Recent studies have confirmed the efficacy of agile methodologies in project success. However, can projects skip several project management tasks and still deliver the expected results? How are traditional project managers engaged in agile projects? The results from this study quantify subjective and theoretical speculation on who performs the project management tasks in agile projects. Project managers are engaged in agile projects and the team, the product owner, and project sponsor are significantly involved in project management tasks. The agile coach is not a substitute for the project manager. The study identifies that agile and traditional methodologies should be updated to clarify team, product owner, and agile coach responsibilities.
{"title":"Project Management Tasks in Agile Projects: A Quantitative Study","authors":"G. Miller","doi":"10.15439/2019F117","DOIUrl":"https://doi.org/10.15439/2019F117","url":null,"abstract":"Recent studies have confirmed the efficacy of agile methodologies in project success. However, can projects skip several project management tasks and still deliver the expected results? How are traditional project managers engaged in agile projects? The results from this study quantify subjective and theoretical speculation on who performs the project management tasks in agile projects. Project managers are engaged in agile projects and the team, the product owner, and project sponsor are significantly involved in project management tasks. The agile coach is not a substitute for the project manager. The study identifies that agile and traditional methodologies should be updated to clarify team, product owner, and agile coach responsibilities.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security of cryptographic keys is one of the most important issues in a key management process. The question arises whether modern technology really allows for a high level of physical protection and security of sensitive data and cryptographic keys. The article considers various contemporary types of threats associated with the storage of secret keys. We present an iimovative way to store sensitive data, using DNA strands as a medium, which significantly reduces hazard connected with electronic devices based data storage and makes the key management process independent of third parties.
{"title":"Cryptographic keys management system based on DNA strands","authors":"Marek Miśkiewicz, Bogdan Ksiezopolski","doi":"10.15439/2019F313","DOIUrl":"https://doi.org/10.15439/2019F313","url":null,"abstract":"Security of cryptographic keys is one of the most important issues in a key management process. The question arises whether modern technology really allows for a high level of physical protection and security of sensitive data and cryptographic keys. The article considers various contemporary types of threats associated with the storage of secret keys. We present an iimovative way to store sensitive data, using DNA strands as a medium, which significantly reduces hazard connected with electronic devices based data storage and makes the key management process independent of third parties.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130587958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Morales-Luna, V. Korzhik, V. Starostin, M. Kabardov, A. Gerasimovich, V. Yakovlev, A. Zhuvikin
We propose a new key sharing protocol executed through any constant parameter noiseless public channel (as Internet itself) without any cryptographic assumptions and protocol restrictions on SNR in the eavesdropper channels. This protocol is based on extraction by legitimate users of eigenvalues from randomly generated matrices. A similar protocol was proposed recently by G. Qin and Z. Ding. But we prove that, in fact, this protocol is insecure and we modify it to be both reliable and secure using artificial noise and privacy amplification procedure. Results of simulation prove these statements.
{"title":"Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions","authors":"G. Morales-Luna, V. Korzhik, V. Starostin, M. Kabardov, A. Gerasimovich, V. Yakovlev, A. Zhuvikin","doi":"10.15439/2019F70","DOIUrl":"https://doi.org/10.15439/2019F70","url":null,"abstract":"We propose a new key sharing protocol executed through any constant parameter noiseless public channel (as Internet itself) without any cryptographic assumptions and protocol restrictions on SNR in the eavesdropper channels. This protocol is based on extraction by legitimate users of eigenvalues from randomly generated matrices. A similar protocol was proposed recently by G. Qin and Z. Ding. But we prove that, in fact, this protocol is insecure and we modify it to be both reliable and secure using artificial noise and privacy amplification procedure. Results of simulation prove these statements.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130652001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a teaching case of a Blended Learning (BL) approach that was applied to a course on Method Engineering (ME) intended for graduate Business Informatics (BIS) students. The main reason for transforming a Master course on ME from traditional to blended is to take advantage of combining frontal instruction with e-learning based instruction and at the same time reducing lecturers’ workload in times of increasing student numbers in BIS and Computer Science (CS) areas. The BL approach consists of three parts, as it consists of the introduction of computer-supported peer assessment, interactive e-lectures, and digital examination. The approach has been reflected upon by course lecturers themselves and it was evaluated through two separate student surveys, from which a variety of positive outcomes can be deduced. Increased generation of feedback, an increase in student motivation, and improved understanding of the course content are three of these outcomes that stand out. On top of student related advantages, especially the BL parts concerning peer assessment and digital examination reduce teaching load. These findings are informative for both education researchers and instructors who are interested in embedding BL in BIS or CS education.
