Conceptual Modeling of a Procurement Process
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 1
Abstract
Procurement refers to a process resulting in delivery of goods or services within a set time period. The process includes aspects of purchasing, specifications to be met, and solicitation notifications as in the case of Request For Proposals (RFPs). Typically, such an RFP is described in a verbal ad hoc fashion, in English, with tables and graphs, resulting in imprecise specifications of requirements. It has been proposed that BPMN diagrams be used to specify requirements to be included in RFP. This paper is a merger of three topics: 1) Procurement development with a focus on operational specification of RFP; 2) Public key infrastructure (PKI) as an RFP subject; and 3) Conceptual modeling that produces a diagram as a supplement to an RFP to clarify requirements more precisely than traditional tools, such as natural language, tables, and ad hoc graphs.
Authors and Affiliations
Sabah Al Fedaghi, Mona Al-Otaibi
Video Authentication using PLEXUS Method
Digital Video authentication is very important issue in day to day life. A lot of devices have got the ability of recording or capturing digital videos and all these videos can be passed through the internet as well as m...
LPA Beamformer for Tracking Nonstationary Accelerated Near-Field Sources
In this paper, a computationally very efficient algorithm for direction of arrival (DOA) as well as range parameter estimation is proposed for near-field narrowband nonstationary accelerated moving sources. The proposed...
V-ITS: Video-based Intelligent Transportation System for Monitoring Vehicle Illegal Activities
Vehicle monitoring is a challenging task for video-based intelligent transportation system (V-ITS). Nowadays, the V-ITS system has a significant socioeconomic impact on the development of smart cities and always demand t...
Green ICT Readiness Model for Developing Economies: Case of Kenya
There has been growing concerns about the rising costs of doing business and environmental degradation world over. Green ICT has been proposed to provide solutions to the two issues yet it is not being implemented fully...
An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries
ARP spoofing is the most dangerous attack that threats LANs, this attack comes from the way the ARP protocol works, since it is a stateless protocol. The ARP spoofing attack may be used to launch either denial of service...