Introduction to DoD Architecture Framework (DoDAF)
|
|
- Jared Wilson
- 7 years ago
- Views:
Transcription
1 Introduction to DoD Architecture Framework (DoDAF) Beverly Hawk 1 Jonnathan Kim 2 What i thi paper? Thi paper, Introduction to the DoD Architecture Framework (DoDAF), i an ultra-brief overview of DoDAF. The intent i to provide potential uer a quick overview of DoDAF and related architecture product. DoDAF provide a framework to completely decribe ytem pecification, deign procee, trade parameter, etc. What i DoDAF? Modern day warfighting operation involve complex et of hardware, oftware, and uer. In decribing the development and integration of uch complex ytem, it i neceary to provide a common and conitent approach to decribe the ytem and procee. DoDAF provide guidance for decribing architecture for warfighting operation, buine operation, and procee. [1] Utilizing thi framework provide a common approach for architecture decription, development, preentation, and integration. Before going further in decribing thi common approach, it i neceary to undertand the term architecture which i frequently ued, and often miued. IEEE define architecture a the organizational tructure of a ytem and component. Baed on thi definition, the DoD Integrated Architecture Panel define architecture a the tructure of component, their relationhip, and the principle and guideline governing their deign and evolution over time. IEEE STD alo tate An architecture i the fundamental organization of a ytem embodied in it component, their relationhip to each other, and to the environment, and the principle guiding it deign and evolution. From thi definition, we can further expand the decription of the architecture framework a a tool which hould decribe a method for deigning an information ytem in term of a et of building block, and for howing how the building block fit together. It hould contain a et of tool and provide a common vocabulary. It hould alo include a lit of recommended tandard and compliant product that can be ued to implement the building block. Where i the beef? How doe DoDAF help u decribe a ytem or a proce? Firt of all, DoDAF define the perpective from which a ytem i decribed. Figure 1 depict three view. A ytem can be decribed from the operational perpective. The product generated from the operational perpective i termed Operation View. The OV decribe the tak, activitie, operational element, and information exchange required to accomplih a DoD miion. The Sytem View (SV) decribe an architecture in term of ytem and interconnection to accomplih a DoD miion. The Technical View (TV) i a et of rule and tandard governing the arrangement, interaction, and interdependency. The TV provide a et of rule and tandard to promote efficiency and interoperability in TV-1 and to enure that developer can adequately plan for evolution in TV-2. The All View (AV) decribe the overarching apect of the architecture that are pertinent to all the view but are not pecific to a ingle view. The complete et of the view i delineated in Table 1. A hown in the table, there are many product that contitute the DoDAF view. 1 EPG, hawk@epg.army.mil 2. GaN Corporation, jkim@gancorp.com
2 Activitie / Tak Operationa l View Operationa l Element Information Flow Sytem Sytem View Data Flow Standard Technical Standard View Rule Communication Figure 1. DoDAF View (Reference [1]) Convention [Note: Reference [1] doe not how the AV in Figure 1.] Each view product i inter-related to other view product to provide a complete picture of a ytem. For example, the SV-5 relate operational activitie from the OV-5 to ytem function from SV-4; the SV-4 ytem function are related to ytem in the SV-1; thu bridging the operational and ytem view. The high-level operational concept hould drive the OV; the OV in turn drive the SV to identify hortfall and ytem requirement, and the SV requirement drive the TV to addre a common et of applicable tandard. To be internally conitent and integrated, an architecture decription mut provide explicit linkage among it variou view. [1] It i important to note that it i poible ue a ubet of thee view to completely decribe a ytem or a proce. It i up to the architect to define a et of appropriate view for the intended ue of the architecture. How do we generate the view? Each view i generated with graphic, table, or text to completely decribe the pecified objective of the view. Reference [1] provide a general guideline of 5 tep for building architecture decription. They are: Step 1: Determine the intended ue of the architecture decription. Step 2: Determine the architecture decription cope, context, environment, and any other aumption to be conidered. Step 3: Determine what information the architecture decription need to capture baed on the intended ue. Step 4: Determine product to be built. Step 5: Gather the architecture data and build the requiite product.