{"title":"Redesigning Method Engineering Education Through a Trinity of Blended Learning Measures","authors":"Sietse Overbeek, S. Brinkkemper","doi":"10.15439/2019F79","DOIUrl":"https://doi.org/10.15439/2019F79","url":null,"abstract":"This paper presents a teaching case of a Blended Learning (BL) approach that was applied to a course on Method Engineering (ME) intended for graduate Business Informatics (BIS) students. The main reason for transforming a Master course on ME from traditional to blended is to take advantage of combining frontal instruction with e-learning based instruction and at the same time reducing lecturers’ workload in times of increasing student numbers in BIS and Computer Science (CS) areas. The BL approach consists of three parts, as it consists of the introduction of computer-supported peer assessment, interactive e-lectures, and digital examination. The approach has been reflected upon by course lecturers themselves and it was evaluated through two separate student surveys, from which a variety of positive outcomes can be deduced. Increased generation of feedback, an increase in student motivation, and improved understanding of the course content are three of these outcomes that stand out. On top of student related advantages, especially the BL parts concerning peer assessment and digital examination reduce teaching load. These findings are informative for both education researchers and instructors who are interested in embedding BL in BIS or CS education.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130695824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The General Data Protection Regulation (GDPR) has strengthened the importance of data privacy and protection for enterprises offering their services in the EU. An important part of intensified efforts towards better privacy protection is enterprise workflow (re)design. In particular, the GDPR as strengthen the imperative to apply the privacy by design principle when (re)designing workflows. A conforming and promising approach is to model privacy relevant workflow fragments as Workflow Privacy Patterns (WPPs). Such WPPs allow to specify abstract templates for recurring data-privacy problems in workflows. Thus, WPPs are intended to support workflow engineers, auditors and privacy officers by providing pre-validated patterns that comply with existing data privacy regulations. However, it is unclear yet how to obtain WPPs systematically with an appropriate level of detail. In this paper, we introduce our approach to derive WPPs from legal texts and similar normative regulations. We propose a structure of a WPP, which we derive from pattern approaches from other research areas. We also introduce a framework that allows to design WPPs which make legal regulations accessible for persons who do not possess in-depth legal expertise. We have applied our approach to different articles of the GDPR, and we have obtained evidence that we can transfer legal text into a structured WPP representation. If a workflow correctly implements a WPP that has been designed that way, the workflow automatically complies to the respective fragment of the underlying legal text.
{"title":"Deriving Workflow Privacy Patterns from Legal Documents","authors":"Marcin Robak, Erik Buchmann","doi":"10.15439/2019F275","DOIUrl":"https://doi.org/10.15439/2019F275","url":null,"abstract":"The General Data Protection Regulation (GDPR) has strengthened the importance of data privacy and protection for enterprises offering their services in the EU. An important part of intensified efforts towards better privacy protection is enterprise workflow (re)design. In particular, the GDPR as strengthen the imperative to apply the privacy by design principle when (re)designing workflows. A conforming and promising approach is to model privacy relevant workflow fragments as Workflow Privacy Patterns (WPPs). Such WPPs allow to specify abstract templates for recurring data-privacy problems in workflows. Thus, WPPs are intended to support workflow engineers, auditors and privacy officers by providing pre-validated patterns that comply with existing data privacy regulations. However, it is unclear yet how to obtain WPPs systematically with an appropriate level of detail. In this paper, we introduce our approach to derive WPPs from legal texts and similar normative regulations. We propose a structure of a WPP, which we derive from pattern approaches from other research areas. We also introduce a framework that allows to design WPPs which make legal regulations accessible for persons who do not possess in-depth legal expertise. We have applied our approach to different articles of the GDPR, and we have obtained evidence that we can transfer legal text into a structured WPP representation. If a workflow correctly implements a WPP that has been designed that way, the workflow automatically complies to the respective fragment of the underlying legal text.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these practices were used as an input to AgileSafe method as well as to demonstrate their potential to comply with OWASP ASVS requirements.
