Journal of
Systemics, Cybernetics and Informatics

 ISSN: 1690-4524 (Online)    DOI: 10.54808/JSCI


Supporting a Knowledge Base With Evidence Retrieved From Randomized Controlled Clinical Trials: A Case Study
Marly G. F. Costa, Gisele R. Vieira, Cicero F. F. Costa Filho
Pages: 1-4
This work describes a methodology based on Evidence-Based Medicine for finding literature–based evidence for a clinical decision support system. As an illustration, we applied this method to parenteral nutrition therapy (PNT). PNT requires expertise and experience and is prone to errors. The Pico’s strategy was used to built structured clinical questions, which considered 11 PN clinical indications plus a PN nutrient (amino acid, glucose, lipid, electrolyte, trace elements and vitamins), and an outcome. 211 PICO strategies were structured, and 447 searches at PubMed were performed. The results were classified in levels of evidence and recommendation grades according to criteria of the Oxford Centre for Evidence Based Medicine.

Evaluating Educational Software
Paula Escudeiro, José Bidarra, Nuno Escudeiro
Pages: 5-10
This paper presents the overall evaluation of the Quantitative Evaluation Framework (QEF) approach which has been applied in an operational teaching environment for the last six years. During this period we have evaluated the difference between educational software systems that were developed using the Techno-Didactical Extension for Instruction/Learning Based on Computer (X-TEC) model and educational software systems using other models. The X-TEC model is used in the development of educational software in order to strengthen the potential quality of e-Learning systems. We selected the QEF approach for this evaluation to highlight the strengths and limitations of the X-TEC model. We adapted the approach in a way where the essential criteria are assessed in a pre-evaluation phase which will cover the general usage requirements. In this research project we conduct experiments with groups of students and teachers in Multimedia Information Systems classes of Oporto Polytechnic, to examine the influence of training in an instructional system design approach on their attitude to re-use this approach and on their performances in design, using this approach.

Computer Programming: An Activity as Compelling as Game Play
Tom Goulding
Pages: 11-14
Game motif programming exercises (GM-Games) were developed to help novices develop complex client server game systems within their freshman year. GM-Games foster a strong work ethic in as much as they reproduce the challenges and excitement associated with game play; yet their purpose is the development of advanced programming skills. We have found that young people are just as interested in mastering programming skills as they are in mastering the shooting, racing or strategy skills required in many entertainment games. We describe in this paper how GM-Games imitate many of the aspects of game play.

Identifying Reflectors in Seismic Images via Statistic and Syntactic Methods
Carlos A. Perez, German Y. Ojeda
Pages: 15-17
In geologic interpretation of seismic reflection data, accurate identification of reflectors is the foremost step to ensure proper subsurface structural definition. Reflector information, along with other data sets, is a key factor to predict the presence of hydrocarbons. In this work, mathematic and pattern recognition theory was adapted to design two statistical and two syntactic algorithms which constitute a tool in semiautomatic reflector identification. The interpretive power of these four schemes was evaluated in terms of prediction accuracy and computational speed. Among these, the semblance method was confirmed to render the greatest accuracy and speed. Syntactic methods offer an interesting alternative due to their inherently structural search method.

EURIDICE – An enabler for intelligent cargo for the logistics sector
Jens Schumacher, Manfred Gschweidl, Mathias Rieder
Pages: 18-28
EURIDICE is an EU funded project which deals with the development and implementation of new concepts in the area of intelligent Cargo. The goal of EURIDICE is to develop a free and open standards based platform for intelligent goods, by using distributed mobile systems. This paper will provide an overview about the architecture and key technologies.

Achieving Knowledge-Creating Companies in Mexico: the Advantage of University-Industry Alliances
Karla Cedano, Manuel Martinez, Antonio Del Rio, Lorenzo Martinez
Pages: 29-35
In this paper we focused on developing a methodology to promote innovation through industry-university collaboration. So we analyzed two different scenarios. On one hand we have the traditional firm, that is striving to survive in the global knowledge-driven economic framework and on the other we have world class research universities that are trying to find the best way to put their knowledge in the market place, fostering spin-offs as well as promoting knowledge transfer to the traditional industry. We have analyzed the behavior of successful high-technology spin-offs, and knowledge transfer experiences worldwide. In particular, we have focused on the management paradigm of the “knowledge creating company”, proposed by Nonaka [11], since it is one of the models that best describes the organizational environment in such successful experiences. Finally, we present the methodology developed as a result of this study that is currently being applied in our State University

Effective Bandwidth Allocation for WiMAX Mesh Network
Hung-Chin Jang, Wei-Ching Lin
Pages: 36-40
The aim of this paper is to reduce the media access delay in a WiMAX mesh network. We observe that as the number of subscriber stations (SS) in a neighborhood increases, the processes of transmission opportunity (TO) competition and 3- way handshake are easy to fail. This may degrade transmission efficiency and increase packet transmission delay. Besides, the minislot allocation defined in the WiMAX mesh mode may cause many lower priority services reserve earlier minislots than that of higher priority services like rtPS. This may cause great negative impact on delay-sensitive traffic. In this paper, we design a QoS classifier to enqueue packets according to different QoS service classes, present a dynamic holdoff exponent mechanism to reduce control subframe delay, and propose a Neighborhood-Based Minislot Allocation (NBMA) mechanism to reduce data subframe delay. Simulations show that the proposed methodology outperforms that of IEEE 802.16 and Baye’s DynExp in delay, jitter and throughput.

A DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach
Fang-Yie Leu, I-Long Lin
Pages: 41-51
Nowadays, users can easily access and download network attack tools, which often provide friendly interfaces and easily operated features, from the Internet. Therefore, even a naive hacker can also launch a large scale DoS or DDoS attack to prevent a system, i.e., the victim, from providing Internet services. In this paper, we propose an agent based intrusion detection architecture, which is a distributed detection system, to detect DoS/DDoS attacks by invoking a statistic approach that compares source IP addresses’ normal and current packet statistics to discriminate whether there is a DoS/DDoS attack. It first collects all resource IPs’ packet statistics so as to create their normal packet distribution. Once some IPs’ current packet distribution suddenly changes, very often it is an attack. Experimental results show that this approach can effectively detect DoS/DDoS attacks.

A Dynamic Approach of Information in a Learning Task
Sandra Begoin-Augereau, Josiane Caron-Pargue
Pages: 52-57
A new theoretical and methodological approach of the processing of information is presented. On line modifications in the structure of information, such as stretched, broken, re- unified, or stuck pieces of information can be characterized from linguistic markers. For that two kinds of detachability from the situation are analyzed in a cognitive interpretation of Culioli’s enunciative model. On one hand, the detachability linked to starting terms has for criterion the anaphora. It marks the categorization of external aggregates of information, their internalization, re-inscribing them at a subjective level, and their externalization, re-inscribing them in the spatio temporal environment. On the other hand, the detachability linked to modal terms marks a strategic reorganization of information. Both kinds of detachability are modelled by Culioli’s diagram involving different levels between parameters S (subjective space) and T (temporal space). The passages from one of these levels to another follow specific routes with loops and strange loops. This paper analyzes the modification of information at the highest subjective level in the verbal protocol of a 10-year- old solving the Tower of Hanoi puzzle for the first time. The generalization to other tasks and to interaction between intelligent agents results from the interactive characteristics of linguistic markers.

Prototype of Environment as Agent for Building the Learning Communities
Vilma Butkute, Vilija Targamadze
Pages: 58-61
The Information Society and Education need to be combined in order to achieve successful active citizenship and economical development with a natural and mutual interdependency. Project game platform can be an example of cross- connected eLearning, mobile and life environment contribution to education. It can increase effectiveness of education both for educational needs in XXI Century and to create a basis for further research on ICT mediation in Information Society. The positive outcomes on learners motivation are explored by the scientific modelling of the future educational environment prototype as agent for building up the learning communities of common intelligence at internal, local and international level. The key finding of this paper is that an game platform prototype can be used to ensure that technology, pedagogy and social networking context are closely aligned in order to realise the educational stimulation in secondary education.

Software Architecture of Manufacturing Execution Systems
Heiko Meyer
Pages: 62-66
The globalization of the economy and the associated factors of increasing effectiveness in production, shortening innovation cycles, safeguarding high quality, etc. are continually augmenting the pressure on the production business. It has been possible to compensate somewhat for this pressure in recent years by relocating production to low-cost countries. However, in the medium term, the demands of workers in countries that are now still low cost will increase, and production costs will rise as a result, so the need for action will arise. Tools will be needed to increase efficiency in existing production processes. It also must be considered that production in high-cost countries definitely has its advantages, so these countries are becoming more and more feasible as production locations and will remain so in the long term. The degree of automation is already extremely high in these countries, so modifying production processes will not increase efficiency significantly.

A Dynamic Defense Modeling and Simulation Methodology using Semantic Web Services
Kangsun Lee, Byungchul Kim
Pages: 67-71
Defense Modeling and Simulations require interoperable and autonomous federates in order to fully simulate complex behavior of war-fighters and to dynamically adapt themselves to various war-game events, commands and controls. In this paper, we propose a semantic web service based methodology to develop war-game simulations. Our methodology encapsulates war-game logic into a set of web services with additional semantic information in WSDL (Web Service Description Language) and OWL (Web Ontology Language). By utilizing dynamic discovery and binding power of semantic web services, we are able to dynamically reconfigure federates according to various simulation events. An ASuW (Anti-Surface Warfare) simulator is constructed to demonstrate the methodology and successfully shows that the level of interoperability and autonomy can be greatly improved.

Trust Establishment in Ad Hoc Networks by Certificate Distribution and Postponed Verification
Richard Gordon, Dawoud Dawoud
Pages: 72-78
Trust establishment in wireless ad hoc networks is a challenge because of its unique characteristics. These include the lack of a central authority and the autonomous, dynamic nature of these networks which result in poor connectivity and routing failure. Security can be provided by a certificate based model but key management is a difficulty in wireless ad hoc networks. A key management scheme is proposed which realizes certificate distribution and verification. The key management scheme occurs in an on-demand, fully distributive, wireless ad hoc network environment, establishing trust on the routing layer exclusively. Trust and route establishment are achieved simultaneously with reduced dependency between the security and routing mechanisms. Distribution and verification of keying material places delays upon the delivery of secure communication routes. Simulations show the overhead of the proposed scheme and that it has negligible impact on network performance while providing trust establishment for the network.

Improving Agent Based Modeling of Critical Incidents
Robert Till
Pages: 79-84
Agent Based Modeling (ABM) is a powerful method that has been used to simulate potential critical incidents in the infrastructure and built environments. This paper will discuss the modeling of some critical incidents currently simulated using ABM and how they may be expanded and improved by using better physiological modeling, psychological modeling, modeling the actions of interveners, introducing Geographic Information Systems (GIS) and open source models.