of learning. Plans as recipes that guide the activities of the agent are assumed to be static. …


Operating System Support For Modern Applications, Ting Yang May 2009

Operating System Support For Modern Applications, Ting Yang

Open Access Dissertations

Computer systems now run drastically different workloads than they did two decades ago. The enormous advances in hardware power, such as processor speed, memory and storage capacity, and network bandwidth, enable them to run new kinds as well as a large number of applications simultaneously. Software technologies, such as garbage collection and multi-threading, also reshape applications and their behaviors, introducing more challenges to system resource management. However, existing general-purpose operating systems do not provide adequate support for these modern applications. These operating systems were designed over two decades ago, when garbage-collected applications were not prevalent and users interacted with systems …


Virtualization Of Pace Teaching Computers, Collaborative Project Mar 2009

Virtualization Of Pace Teaching Computers, Collaborative Project

Dyson College- Seidenberg School of CSIS : Collaborative Projects and Presentations

This entry adheres to the use of the quad chart template to provide a succinct description only of the current research project undertaken by the participants. It provides for the following information

1. Participants and Affiliations
2. Overall Project Goals
3. Illustrative picture
4. Specific research/artistic/pedagogic foci


Cooperative Unmanned Aerial Surveillance Control System Architecture, Theodore T. Diamond, Adam L. Rutherford, Jonathan B. Taylor Mar 2009

Cooperative Unmanned Aerial Surveillance Control System Architecture, Theodore T. Diamond, Adam L. Rutherford, Jonathan B. Taylor

Theses and Dissertations

Intelligence, surveillance and reconnaissance (ISR) is a high-demand Department of Defense mission performed by unmanned aircraft systems (UASs) at the tactical and theater levels. Coordinating UASs through cooperative control offers the advantages of persistence, distributed and adaptable sensor coverage, and reduced revisit time on points of interest. The purpose of this thesis is to apply systems engineering principles to the problem of developing a flexible, common control system for cooperative UAS surveillance at the tactical level. The AFIT team developed a concept of operations (CONOPS) encompassing various users and surveillance tasks. The team then used the scenarios in the CONOPS …


Node Isolation Model And Age-Based Neighbor Selection In Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov Feb 2009

Node Isolation Model And Age-Based Neighbor Selection In Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov

Computer Science Faculty Publications

Previous analytical studies of unstructured P2P resilience have assumed exponential user lifetimes and only considered age-independent neighbor replacement. In this paper, we overcome these limitations by introducing a general node-isolation model for heavy-tailed user lifetimes and arbitrary neighbor-selection algorithms. Using this model, we analyze two age-biased neighbor-selection strategies and show that they significantly improve the residual lifetimes of chosen users, which dramatically reduces the probability of user isolation and graph partitioning compared with uniform selection of neighbors. In fact, the second strategy based on random walks on age-proportional graphs demonstrates that, for lifetimes with infinite variance, the system monotonically increases …


Is Parallel Programming Hard, And If So, Why?, Paul E. Mckenney, Maged M. Michael, Manish Gupta, Philip William Howard, Josh Triplett, Jonathan Walpole Feb 2009

Is Parallel Programming Hard, And If So, Why?, Paul E. Mckenney, Maged M. Michael, Manish Gupta, Philip William Howard, Josh Triplett, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Of the 200+ parallel-programming languages and environments created in the 1990s, almost all are now defunct. Given that parallel systems are now well within the budget of the typical hobbyist or graduate student, it is not unreasonable to expect a new cohort in excess of several thousand parallel languages and environments to appear in the 2010s. If this expected new cohort is to have more practical impact than did its 1990s counterpart, a robust and widely applicable framework will be required that encompasses exactly what, if anything, is hard about parallel programming. This paper revisits the fundamental precepts of concurrent …


The Logic Of Bailout Strategies, Rudolf Kaehr Jan 2009

The Logic Of Bailout Strategies, Rudolf Kaehr

Rudolf Kaehr

Some thoughts about/of the logic, blend, chiasm and diamond of bailout strategies. Eliciting aspects of the maxim: “Without insurrection, no resurrection".