{"title":"Security-oriented agile approach with AgileSafe and OWASP ASVS","authors":"Katarzyna Lukasiewicz, Sara Cyganska","doi":"10.15439/2019F213","DOIUrl":"https://doi.org/10.15439/2019F213","url":null,"abstract":"In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these practices were used as an input to AgileSafe method as well as to demonstrate their potential to comply with OWASP ASVS requirements.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126393741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mehmet Ali Kutlugun, Yahya Sirin, Mehmet Ali Karakaya
Nowadays, deep learning methods have been used in many areas such as big data analysis, speech and image processing with the increasing processing power and the development of graphics processors. In particular, face recognition systems have become one of the most important research topics in biometry. Light direction, reflection, emotional and physical changes in facial expression are the main factors in face recognition systems that make recognition difficult. Training of the system with the available data in small data sets is an important factor that negatively affects the performance. The Convolutional Neural Network (CNN) model is a deep learning architecture used for large amounts of training data. In this study, a small number of employee images set of a small-scale company has been increased by applying different filters. In addition, it has been tried to determine which data augmentation options have more effect on face recognition. Thus, non-real-time face recognition has been performed by training with new augmented dataset of each picture with many features.
{"title":"The Effects of Augmented Training Dataset on Performance of Convolutional Neural Networks in Face Recognition System","authors":"Mehmet Ali Kutlugun, Yahya Sirin, Mehmet Ali Karakaya","doi":"10.15439/2019F181","DOIUrl":"https://doi.org/10.15439/2019F181","url":null,"abstract":"Nowadays, deep learning methods have been used in many areas such as big data analysis, speech and image processing with the increasing processing power and the development of graphics processors. In particular, face recognition systems have become one of the most important research topics in biometry. Light direction, reflection, emotional and physical changes in facial expression are the main factors in face recognition systems that make recognition difficult. Training of the system with the available data in small data sets is an important factor that negatively affects the performance. The Convolutional Neural Network (CNN) model is a deep learning architecture used for large amounts of training data. In this study, a small number of employee images set of a small-scale company has been increased by applying different filters. In addition, it has been tried to determine which data augmentation options have more effect on face recognition. Thus, non-real-time face recognition has been performed by training with new augmented dataset of each picture with many features.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126324232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, IoT technology has been applied in various field. One of the possible fields of an application is logistics system. In current system, a delivery must go through the designated logistics hub, which doesn’t provide shortest distance. Such system costs time and inefficient expenses. In this paper, we propose an enhanced parcel delivery system based on IoT technology for reducing total delivery distance and seeking for much economy. First, we designed a sort of IoT devices which can be attached to parcels. This device has various functionalities including the ability to figure out current delivery route. Second, we addressed some difficulties such as: (i) issues linking IoT device into its platform; (ii) issues for designing IoT devices functionalities. Third, we propose ways to improve the efficiency of IoT based parcel delivery system. From these considerations, our system may improve total economics of parcel delivery system.