3 For each view, the architecture of interet i decribed from that perpective. OV hould provide information about the operational node (who i reponible for the proce) and information flow among the operational node. The SV identify what the ytem are, how they are connected, and what they do. A an example, the OV can decribe how organization and people work together to accomplih a miion. The SV can decribe what pecific ytem are utilized to accomplih the miion. The TV decribe a et of pecification of the relevant technologie that are exiting (TV-1) and forecated (TV-2). Thee architectural product are graphical or textual repreentation of the data et which define variou attribute of the architecture. Since a given data element will frequently occur in more than one product, it i crucial to build a conitent et of data element. For example, a data element table can define data attribute uch a type and characteritic. The notation and format to generate the view can vary depending on application and uer. However, for objective oriented (OO) application, the Unified Modeling Language (UML) i often ued a the tandard method of repreentation. Reference [2] decribe how UML i ued to document OV and SV in detail. When the DoDAF architecture product are being developed, it i crucial to retain the information that decribe the cope and complexitie of the architectural data and data relationhip for viualizing and undertanding. There are tandard format and automated tool available to document the view. The All- DoD Core Architecture Data Model (CADM) wa developed a the DoD tandard architecture data model for Framework baed architecture data element. For development of the product, DoDAF doe not pecify or advocate a methodology or a notation, but DoDAF provide guidance for the product to contain the required intance of data element and relationhip. What have we done? We at EPG have developed architecture product, per DoDAF guidance, coniting of graphical and textual item providing an architecture decription of characteritic pertinent to our Tet Tool Kit for C4I teting. Our architecture flow into the ATEC teting architecture to complete tet and evaluation requirement. Where do I get more information? There are two main volume of DoD Architecture Framework Verion 1.0. Thee volume are available on the web Alo, there are many publication and clae available to learn about DoDAF. Reference: [1] DoD AF Vol 1, Definition and Guideline, 9 February [2] DoD AF Vol 2, Production, 9 February 2004.
4 Framework Product Applicable View Framework Product Name General AV-1 All View Overview and Summary Information Scope, purpoe, intended uer, environment depicted, analytical finding AV-2 All View Integrated Dictionary Architecture data repoitory with definition of all term ued in all product OV-1 Operational High-Level Operational High-level graphical/ textual decription of operational concept Concept Graphic OV-2 Operational Operational Node Connectivity Operational node, connectivity and information exchange needline between node OV-3 Operational Operational Information Exchange Matrix Information exchanged between node and the relevant attribute of that exchange OV-4 Operational Organizational Relationhip Organizational, role, or other relationhip among organization Chart OV-5 Operational Operational Activity Model Capabilitie, Operational Activitie, relationhip among activitie, input and output. Overlay can how cot, performing node, or other pertinent information OV-6a Operational Operational Rule Model One of the three product ued to decribe operational activity identifie buine rule that contrain operation OV-6b Operational Operational State Tranition One of three product ued to decribe operational activity identifie buine proce repone to event OV-6c Operational Operational Event-Trace One of three product ued to decribe operational activity trace action in a cenario or equence of event OV-7 Operational Logical Data Model Documentation of the ytem data requirement and tructural buine proce rule of the Operational View. SV-1 Sytem Sytem Interface Identification of ytem node, ytem, and ytem item and their interconnection, within and between node SV-2 Sytem Sytem Communication Sytem node, ytem, and ytem item, and their related communication lay-down SV-3 Sytem Sytem-Sytem Matrix Relationhip among ytem in a given architecture; can be deigned to how relationhip of interet, e.g., ytem-type interface, planned v. exiting interface, etc. SV-4 Sytem Sytem Functionality Function performed by ytem and the ytem data flow among ytem function SV-5 Sytem Operational Activity to Sytem Function Traceability Mapping of ytem back to capabilitie or of ytem function back to operational activitie Matrix SV-6 Sytem Sytem Data Exchange Matrix Provide detail of ytem data element being exchanged between ytem and the