Diamond Semiotic Short Studies, Rudolf Kaehr Jan 2009

Diamond Semiotic Short Studies, Rudolf Kaehr

Rudolf Kaehr

A collection of papers on semiotics, polycontexturality and diamond theory


The Irony In The Poetry Of Murid Al-Barghothi, Philadelphia University Jan 2009

The Irony In The Poetry Of Murid Al-Barghothi, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Laboratory Quality Control, Philadelphia University Jan 2009

Laboratory Quality Control, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Mixed Reality Environment For Web-Based Laboratory Interactive Learning, Philadelphia University Jan 2009

Mixed Reality Environment For Web-Based Laboratory Interactive Learning, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Modeling And Experimental Studies On A Domestic Solar Dryer, Philadelphia University Jan 2009

Modeling And Experimental Studies On A Domestic Solar Dryer, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Neuro-Fuzzy Controller Of A Sensorless Pm Motor Drive For Washing Machines, Philadelphia University Jan 2009

Neuro-Fuzzy Controller Of A Sensorless Pm Motor Drive For Washing Machines, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


An Ontology For The Quality Attributes Of Web Services, Philadelphia University Jan 2009

An Ontology For The Quality Attributes Of Web Services, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


A Solar Still Augmented With A Flat-Plate Collector And A Reflector, Philadelphia University Jan 2009

A Solar Still Augmented With A Flat-Plate Collector And A Reflector, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Smoking Practices In Jordanian People And Their Impact On Semen Quality And Hormonal Levels Among Adult Men, Philadelphia University Jan 2009

Smoking Practices In Jordanian People And Their Impact On Semen Quality And Hormonal Levels Among Adult Men, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Swine Flu, Fiction Or Reality, Philadelphia University Jan 2009

Swine Flu, Fiction Or Reality, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Gdp, Philadelphia University Jan 2009

Gdp, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Formants Speaker Identification Based System Via Neural Network, International Journal Of Recent Trends In Engineering, Philadelphia University Jan 2009

Formants Speaker Identification Based System Via Neural Network, International Journal Of Recent Trends In Engineering, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Viral Replication And Genetics, Philadelphia University Jan 2009

Viral Replication And Genetics, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Wireless Gateway Programming Model, Philadelphia University Jan 2009

Wireless Gateway Programming Model, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Windows-Based Active-Router Design And Evaluation, Philadelphia University Jan 2009

Windows-Based Active-Router Design And Evaluation, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Exploring Out-Of-Turn Interactions With Websites, Saverio Perugini, Naren Ramakrishnan, Manuel A. Pérez-Quiñones, Mary E. Pinney, Mary Beth Rosson Jan 2009

Exploring Out-Of-Turn Interactions With Websites, Saverio Perugini, Naren Ramakrishnan, Manuel A. Pérez-Quiñones, Mary E. Pinney, Mary Beth Rosson

Computer Science Faculty Publications

Hierarchies are ubiquitous on the web for structuring online catalogs and indexing multidimensional attributed data sets. They are a natural metaphor for information seeking if their levelwise structure mirrors the user's conception of the underlying domain. In other cases, they can be frustrating, especially if multiple drill‐downs are necessary to arrive at information of interest. To support a broad range of users, site designers often expose multiple faceted classifications or provide within‐page pruning mechanisms. We present a new technique, called out-of-turn interaction, that increases the richness of user interaction at hierarchical sites, without enumerating all possible completion paths in the …


User Interface Design, Moritz Stefaner, Sebastien Ferre, Saverio Perugini, Jonathan Koren, Yi Zhang Jan 2009

User Interface Design, Moritz Stefaner, Sebastien Ferre, Saverio Perugini, Jonathan Koren, Yi Zhang

Computer Science Faculty Publications

As detailed in Chap. 1, system implementations for dynamic taxonomies and faceted search allow a wide range of query possibilities on the data. Only when these are made accessible by appropriate user interfaces, the resulting applications can support a variety of search, browsing and analysis tasks. User interface design in this area is confronted with specific challenges. This chapter presents an overview of both established and novel principles and solutions.


Analyzing The Impact Of A Virtual Machine On A Host Machine, Greg Dorn, Chris Marberry, Scott Conrad, Philip Craiger Jan 2009

Analyzing The Impact Of A Virtual Machine On A Host Machine, Greg Dorn, Chris Marberry, Scott Conrad, Philip Craiger

Publications

As virtualization becomes more prevalent in the enterprise and in personal computing, there is a great need to understand the technology as well as its ramifications for recovering digital evidence. This paper focuses on trace evidence related to the installation and execution of virtual machines (VMs) on a host machine. It provides useful information regarding the types and locations of files installed by VM applications, the processes created by running VMs and the structure and identity of VMs, ancillary files and associated artifacts.