排序方式: 共有11条查询结果,搜索用时 15 毫秒
1.
Dickson K. W. Chiu Drake T. T. Lin Eleanna Kafeza Minhong Wang Haiyang Hu Hua Hu Yi Zhuang 《Information Systems Frontiers》2010,12(1):29-47
When a disaster occurs, timely actions in response to urgent requests conveyed by critical messages (known as alerts) constitute
a vital key to effectiveness. These actions include notifying potentially affected parties so that they can take precautionary
measures, gathering additional information, and requesting remedial actions and resource allocation. However, there are different
types of disasters such as epidemic outbreaks, natural disasters, major accidents, and terrorist attacks. At the same time,
there are also many different parties involved such as governments, healthcare institutions, businesses, and individuals.
To address these problems, we introduce a Disaster Notification and Resource Allocation System (DNRAS) based on an Alert Management
System (AMS) implemented through Web services. This unified platform supports timely interactions among various parties, focusing
on notification and monitoring, resource enquiry and allocation, as well as the mobility of information. We detail the mechanisms
of these functions in our system, illustrating the Web services interface parameters for communications and interoperability.
We illustrate the applicability of our approach with an example of an epidemic outbreak and discuss the advantage of our approach
with respect to various stakeholders of our system. 相似文献
2.
Drakopoulos Georgios Kafeza Eleanna Mylonas Phivos Iliadis Lazaros 《Neural computing & applications》2021,33(23):16363-16375
Neural Computing and Applications - Graph signal processing has recently emerged as a field with applications across a broad spectrum of fields including brain connectivity networks, logistics and... 相似文献
3.
Dickson K.W. Chiu S.C. Cheung Sven Till Kamalakar Karlapalem Qing Li Eleanna Kafeza 《Information Technology and Management》2004,5(3-4):221-250
Workflow technology has recently been employed not only within businesses but also as a framework for implementing e-services over the Internet. Such e-services typically require collaborative enactment of workflows across multiple organizations. In this paper, we propose the use of workflow views as a fundamental support mechanism for the interoperability of multiple workflows across business organizations. We present a meta-model of workflow views and their semantics using a cross-organization workflow example based on a supply-chain e-service. We also formulate an interoperation model of workflow views and its consistency criteria. Finally, this paper presents an implementation of the model based on XML and contemporary Web services technologies, with adaptation to our E-ADOME workflow engine. 相似文献
4.
Dickson K.W. Chiu Kamalakar Karlapalem Qing Li Eleanna Kafeza 《Distributed and Parallel Databases》2002,12(2-3):193-216
In an e-service environment, workflow involves not only a single organization but also a number of business partners. Therefore, workflow inter-operability in such an environment is an important issue for enacting workflows. In this article, we introduce our approach of using workflow views as a fundamental support for E-service workflow inter-operability and for controlled visibility of (sub-)workflows by external parties. We discuss various aspects of a workflow view, and their semantics with example usage. Furthermore, we develop a contract model based on workflow views and demonstrate how management of e-contracts can be facilitated, with an Internet start-up E-service inter-organization workflow example. 相似文献
5.
6.
Patrick C. K. Hung Dickson K. W. Chiu W. W. Fung William K. Cheung Raymond Wong Samuel P. M. Choi Eleanna Kafeza James Kwok Joshua C. C. Pun Vivying S. Y. Cheng 《Information Systems Frontiers》2007,9(1):85-101
With the recent adoption of service outsourcing, there have been increasing general demands and concerns for privacy control,
in addition to basic requirement of integration. The traditional practice of a bulk transmission of the customers’ information
to an external service provider is no longer adequate, especially in the finance and healthcare sectors. From our consultancy
experience, application-to-application privacy protection technologies at the middleware layer alone are also inadequate to
solve this problem, particularly when human service providers are heavily involved in the outsourced process. Therefore, we
propose a layered architecture and a development methodology for enforcing end-to-end privacy control policies of enterprises
over the export of personal information. We illustrate how Web services, augmented with updated privacy facilities such as
Service Level Agreement (SLA), Platform for Privacy Preferences Project (P3P), and the P3P Preference Exchange Language (APPEL),
can provide a suitable interoperation platform for service outsourcing. We further develop a conceptual model and an interaction
protocol to send only the required part of a customer’s record at a time. We illustrate our approach for end-to-end privacy
control in service outsourcing with a tele-marketing case study and show how the software of the outsourced call center can
be integrated effectively with the Web services of a bank to protect privacy.
