Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 18 of 18

Full-Text Articles in Systems Architecture

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski Jan 2010

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski

Sascha Vitzthum

Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …


Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski Nov 2008

Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski

David A. Bray

We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …


Analysis And Evaluation Of Existing C-Band Feed Horns For Applicability To The 21 Meter Morehead Space Tracking Antenna, Prabhakara Rao Eluru Oct 2008

Analysis And Evaluation Of Existing C-Band Feed Horns For Applicability To The 21 Meter Morehead Space Tracking Antenna, Prabhakara Rao Eluru

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science & Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Prabhakara Rao Eluru on October 8, 2008.


A Secure Group Communication Architecture For Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips, Barry E. Mullins, Richard Raines, Rusty O. Baldwin Aug 2008

A Secure Group Communication Architecture For Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips, Barry E. Mullins, Richard Raines, Rusty O. Baldwin

Faculty Publications

This paper investigates the application of a secure group communication architecture to a swarm of autonomous unmanned aerial vehicles (UAVs). A multicast secure group communication architecture for the low earth orbit (LEO) satellite environment is evaluated to determine if it can be effectively adapted to a swarm of UAVs and provide secure, scalable, and efficient communications. The performance of the proposed security architecture is evaluated with two other commonly used architectures using a discrete event computer simulation developed using MATLAB. Performance is evaluated in terms of the scalability and efficiency of the group key distribution and management scheme when the …


Issues And Procedures In Adopting Structural Equation Modelling Technique, Siu Loon Hoe Jul 2008

Issues And Procedures In Adopting Structural Equation Modelling Technique, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

When applying structural equation modeling (SEM) technique for analytical procedures, various issues are involved. These issues may concern sample size, overall fit indices and approach. Initiates of SEM may find it somewhat daunting in resolving these technical issues. The purpose of this paper is to highlight key issues in adopting SEM technique and various approaches available. This paper provides a discussion on the sample size, fit indices, standardized paths, unidimensionality test and various approaches in relation to SEM. It is hoped that having reviewed the paper, new researchers can devote more time to data analysis instead of procedural issues involved.


A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko Jun 2008

A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko

Theses and Dissertations

With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration. The United States Department of Defense’s (DoD) Network-Centric Enterprise Services initiative, along with the notion of pushing the “power to the edge,” aims to provide end-users with maximum situational awareness, a comprehensive view of the battlespace, all within a secure networking environment. Building from previous AFIT research efforts, this research developed a novel security framework architecture to address the lack of efficient and scalable secure multicasting in the low earth orbit …


A Secure Group Communication Architecture For A Swarm Of Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips Mar 2008

A Secure Group Communication Architecture For A Swarm Of Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips

Theses and Dissertations

This thesis investigates the application of a secure group communication architecture to a swarm of autonomous unmanned aerial vehicles (UAVs). A multicast secure group communication architecture for the low earth orbit (LEO) satellite environment is evaluated to determine if it can be effectively adapted to a swarm of UAVs and provide secure, scalable, and efficient communications. The performance of the proposed security architecture is evaluated with two other commonly used architectures using a discrete event computer simulation developed using MatLab. Performance is evaluated in terms of the scalability and efficiency of the group key distribution and management scheme when the …


Symbolic Links In The Open Directory Project, Saverio Perugini Mar 2008

Symbolic Links In The Open Directory Project, Saverio Perugini

Computer Science Faculty Publications

We present a study to develop an improved understanding of symbolic links in web directories. A symbolic link is a hyperlink that makes a directed connection from a web page along one path through a directory to a page along another path. While symbolic links are ubiquitous in web directories such as Yahoo!, they are under-studied, and as a result, their uses are poorly understood. A cursory analysis of symbolic links reveals multiple uses: to provide navigational shortcuts deeper into a directory, backlinks to more general categories, and multiclassification. We investigated these uses in the Open Directory Project (ODP), the …


Double Cross Playing Diamonds, Rudolf Kaehr Jan 2008

Double Cross Playing Diamonds, Rudolf Kaehr

Rudolf Kaehr

Understanding interactivity in/between bigraphs and diamonds Grammatologically, the Western notational system is not offering space in itself to place sameness and otherness necessary to realize interaction/ality. Alphabetism is not prepared to challenge the dynamics of interaction directly. The Chinese writing system in its scriptural structuration, is able to place complex differences into itself, necessary for the development and design of formal systems and programming languages of interaction. The challenge of interactionality to Western thinking, modeling and design interactivity has to be confronted with the decline of the scientific power of alpha-numeric notational systems as media of living in a complex …


Short Studies 2008. Adventures In Diamond Strategies Of Change(S), Rudolf Kaehr Jan 2008

Short Studies 2008. Adventures In Diamond Strategies Of Change(S), Rudolf Kaehr

Rudolf Kaehr

Modular Bolognese Paradoxes of postmodern education. A Tale of Fishes, Birds and Diamonds in Second-Order Epistemology Why it is useless to write about the mono-contexturality of alphabetism and digitalism Chez Maxime's Human rights in a polycontextural world Primary Thoughts to a Manifesto for Awareness Fashion Marketing Which Equality? How equal are equal human beings? Generalized Diamonds From monosemic to tectonic complementarity Diamond Disremption Diamond interpretation of the kenomic succession operation Diamond Web2.0? How social is social networking? Web Mobility Web computing between semiotic and kenomic spaces Double Cross Playing Diamonds Understanding interactivity in/between bigraphs and diamonds Morphogrammatics of Change A …


