Journal of
Systemics, Cybernetics and Informatics
HOME  |   CURRENT ISSUE   |   PAST ISSUES   |   RELATED PUBLICATIONS     IIIS   |   SEARCH     CONTACT US
 


ISSN: 1690-4524 (Online)


Indexed by
EBSCO, Cabell, DOAJ (Directory of Open Access Journals), Academic Journals Database, and Google Scholar


Listed in
Cabell Directory of Publishing Opportunities and in Ulrich’s Periodical Directory


Re-Published in
Academia.edu
(A Community of about 10.000.000 Academics)


Editorial Advisory Board's Chair
William Lesso

Editor-in-Chief
Nagib C. Callaos


Sponsored by
The International Institute of
Informatics and Systemics

www.iiis.org

 

Editorial Advisory Board

Journal's Reviewers
 

Description and Aims

Submission of Articles

Areas and Subareas

Information to Contributors

Editorial Peer Review Methodology


Information Management Processes for Extraction of Student Dropout Indicators in Courses in Distance Mode
Renata Maria Abrantes Baracho, Paloma de Albuqyerque Diesel
(pages: 1-6)

Tools for Teaching Mathematical Functions and Geometric Figures to Tactile Visualization through a Braille Printer for Visual Impairment People
Lorena León, Luiz Cesar Martini, Cristhian Moreno-Chaparro
(pages: 7-10)

A Project-Based Language Learning Model for Improving the Willingness to Communicate of EFL Students
Ibrahim Farouck
(pages: 11-18)

Educating Future Coders with a Holistic ICT Curriculum and New Learning Solutions
Pia Niemelä, Cristiano Di Flora, Martti Helevirta, Ville Isomöttönen
(pages: 19-23)

Challenges with Ethical Behavior and Accountability in Leadership
Laura Thompson
(pages: 24-29)

Biotreatment of Slaughterhouse Wastewater Accompanied with Sustainable Electricity Generation in Microbial Fuel Cell
Zainab Z. Ismail, Ali J. Mohammed
(pages: 30-35)

Towards to a Predictive Model of Academic Performance Using Data Mining in the UTN - FRRe
David L. La Red Martínez, Marcelo Karanik, Mirtha Giovannini, Reinaldo Scappini
(pages: 36-41)

SIGMATA: Storage Integrity Guaranteeing Mechanism against Tampering Attempts for Video Event Data Recorders
Hyuckmin Kwon, Seulbae Kim, Heejo Lee
(pages: 42-47)

Hypertextuality in the Alexander von Humboldt Digital Library
Detlev Doherr, Andreas Jankowski
(pages: 48-53)

The Time Diagram Control Approach for the Dynamic Representation of Time-Oriented Data
Rolf Dornberger, Darjan Hil, Johann Wittwer, Pascal Bürgy
(pages: 54-60)

Q-Learning Multi-Objective Sequential Optimal Sensor Parameter Weights
Raquel Cohen, Mark Rahmes, Kevin Fox, George Lemieux
(pages: 61-66)

Multi-User Virtual Reality Therapy for Post-Stroke Hand Rehabilitation at Home
Daria Tsoupikova, Kristen Triandafilou, Greg Rupp, Fabian Preuss, Derek Kamper
(pages: 67-71)

Adding agility to Enterprise Process and Data Engineering
Sergey Zykov, Pavel Shapkin, Nikolay Kazantsev, Vladimir Roslovtsev
(pages: 72-77)

Automatic Parallelization Tool: Classification of Program Code for Parallel Computing
Mustafa Basthikodi, Waseem Ahmed
(pages: 78-82)

Securing Information Systems in an Uncertain World Enterprise Level Security (Invited Article)
William R. Simpson
(pages: 83-90)


 

Abstracts

 


ABSTRACT


A Web Service Monitoring System for the Enterprise

Coimbatore S. Chandersekaran, William R. Simpson


An enterprise that uses web services for the conduct of business can benefit from computer-based monitoring for its normal course of business. Services that are unavailable, delayed, inadequate, and/or provide poor or delayed information flow, all hinder or prevent the normal course of business. In extreme cases they may prevent business from being conducted. The proper performance of the service-oriented approach, the communication flow and the services themselves directly equate to the health and vitality of the enterprise. By health we mean, availability, performance, integrity, and reliability of web services. This paper reviews an agent based approach for web service monitoring in an enterprise environment. The agents create and collect information about the services. The paper also provides a definition of events that need to be monitored and the elements that should be recorded. Some information about critical events is time critical and should be sent as alerts to monitoring personnel for review and possible action. These processes are currently being implemented in a major defense enterprise.

Full Text