{"title":"An Adaptation of IoT to Improve Parcel Delivery System","authors":"H. Song, Hyo Chang Han","doi":"10.15439/2019F321","DOIUrl":"https://doi.org/10.15439/2019F321","url":null,"abstract":"Recently, IoT technology has been applied in various field. One of the possible fields of an application is logistics system. In current system, a delivery must go through the designated logistics hub, which doesn’t provide shortest distance. Such system costs time and inefficient expenses. In this paper, we propose an enhanced parcel delivery system based on IoT technology for reducing total delivery distance and seeking for much economy. First, we designed a sort of IoT devices which can be attached to parcels. This device has various functionalities including the ability to figure out current delivery route. Second, we addressed some difficulties such as: (i) issues linking IoT device into its platform; (ii) issues for designing IoT devices functionalities. Third, we propose ways to improve the efficiency of IoT based parcel delivery system. From these considerations, our system may improve total economics of parcel delivery system.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116600960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Grzegorz Nowakowski, S. Telenyk, K. Yefremov, V. Khmeliuk
The approach to applications integration for World Data Center (WDC) interdisciplinary scientific investigations is developed in the article. The integration is based on mathematical logic and artificial intelligence. Key elements of the approach-a multilevel system architecture, formal logical system, implementation– are based on intelligent agents interaction. The formal logical system is proposed. The inference method and mechanism of solution tree recovery are elaborated. The implementation of application integration for interdisciplinary scientific research is based on a stack of modern protocols, enabling communication of business processes over the transport layer of the OSI model. Application integration is also based on coordinated models of business processes, for which an integrated set of business applications are designed and realized.
{"title":"The Approach to Applications Integration for World Data Center Interdisciplinary Scientific Investigations","authors":"Grzegorz Nowakowski, S. Telenyk, K. Yefremov, V. Khmeliuk","doi":"10.15439/2019F71","DOIUrl":"https://doi.org/10.15439/2019F71","url":null,"abstract":"The approach to applications integration for World Data Center (WDC) interdisciplinary scientific investigations is developed in the article. The integration is based on mathematical logic and artificial intelligence. Key elements of the approach-a multilevel system architecture, formal logical system, implementation– are based on intelligent agents interaction. The formal logical system is proposed. The inference method and mechanism of solution tree recovery are elaborated. The implementation of application integration for interdisciplinary scientific research is based on a stack of modern protocols, enabling communication of business processes over the transport layer of the OSI model. Application integration is also based on coordinated models of business processes, for which an integrated set of business applications are designed and realized.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121673405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The physical design placement problem is one of the hardest and most important problems in micro chips production. The placement defines how to place the electrical components on the chip. We consider the problem as a combinatorial optimization problem, whose instance is defined by a set of 2-dimensional rectangles, with various sizes and wire connectivity requirements. We focus on minimizing the placement area and the total wire-length.We propose a local-search method for coping with the problem, based on natural dynamics common in game theory. Specifically, we suggest to perform variants of Best-Response Dynamics (BRD). In our method, we assume that every component is controlled by a selfish agent, who aim at minimizing his individual cost, which depends on his own location and the wire-length of his connections.We suggest several BRD methods, based on selfish migrations of a single or a cooperative of components. We performed a comprehensive experimental study on various test-benches, and compared our results with commonly known algorithms, in particular, with simulated annealing. The results show that selfish local-search, especially when applied with cooperatives of components, may be beneficial for the placement problem.
{"title":"Best Response Dynamics for VLSI Physical Design Placement","authors":"M. Rapoport, Tami Tamir","doi":"10.15439/2019F91","DOIUrl":"https://doi.org/10.15439/2019F91","url":null,"abstract":"The physical design placement problem is one of the hardest and most important problems in micro chips production. The placement defines how to place the electrical components on the chip. We consider the problem as a combinatorial optimization problem, whose instance is defined by a set of 2-dimensional rectangles, with various sizes and wire connectivity requirements. We focus on minimizing the placement area and the total wire-length.We propose a local-search method for coping with the problem, based on natural dynamics common in game theory. Specifically, we suggest to perform variants of Best-Response Dynamics (BRD). In our method, we assume that every component is controlled by a selfish agent, who aim at minimizing his individual cost, which depends on his own location and the wire-length of his connections.We suggest several BRD methods, based on selfish migrations of a single or a cooperative of components. We performed a comprehensive experimental study on various test-benches, and compared our results with commonly known algorithms, in particular, with simulated annealing. The results show that selfish local-search, especially when applied with cooperatives of components, may be beneficial for the placement problem.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}