Tourism Development In Aqaba And Human Sustainability, Philadelphia University Jan 2008

Tourism Development In Aqaba And Human Sustainability, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


A Type Of Variation Of Hamilton Path Problem With Applications, Jitian Xiao, Jun Wang Jan 2008

A Type Of Variation Of Hamilton Path Problem With Applications, Jitian Xiao, Jun Wang

Research outputs pre 2011

This paper describes a type of variation of the Hamilton path problem that can be applied to a type of applications. Unlike the original Hamilton path problem, the variation always has a solution. The problem of finding solutions to the variation of the Hamilton path problem is NP-complete. A heuristic for finding solutions to the problem is developed and analyzed. The heuristic is then applied to a real application scenario in the area of spatial cluster scheduling in spatial join processing. Experiments have demonstrated that the proposed method generates better cluster sequence than existing algorithms.


Towards Automated Test Sequence Generation, Usman Farooq, Chiou Peng Lam, Huaizhong Li Jan 2008

Towards Automated Test Sequence Generation, Usman Farooq, Chiou Peng Lam, Huaizhong Li

Research outputs pre 2011

The article presents a novel control-flow based test sequence generation technique using UML 2.0 activity diagram, which is a behavioral type of UML diagram. Like other model-based techniques, this technique can be used in the earlier phases of the development process owing to the availability of the design models of the system. The activity diagram model is seamlessly converted into a colored Petri net. We proposed a technique that enables the automatic generation of test sequences according to a given coverage criteria from the execution of the colored Petri nets model. Two types of structural coverage criteria for AD based …


Supporting Component Selection With A Suite Of Classifiers, Valerie Maxville, Chiou Peng Lam, J Armarego Jan 2008

Supporting Component Selection With A Suite Of Classifiers, Valerie Maxville, Chiou Peng Lam, J Armarego

Research outputs pre 2011

Software selection involves the assimilation of information and results for each candidate to enable a comparison for decisions to be made. The processes and tools developed assist with software selection to enhance quality, documentation and repeatability. The CdCE process aims to retain and document the information used in selection to assist decisions and to document them for reference as the system evolves. This paper describes the CdCE process and our approach to assist the shortlisting of candidates through a suite of classifiers. The application of the suite is illustrated using a selection and evaluation case study. Applying this approach helps …


Mutation Analysis For The Evaluation Of Ad Models, Usman Farooq, Chiou Peng Lam Jan 2008

Mutation Analysis For The Evaluation Of Ad Models, Usman Farooq, Chiou Peng Lam

Research outputs pre 2011

UML has became the industry standard for analysis and design modeling. Model is a key artifact in Model Driven Architect (MDA) and considered as an only concrete artifact available at earlier development stages. Error detection at earlier development stages can save enormous amount of cost and time. The article presents a novel mutation analysis technique for UML 2.0 Activity Diagram (AD). Based on the AD oriented fault types, a number of mutation operators are defined. The technique focuses on the key features of AD and enhances the confidence in design correctness by showing the absence of control-flow and concurrency related …


Optimized Wlan Mac Protocol For Multimedia Applications, Hushairi Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad Jan 2008

Optimized Wlan Mac Protocol For Multimedia Applications, Hushairi Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad

Research outputs pre 2011

In this paper we propose an optimized WLAN MAC protocol for multimedia applications. The proposed MAC protocol consist of 3 main optimizing architectures, traffic segregation, specific service interval (SI) for voice and video traffic and smaller contention window (CW). Traffic segregation segregates real-time traffic from best-effort traffic while specific service interval provides voice and video traffic with the SI based on its mean arrival rate. In the contention time frame, the CW is made smaller to reduce delay and increase throughput. Ns2 is used as a simulating tool to compare the results of our proposed protocol with the legacy 802.11 …


Amvc: A Loosely-Coupled Architecture For Component-Based Clients, Brendan Lawlor Jan 2008

Amvc: A Loosely-Coupled Architecture For Component-Based Clients, Brendan Lawlor

Theses

There is an architectural deficit in most currently undertaken rich client applications: In n-tier applications the presentation layer is represented as a single layer. This is as true of browser-based rich clients (Rich Internet Applications) as of rich desktop clients since both are designed along component-based, event-driven lines. The result of creating rich clients without sufficient application architecture underpinning is often tightly-coupled code of unnecessary complexity, with the associated high cost of maintenance. No commonly understood pattern is currently evident that would allow rich client components to be combined into a loosely coupled application. This paper describes the theory and …


Ua1f Wku Archives Vertical File - Wku Information Technology, Wku Archives Jan 2008

Ua1f Wku Archives Vertical File - Wku Information Technology, Wku Archives

WKU Archives Records

Digitized vertical file materials regarding WKU Information Technology.