attribute of that exchange SV-7 Sytem Sytem Performance Parameter Matrix Performance characteritic of ytem view element, for the appropriate timeframe() SV-8 Sytem Sytem Evolution Planned incremental tep toward migrating a uite of ytem to a more efficient uite, or toward evolving a current ytem to a future implementation SV-9 Sytem Sytem Technology Forecat Emerging technologie and oftware/hardware product that are expected to be available in a given et of timeframe, and that will affect future development of the architecture SV-10a Sytem Sytem Rule Model One of three product ued to decribe ytem functionality identifie contraint that are impoed on ytem functionality due to ome apect of ytem deign or implementation SV-10b Sytem Sytem State Tranition One of three product ued to decribe ytem functionality identifie repone of a ytem to event SV-10c Sytem Sytem Event-Trace One of three product ued to decribe ytem functionality identifie ytem-pecific refinement of critical equence of event decribed in the operational view SV-11 Sytem Phyical Schema Phyical implementation of the Logical Data Model entitie, e.g., meage format, file tructure, phyical chema TV-1 Technical Technical Standard Profile Liting of tandard that apply to ytem view element in a given architecture TV-2 Technical Technical Standard Forecat of emerging tandard and potential impact on current ytem view element, within a et of timeframe Table 1. DoD AF Product
5 APPENDIX 1 Electronic Proving Ground DoDAF Product
DoD Architecture Framework Version 1.5
DoD Architecture Framework Version 1.5 Technical Standards View Systems/Services View Operational View All View Core Architecture Data Model Volume II: Product Descriptions 23 April 2007 SECTION TABLE
More informationPekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T
Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping
More informationA Review On Software Testing In SDlC And Testing Tools
www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,
More informationCASE STUDY ALLOCATE SOFTWARE
CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT
More informationProject Management Basics
Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationREDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.
International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.
More informationRequirements Engineering Databases: The Good, The Bad, and The Ugly
New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch brian.berenbach@iemen.com 1 Agenda Brief Introduction
More informationARCHITECTURE DESIGN OF SECURITY SYSTEM
Trakia Journal of Sciences, Vol. 8, No. 3, pp 77-82, 2010 Copyright 2009 Trakia University Available online at: http://www.uni-sz.bg ISSN 1313-7050 (print) ISSN 1313-3551 (online) Review ARCHITECTURE DESIGN
More informationCASE STUDY BRIDGE. www.future-processing.com
CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION
More informationA Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationCHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
More informationAcceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds
Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden
More informationOPINION PIECE. It s up to the customer to ensure security of the Cloud
OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard
More informationLicense & SW Asset Management at CES Design Services
Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What
More informationHow Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal
How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing
More informationSHARESYNC SECURITY FEATURES
www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More informationSoftware Engineering Management: strategic choices in a new decade
Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationLaureate Network Products & Services Copyright 2013 Laureate Education, Inc.
Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate
More informationUtility-Based Flow Control for Sequential Imagery over Wireless Networks
Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationPerformance of a Browser-Based JavaScript Bandwidth Test
Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further
More informationAPEC Environmental Goods and Services Work Program
APEC Environmental Good and Service In Sydney in 2007 APEC Leader committed, through wide-ranging and ambitiou action, a et out in the Sydney Action Agenda, to enuring the energy need of the economie whilt
More informationChapter 3 Torque Sensor
CHAPTER 3: TORQUE SESOR 13 Chapter 3 Torque Senor Thi chapter characterize the iue urrounding the development of the torque enor, pecifically addreing meaurement method, tranducer technology and converter
More informationTesting Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts
Teting Documentation for CCIH Databae Management Sytem By: John Reeve, Derek King, and Robert Watt The teting proce for our project i divided into three part of Unit teting, one part of Integration/Function
More informationTowards Control-Relevant Forecasting in Supply Chain Management
25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem
More informationGroup Mutual Exclusion Based on Priorities
Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio
More informationA Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks
A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International
More informationA note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
More informationQUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES
Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,
More informationFOUR EASY PIECES FOR ASSESSING THE USABILITY OF MULTIMODAL INTERACTION: THE CARE PROPERTIES
1 FOUR EASY PIECES FOR ASSESSING THE USABILITY OF MULTIMODAL INTERACTION: THE CARE PROPERTIES Daniel Salber BP 53, 38041 Grenoble Cedex 9, France {joelle.coutaz, laurence.nigay, daniel.alber} @imag.fr
More informationScheduling of Jobs and Maintenance Activities on Parallel Machines
Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department
More informationChange Management Plan Blackboard Help Course 24/7
MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen
More informationMARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Systems)
Guide for Marine Health, Safety, Quality and vironmental Management GUIDE FOR MARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Sytem) APRIL 2012
More informationIntegration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards
I.J. Information Technology and Computer Science, 2013, 07, 1-11 Publihed Online June 2013 in MECS (http://www.mec-pre.org/) DOI: 10.5815/ijitc.2013.07.01 Integration of Independent Application and EAI
More informationnaifa Members: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS
naifa Member: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS National Aociation of Inurance and Financial Advior Serving America Neigborhood for Over 120 Year Since 1890, NAIFA ha worked to afeguard the
More informationBio-Plex Analysis Software
Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware
More informationTRID Technology Implementation
TRID Technology Implementation Jaime Koofky, Managing Attorney, Brady & Koofky PA Cecelia Raine, Co-Chair, Cloing Inight Adviory Board, RealEC Technologie Richard Triplett, CMB, Vice Preident, Director
More informationBi-Objective Optimization for the Clinical Trial Supply Chain Management
Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective
More informationIntegration of Information Assurance (IA) into DoDAF Architectures. Annual Computer Security Applications Conference (ACSAC 04) 8 December 2004
Copyright (c) 2004 Booz Allen Hamilton. All rights reserved 1 Integration of Information Assurance (IA) into DoDAF Architectures Annual Computer Security Applications Conference (ACSAC 04) 8 December 2004
More informationOptical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng
Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare
More informationMINUTES (Adopted at August 24, 2011 Executive Committee Meeting) 1. Call to Order, Chair s Remarks, Attendance
IAP2 BC Chapter Executive Committee (EC) Meeting #15 Wedneday, July 13, 2011 Teleconference 5:05-6:40 p.m. MINUTES ( at Augut 24, 2011 Executive Committee Meeting) 1. Call to Order, Chair Remark, Attendance
More informationSRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S
SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S Chinatu Aone, Doug McKee, Sandy Shinn, Hatte Bleje r Sytem Reearch and Application (SRA ) 2000 15th Street North Arlington, VA 2220 1 aonec@ra.com INTRODUCTION
More informationStrategic Plan of the Codex Alimentarius Commission 2014-2019 1
Strategic Plan of the Codex Alimentariu Commiion 2014-2019 1 STRATEGIC PLAN OF THE CODEX ALIMENTARIUS COMMISSION 2014-2019 INTRODUCTION The Codex Alimentariu Commiion (CAC) wa etablihed by the Food and
More informationTap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms
Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:
More informationVery special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible.
Digital manufacturing technology and convenient acce to High Performance Computing (HPC) in indutry R&D are eential to increae the quality of our product and the competitivene of our companie. Progre can
More informationUniversidad de Colima Dirección General de Relaciones Internacionales y Cooperación Académica. List of courses taught in English 2016.
Univeridad de Colima Dirección General de Relacione Internacionale y Cooperación Académica. Lit of coure taught in Englih 2016. SCHOOL OF TOURISM. Bachelor in Tourim Management Semeter January - July 2016.