相似文献
Vivying S. Y. ChengEmail: |
7.
Shengguang?Meng Dickson?K.?W.?ChiuEmail author Eleanna?Kafeza Liu?Wenyin Qing?Li 《Information Systems Frontiers》2010,12(5):563-578
Asset management has long been considered as an important issue in enterprises. With the maturing of the Radio Frequency Identification
(RFID) technology, automated management of assets (particularly for mobile ones) in an enterprise using RFID becomes practical.
We have developed a RFID-based Asset Management System (RAMS) for a large telecommunication enterprise and this paper details
how we maintain the whole life-cycle of assets from their acquisition, transfer, maintenance, audit taking, to retirement.
Our system also displays spatial information of assets on an electronic geographical map using Web-based Geographical Information
System (WebGIS) technology. Further asset security is improved by automated notification of asset movement and malfunction
alarm through Short Message System (SMS). To improve the sending time of the alarm SMSs that have high priority, we also develop
a Maximum Position First (MPF) speed-up algorithm for their scheduling. Our initial deployment shows that our system can improve
the availability of assets and reduce the asset management cost dramatically. 相似文献
8.
Kafeza E. Chiu D.K.W. Cheung S.C. Kafeza M. 《IEEE transactions on information technology in biomedicine》2004,8(2):173-181
Recent advances in mobile technologies have greatly extended traditional communication technologies to mobile devices. At the same time, healthcare environments are by nature "mobile" where doctors and nurses do not have fixed workspaces. Irregular and exceptional events are generated in daily hospital routines, such as operations rescheduling, laboratory/examination results, and adverse drug events. These events may create requests that should be delivered to the appropriate person at the appropriate time. Those requests that are classified as urgent are referred to as alerts. Efficient routing and monitoring of alerts are keys to quality and cost-effective healthcare services. Presently, these are generally handled in an ad hoc manner. In this paper, we propose the use of a healthcare alert management system to handle these alert messages systematically. We develop a model for specifying alerts that are associated with medical tasks and a set of parameters for their routing. We design an alert monitor that matches medical staff and their mobile devices to receive alerts, based on the requirements of these alerts. We also propose a mechanism to handle and reroute, if necessary, an alert message when it has not been acknowledged within a specific deadline. 相似文献
9.
Chiu D.K.W. Cheung S.C. Kafeza E. Ho-Fung Leung 《IEEE transactions on systems, man, and cybernetics. Part A, Systems and humans : a publication of the IEEE Systems, Man, and Cybernetics Society》2003,33(6):725-741
With recent advances in mobile technologies and infrastructures, there are increasing demands for ubiquitous access to networked services. These services, generally known as m-services, extend supports from Web browsers on personal computers to handheld devices, such as mobile phones and PDAs. However, in general, the capabilities and bandwidth of these devices are significantly inferior to desktop computers over wired connections, which have been assumed by most Internet services. Instead of redesigning or adapting m-services in an ad-hoc manner for multiple platforms available in handheld devices, we propose a methodology for such adaptation based on three tiers: user interface views, data views, and process views. These views provide customization and help balance security and trust. User interface views provide alternative presentations of inputs and outputs. Data views summarize data over limited bandwidth and map heterogeneous data sources. In addition, we introduce a novel approach of applying process views to m-service adaptation, where mobile users may execute a more concise version or modified procedures of the original process. The process view also serves as the key mechanism for integrating user interface views and data views. In addition, we present a formal model on view consistency and integrity in our methodology. We demonstrate the feasibility of our methodology by extending a service negotiation subsystem into an m-service with multi-platform support. 相似文献