首页 > 最新文献

2019 Federated Conference on Computer Science and Information Systems (FedCSIS)最新文献

英文 中文
Project Management Tasks in Agile Projects: A Quantitative Study 敏捷项目中的项目管理任务:定量研究
G. Miller
Recent studies have confirmed the efficacy of agile methodologies in project success. However, can projects skip several project management tasks and still deliver the expected results? How are traditional project managers engaged in agile projects? The results from this study quantify subjective and theoretical speculation on who performs the project management tasks in agile projects. Project managers are engaged in agile projects and the team, the product owner, and project sponsor are significantly involved in project management tasks. The agile coach is not a substitute for the project manager. The study identifies that agile and traditional methodologies should be updated to clarify team, product owner, and agile coach responsibilities.
最近的研究已经证实了敏捷方法在项目成功中的功效。然而,项目是否可以跳过几个项目管理任务而仍然交付预期的结果?传统的项目经理是如何参与敏捷项目的?这项研究的结果量化了关于谁在敏捷项目中执行项目管理任务的主观和理论上的推测。项目经理参与到敏捷项目中,团队、产品所有者和项目发起人都参与到项目管理任务中。敏捷教练不是项目经理的替代品。研究表明,敏捷方法和传统方法应该更新,以明确团队、产品所有者和敏捷教练的职责。
{"title":"Project Management Tasks in Agile Projects: A Quantitative Study","authors":"G. Miller","doi":"10.15439/2019F117","DOIUrl":"https://doi.org/10.15439/2019F117","url":null,"abstract":"Recent studies have confirmed the efficacy of agile methodologies in project success. However, can projects skip several project management tasks and still deliver the expected results? How are traditional project managers engaged in agile projects? The results from this study quantify subjective and theoretical speculation on who performs the project management tasks in agile projects. Project managers are engaged in agile projects and the team, the product owner, and project sponsor are significantly involved in project management tasks. The agile coach is not a substitute for the project manager. The study identifies that agile and traditional methodologies should be updated to clarify team, product owner, and agile coach responsibilities.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cryptographic keys management system based on DNA strands 基于DNA链的密码密钥管理系统
Marek Miśkiewicz, Bogdan Ksiezopolski
Security of cryptographic keys is one of the most important issues in a key management process. The question arises whether modern technology really allows for a high level of physical protection and security of sensitive data and cryptographic keys. The article considers various contemporary types of threats associated with the storage of secret keys. We present an iimovative way to store sensitive data, using DNA strands as a medium, which significantly reduces hazard connected with electronic devices based data storage and makes the key management process independent of third parties.
密钥的安全性是密钥管理过程中最重要的问题之一。问题出现了,现代技术是否真的允许高水平的物理保护和敏感数据和加密密钥的安全性。本文考虑了与密钥存储相关的各种当代威胁类型。我们提出了一种创新的方法来存储敏感数据,使用DNA链作为介质,这大大减少了与基于电子设备的数据存储相关的危险,并使密钥管理过程独立于第三方。
{"title":"Cryptographic keys management system based on DNA strands","authors":"Marek Miśkiewicz, Bogdan Ksiezopolski","doi":"10.15439/2019F313","DOIUrl":"https://doi.org/10.15439/2019F313","url":null,"abstract":"Security of cryptographic keys is one of the most important issues in a key management process. The question arises whether modern technology really allows for a high level of physical protection and security of sensitive data and cryptographic keys. The article considers various contemporary types of threats associated with the storage of secret keys. We present an iimovative way to store sensitive data, using DNA strands as a medium, which significantly reduces hazard connected with electronic devices based data storage and makes the key management process independent of third parties.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130587958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions 无密码假设的无噪声公共常参数信道信息理论安全密钥共享协议
G. Morales-Luna, V. Korzhik, V. Starostin, M. Kabardov, A. Gerasimovich, V. Yakovlev, A. Zhuvikin
We propose a new key sharing protocol executed through any constant parameter noiseless public channel (as Internet itself) without any cryptographic assumptions and protocol restrictions on SNR in the eavesdropper channels. This protocol is based on extraction by legitimate users of eigenvalues from randomly generated matrices. A similar protocol was proposed recently by G. Qin and Z. Ding. But we prove that, in fact, this protocol is insecure and we modify it to be both reliable and secure using artificial noise and privacy amplification procedure. Results of simulation prove these statements.
