3,057 research outputs found
Business Process Management Integration Solution in Financial Sector
It is vital for financial services companies to ensure the rapid implementation of new processes to meet speed-to-market, service quality and compliance requirements. This has to be done against a background of increased complexity. An integrated approach to business processes allows products, processes, systems, data and the applications that underpin them to evolve quickly. Whether it’s providing a loan, setting up an insurance policy, or executing an investment instruction, optimizing the sale-to-fulfillment process will always win new business, cement customer loyalty, and reduce costs. Lack of integration across lending, payments and trading, on the other hand, simply presents competitors who are more efficient with a huge profit opportunity.Web Service, business process, integration, financial services, integration, modeling
A Service-Oriented Approach for Network-Centric Data Integration and Its Application to Maritime Surveillance
Maritime-surveillance operators still demand for an integrated maritime picture better supporting international coordination for their operations, as looked for in the European area. In this area, many data-integration efforts have been interpreted in the past as the problem of designing, building and maintaining huge centralized repositories. Current research activities are instead leveraging service-oriented principles to achieve more flexible and network-centric solutions to systems and data integration. In this direction, this article reports on the design of a SOA platform, the Service and Application Integration (SAI) system, targeting novel approaches for legacy data and systems integration in the maritime surveillance domain. We have developed a proof-of-concept of the main system capabilities to assess feasibility of our approach and to evaluate how the SAI middleware architecture can fit application requirements for dynamic data search, aggregation and delivery in the distributed maritime domain
Responding to Cross Border Child Trafficking in South Asia: An Analysis of the Feasibility of a Technologically Enabled Missing Child Alert System
This report examines the feasibility of a technologically enabled system to help respond to the phenomenon of cross-border child trafficking in South Asia, and makes recommendations on how to proceed with a pilot project in the selected areas of Bangladesh, Nepal and India. The study was commissioned by the Missing Child Alert (MCA) programme which is an initiative led by Plan. MCA is an initiative to address cross-border child trafficking in South Asia, led by Plan. The aim of the programme is to link existing institutions, mechanisms and resources in order to tackle the phenomenon from a regional perspective. To achieve this, Plan propose to implement a technologically equipped, institutionalised system of alert that can assist in the rescue, rehabilitation, repatriation and reintegration of children who are at risk of, or are victims of, cross-border trafficking
Threats Management Throughout the Software Service Life-Cycle
Software services are inevitably exposed to a fluctuating threat picture.
Unfortunately, not all threats can be handled only with preventive measures
during design and development, but also require adaptive mitigations at
runtime. In this paper we describe an approach where we model composite
services and threats together, which allows us to create preventive measures at
design-time. At runtime, our specification also allows the service runtime
environment (SRE) to receive alerts about active threats that we have not
handled, and react to these automatically through adaptation of the composite
service. A goal-oriented security requirements modelling tool is used to model
business-level threats and analyse how they may impact goals. A process flow
modelling tool, utilising Business Process Model and Notation (BPMN) and
standard error boundary events, allows us to define how threats should be
responded to during service execution on a technical level. Throughout the
software life-cycle, we maintain threats in a centralised threat repository.
Re-use of these threats extends further into monitoring alerts being
distributed through a cloud-based messaging service. To demonstrate our
approach in practice, we have developed a proof-of-concept service for the Air
Traffic Management (ATM) domain. In addition to the design-time activities, we
show how this composite service duly adapts itself when a service component is
exposed to a threat at runtime.Comment: In Proceedings GraMSec 2014, arXiv:1404.163
Providing Customized Real Time Traffic Information Through the Internet: Implementation Using GIS
For my Masters thesis I implement a web enabled GIS application for presenting personalized real-time traffic condition information. Due to the dynamic nature of traffic condition reporting, often large amounts of data have to be reported. The process of introducing personalization to traffic condition reporting hopes to reduce the amount of such data transmitted to users. The personalization of the presented traffic condition information is achieved by storing geographic definitions of routes and travel zones frequently traveled by the client. Since traffic update areas frequently requested for daily travel routes are often geographically identical, stored routes or zones can be used within a Geographic Information System (GIS) environment to retrieve traffic volume information and visualize the intended route before the start of the client\u27s routine daily trip. This saves both browsing time and data uploading for the client. The research implements such tools in a server-side (most of the processing done on the server) environment. The research concludes that existing GIS tools can be enhanced to implement the concept of using customized traffic profiles to transmit user specific traffic data
- …