More information2. METHOD DATA COLLECTION
Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,
More informationINFORMATION Technology (IT) infrastructure management
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning
More informationName: SID: Instructions
CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/
More informationEncrypted TCP chat using RSA and AES algorithm
Encrypted TCP chat uing RSA and AES algorithm Krzyztof Jakub Szala Bachelor Thei April 2014 Degree Programme in Information Technology Technology, communication and tranport DESCRIPTION Author() SZALA
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationAchieving Quality Through Problem Solving and Process Improvement
Quality Aurance Methodology Refinement Serie Achieving Quality Through Problem Solving and Proce Improvement Second Edition By Lynne Miller Franco Jeanne Newman Gaël Murphy Elizabeth Mariani Quality Aurance
More informationA Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
More informationRT 24 - Architecture, Modeling & Simulation, and Software Design
RT 24 - Architecture, Modeling & Simulation, and Software Design Dennis Barnabe, Department of Defense Michael zur Muehlen & Anne Carrigy, Stevens Institute of Technology Drew Hamilton, Auburn University
More informationAlgorithms for Advance Bandwidth Reservation in Media Production Networks
Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton
More informationCHAPTER 5 BROADBAND CLASS-E AMPLIFIER
CHAPTER 5 BROADBAND CLASS-E AMPLIFIER 5.0 Introduction Cla-E amplifier wa firt preented by Sokal in 1975. The application of cla- E amplifier were limited to the VHF band. At thi range of frequency, cla-e
More informationThank you for attending the MDM for the Enterprise Seminar Series!
Thank you for attending the MDM for the Enterprie Seminar Serie! Pleae do not ditribute thi preentation without permiion from the peaker (ee contact information within.) Thi i jut intended a an additional
More informationMixed Method of Model Reduction for Uncertain Systems
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced
More informationControl Theory based Approach for the Improvement of Integrated Business Process Interoperability
www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development
More informationINTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS
INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,
More informationSELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE
SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,
More informationRO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds
!111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg
More informationA Novel Web-Based Student Academic Records Information System
A Novel Web-Baed Student Record Information Sytem Nmaju Obai, E. O. Nwachukwu, and C. Ugwu Department of Computer Science, Univerity of Port Harcourt, Port Harcourt, River State, Nigeria nmajuobai@yahoo.com,
More informationService Oriented Architectures Using DoDAF1
1 Service Oriented Architectures Using DoDAF1 Huei-Wan Ang, Fatma Dandashi, Michael McFarren The Mitre Corporation The MITRE Corp. 7515 Colshire Dr. McLean, VA 22102 hwang(at)mitre.org, dandashi(at)mitre.org,
More informationRisk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms
Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,
More informationResearch Article An (s, S) Production Inventory Controlled Self-Service Queuing System
Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department
More informationProducts and Services
Product and Service With client ranging from mall buinee to Fortune 500 firm, GIS ha vat experience undertanding and delivering on the unique need of a wide range of client. By providing uperior product
More informationEVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN
International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION
More informationTrusted Document Signing based on use of biometric (Face) keys
Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationReturn on Investment and Effort Expenditure in the Software Development Environment
International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar
More informationBidding for Representative Allocations for Display Advertising
Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay
More informationExposure Metering Relating Subject Lighting to Film Exposure
Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.
More informationImagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006
ry Portal Workhop #2 Department of Adminitrative Service, Executive Building Salem, Oregon May 11, 2006 Workhop Purpoe: dicu the outcome of the phae 1 coping proce for development of an imagery portal
More informationDoSAM Domain-Specific Software Architecture Comparison Model *
DoSAM Domain-Specific Software Architecture Comparion Moel * Klau Bergner 1, Anrea Rauch 2, Marc Sihling 1, Thoma Ternité 2 1 4Soft GmbH Mitterertraße 3 D-80336 Munich, Germany {bergner ihling}@4oft.e
More informationFour Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations
Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open
More informationPrincipal version published in the University of Innsbruck Bulletin of 8 April 2009, Issue 55, No 233
Note: The following curriculum i a conolidated verion. It i legally non-binding and for informational purpoe only. The legally binding verion are found in the Univerity of Innbruck Bulletin (in German).
