The London Ambulance System and the online tax return system of Her Majesty's Revenue and Customs are two systems that have experienced significant problems of scalability. However, we've never seen ...a precise discussion of their scalability concerns. In this column we use those systems to illustrate how the scalability of software systems can be more precisely understood and characterized, and we describe recent research on goal-obstacle analysis that can help elaborate the scalability requirements of such systems, in an effort to mitigate scalability problems early in development.
Six short stories by Luigi Pirandello form the basis of the 1984 film Kaos, shot in the same number of episodes, though only four of them principally document rural agrarian society and poverty in ...late nineteenth- and early-twentieth-century Sicily. Taking as its point of departure the anthropomorphism attributed to an animal in the film's frame story, this essay decontextualizes that point of view to assert that human pre-Roman deforestation was a major cause of ecological, agrarian, and economic impoverishment that has characterized Sicily ever since. In consideration of the film's formal structure and the aesthetic conclusion drawn in its final episode - indicated by its makers as its epilogue - it is also argued, once more through the agency of anthropomorphism, that the epilogue can therefore be considered to lie within the boundaries of the film's frame story, and is not merely a conclusion to the preceding five episodes.
The purpose of this paper is to compare leadership behaviours from two different approaches with the leadership behaviours within quality management in order to find possible areas for developing ...leadership within quality management. A case study has been carried out at a Swedish award-winning organisation in order to study leadership behaviours. In-depth interviews have been carried out with the intention to explore how the manager has worked to become one of Sweden's best workplaces. Leadership behaviours from three different approaches are summarised in 'The Core Leadership Behaviours'. The analysis of the leadership methodologies and behaviours used by the leaders and the 'Core Leadership Behaviours' from the three different approaches has been summarised for each approach. The comparison indicates that there are interesting leadership behaviours in Change Oriented Leadership, as well as in KaosPilots, that are not established within quality management. The leadership behaviours could complement quality management to meet new and challenging demands from customers and co-workers.
Traditionally, a security policy is defined from an informal set of requirements, generally written using natural language. It is then difficult to appreciate the compatibility degree of the manually ...generated security policy with the informal requirements definition. The idea of this paper is to automate the process of deriving the formal security policy, using a more structured specification of the security objectives issued by the administrator of the information system to be secured. We chose the goal-oriented methodology KAOS to express the functional objectives, then based on the results of a risk analysis, we integrate the security objectives to the obtained KAOS framework. Finally, through a process of transformation applied to this structured security objectives specification, we automatically generate the corresponding security policy. This policy is consistent with the access control model OrBAC (Organization Access Control).
Chaos in product maps DEĞİRMENCİ, NEDİM; KOÇAK, ŞAHİN
Turkish journal of mathematics,
01/2010, Letnik:
34, Številka:
4
Journal Article
Recenzirano
Odprti dostop
We discuss how chaos conditions on maps carry over to their products. First we give a counterexample
showing that the product of two chaotic maps (in the sense of Devaney) need not be chaotic. We ...then
remark that if two maps (or even one of them) exhibit sensitive dependence on initial conditions, so does
their product; likewise, if two maps possess dense periodic points, so does their product. On the other side,
the product of two topologically transitive maps need not be topologically transitive. We then give sufficient
conditions under which the product of two chaotic maps is chaotic in the sense of Devaney 6.
Bu çalışmada gecikmeli vektör varyans metodunun, kayıt edilmiş konuşma seslerinin steganalizinde kullanımı araştırılmıştır. Konuşma sinyali içerisine veri gizlemenin orijinal ses verisinin ...özelliklerini bozacağı gerçeğinden göz önünde bulundurarak, vekil verileri kullanan gecikmeli vektör varyans (DVV) özelliklerindeki değişimi kontrol eden ve böylece stego-sinyalin varlığını tespit etmeye çalışan yeni bir steganalizör tasarlanmıştır. DVV özelliklerini baz alan önerilen steganalizörün performans başarımı ise nümerik değerlerle verilmiştir
Business process models provide a natural way to describe real-world processes to be supported by software-intensive systems. These models can be used to analyze processes in the system-as-is and ...describe potential improvements for the system-to-be. There is however little support to analyze how well a given business process models satisfies its business goals. Our objective is to address these problems by relating business process models to goal models so that goal-oriented requirements engineering techniques can be used to analyze how well the business processes for the system-as-is satisfy the business goals. The paper establishes relationships between BPMN 2.0 and the KAOS goal-oriented requirements modelling framework. We present the notion of intentional fragment to bridge the gap between process models and goal models. We conducted an evaluation to analyze use of this concept in the context of a university process.
Chaotic systems are sensitive to initial conditions, system parameters and topological transitivity and these
properties are also remarkable for cryptanalysts. Noise like behavior of chaotic systems ...is the main reason
of using these systems in cryptology. However some properties of chaotic systems such as synchronization,
fewness of parameters etc. cause serious problems for cryptology. In this paper, to overcome disadvantages
of chaotic systems, the dynamics of Chua's circuit namely x, y and z were modeled using Artificial
Neural Network (ANN). ANNs have some distinctive capabilities like learning from experiences, generalizing
from a few data and nonlinear relationship between inputs and outputs. The proposed ANN was trained
in different structures using different learning algorithms. To train the ANN, 24 different sets including
the initial conditions of Chua's circuit were used and each set consisted of about 1800 input-output data.
The experimental results showed that a feed-forward Multi Layer Perceptron (MLP), trained with Bayesian
Regulation backpropagation algorithm, was found as the suitable network structure. As a case study, a
message was first encrypted and then decrypted by the chaotic dynamics obtained from the proposed ANN
and a comparison was made between the proposed ANN and the numerical solution of Chua's circuit about
encrypted and decrypted messages.
There are some methods to perform goal-oriented requirements analysis, i.e.: KAOS, GBRAM, i*, etc. The House of Representatives of Republic of Indonesia, as we call DPR RI, is an institution with ...obligations to accommodate people's aspirations and complaints. DPR RI Online Public Complaints System (PCS) is one of the media that can be used by the public to provide complaints to the DPR RI. Through interviews with experts, the current DPR RI Online PCS (system-as-is) still needs to be developed, so it needs to be performed in-depth requirements analysis of the system. The analysis was performed using the GORE (Goal-Oriented Requirements Engineering), by combining SAR (Select Appropriate Regulations), R2G (Regulations to Goal Model), and KAOS (Keep All Objectives Satisfied) methods. The results of the requirements analysis that have been carried out show that the SAR, R2G, and KAOS methods are proven to bend suitable to analyze the requirements of the DPR RI Online PCS. Furthermore, the analysis shows that system-as-is can only realize 13 system requirements or equal to 81.25% of the total 16 actual system requirements (system-to-be), so there is a gap between system-as-is and system-to-be of 3 system requirements or 18.75%.