More informationAnalysis of Mesostructure Unit Cells Comprised of Octet-truss Structures
Analyi of Meotructure Unit Cell Compried of Octet-tru Structure Scott R. Johnton *, Marque Reed *, Hongqing V. Wang, and David W. Roen * * The George W. Woodruff School of Mechanical Engineering, Georgia
More informationFederal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services
Federal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services Scott A. Bernard, Ph.D. Scott_Bernard@omb.eop.gov Federal Chief Enterprise Architect Executive Office
More information1 Looking in the wrong place for healthcare improvements: A system dynamics study of an accident and emergency department
1 Looking in the wrong place for healthcare improvement: A ytem dynamic tudy of an accident and emergency department DC Lane, C Monefeldt and JV Roenhead - The London School of Economic and Political Science
More informationMulti-Objective Optimization for Sponsored Search
Multi-Objective Optimization for Sponored Search Yilei Wang 1,*, Bingzheng Wei 2, Jun Yan 2, Zheng Chen 2, Qiao Du 2,3 1 Yuanpei College Peking Univerity Beijing, China, 100871 (+86)15120078719 wangyileipku@gmail.com
More informationProceedings of Power Tech 2007, July 1-5, Lausanne
Second Order Stochatic Dominance Portfolio Optimization for an Electric Energy Company M.-P. Cheong, Student Member, IEEE, G. B. Sheble, Fellow, IEEE, D. Berleant, Senior Member, IEEE and C.-C. Teoh, Student
More informationGrowth and Sustainability of Managed Security Services Networks: An Economic Perspective
Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,
More informationProduction Management II. Product Life-Cycle Management II
Production Management II - - Product Life-Cycle Management II Contact: Dipl.-Ing. Wolfgang Boo w.boo@wzl.rwth-aachen.de WZL 53B Raum 507 Tel.: 80-28 469 Objective of the Lecture: Overview of Product-Data-Management-Sytem
More informationTest bed for multiagent control systems in road traffic management
Delft Univerity of Technology Delft Center for Sytem and Control Technical report 05-007 Tet bed for multiagent control ytem in road traffic management R.T. van Katwijk, P. van Koningbruggen, B. De Schutter,
More informationDesign of Compound Hyperchaotic System with Application in Secure Data Transmission Systems
Deign of Compound Hyperchaotic Sytem with Application in Secure Data Tranmiion Sytem D. Chantov Key Word. Lyapunov exponent; hyperchaotic ytem; chaotic ynchronization; chaotic witching. Abtract. In thi
More informationFinal Award. (exit route if applicable for Postgraduate Taught Programmes) N/A JACS Code. Full-time. Length of Programme. Queen s University Belfast
Date of Reviion Date of Previou Reviion Programme Specification (2014-15) A programme pecification i required for any programme on which a tudent may be regitered. All programme of the Univerity are ubject
More informationHow To Design A Wind Turbine
Critical iue in wind turbine deign (Uncertaintie) IEA-meeting Trondheim, Norway June 4-5 005 Proect idea: To ignificantly improve deign bai for offhore wind turbine by: Analying all deign proce component
More informationWarehouse Security System based on Embedded System
International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity
More informationQueueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationStudent Learning Outcomes: A 3-Tiered Approach
Student Learning Outcome: A 3-Tiered Approach 1 Purpoe Share Seminole State model for aeing Student Learning Outcome Gather feedback to refine our approach 2 Student Learning Outcome Why ae? SACS accreditation
More informationSupport Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.
The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem
More informationDelivering the Next Generation of Satellite and Terrestrial Communications
Delivering the Next Generation of Satellite and Terretrial Communication Editor Letter Developing new technology i a daunting and neceary tak if companie are to tay competitive in today global communication
More informationThe Cash Flow Statement: Problems with the Current Rules
A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention
More informationHow To Understand The Hort Term Power Market
Short-term allocation of ga network and ga-electricity input forecloure Miguel Vazquez a,, Michelle Hallack b a Economic Intitute (IE), Federal Univerity of Rio de Janeiro (UFRJ) b Economic Department,
More informationHow To Prepare For A Mallpox Outbreak
Iue Brief No. 1 Bioterrorim and Health Sytem Preparedne Addreing the Smallpox Threat: Iue, Strategie, and Tool www.ahrq.gov The Agency for Healthcare Reearch and Quality (AHRQ) i the lead agency charged
More informationSocially Optimal Pricing of Cloud Computing Resources
Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett
More information