我们提出了一种新的密钥共享协议,该协议可以通过任何恒定参数的无噪声公共信道(如互联网本身)执行,而不需要对窃听信道中的信噪比进行任何加密假设和协议限制。该协议基于合法用户从随机生成的矩阵中提取特征值。最近,秦刚(G. Qin)和丁喆(Z. Ding)提出了一个类似的协议。但我们证明了该协议实际上是不安全的,并使用人工噪声和隐私放大程序对其进行了修改,使其既可靠又安全。仿真结果证明了这些说法。
{"title":"Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions","authors":"G. Morales-Luna, V. Korzhik, V. Starostin, M. Kabardov, A. Gerasimovich, V. Yakovlev, A. Zhuvikin","doi":"10.15439/2019F70","DOIUrl":"https://doi.org/10.15439/2019F70","url":null,"abstract":"We propose a new key sharing protocol executed through any constant parameter noiseless public channel (as Internet itself) without any cryptographic assumptions and protocol restrictions on SNR in the eavesdropper channels. This protocol is based on extraction by legitimate users of eigenvalues from randomly generated matrices. A similar protocol was proposed recently by G. Qin and Z. Ding. But we prove that, in fact, this protocol is insecure and we modify it to be both reliable and secure using artificial noise and privacy amplification procedure. Results of simulation prove these statements.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130652001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Redesigning Method Engineering Education Through a Trinity of Blended Learning Measures 通过三位一体的混合学习措施重新设计方法工程教育
Sietse Overbeek, S. Brinkkemper
This paper presents a teaching case of a Blended Learning (BL) approach that was applied to a course on Method Engineering (ME) intended for graduate Business Informatics (BIS) students. The main reason for transforming a Master course on ME from traditional to blended is to take advantage of combining frontal instruction with e-learning based instruction and at the same time reducing lecturers’ workload in times of increasing student numbers in BIS and Computer Science (CS) areas. The BL approach consists of three parts, as it consists of the introduction of computer-supported peer assessment, interactive e-lectures, and digital examination. The approach has been reflected upon by course lecturers themselves and it was evaluated through two separate student surveys, from which a variety of positive outcomes can be deduced. Increased generation of feedback, an increase in student motivation, and improved understanding of the course content are three of these outcomes that stand out. On top of student related advantages, especially the BL parts concerning peer assessment and digital examination reduce teaching load. These findings are informative for both education researchers and instructors who are interested in embedding BL in BIS or CS education.
本文介绍了一个混合学习(BL)方法的教学案例,该方法应用于一门面向商业信息学研究生的方法工程(ME)课程。将ME硕士课程从传统转变为混合的主要原因是利用将正面教学与基于电子学习的教学相结合的优势,同时在BIS和计算机科学(CS)领域学生人数不断增加的情况下减少讲师的工作量。BL方法由三部分组成,包括引入计算机支持的同行评估、互动电子讲座和数字考试。这种方法已经被课程讲师自己反思,并通过两次单独的学生调查进行评估,从中可以推断出各种积极的结果。反馈的增加,学生积极性的提高,以及对课程内容的理解的提高是其中三个突出的结果。在与学生相关的优势之上,尤其是BL中关于同行评议和数字化考试的部分,减轻了教学负担。这些发现对于那些对将BL嵌入BIS或CS教育感兴趣的教育研究者和教师来说都是有益的。
{"title":"Redesigning Method Engineering Education Through a Trinity of Blended Learning Measures","authors":"Sietse Overbeek, S. Brinkkemper","doi":"10.15439/2019F79","DOIUrl":"https://doi.org/10.15439/2019F79","url":null,"abstract":"This paper presents a teaching case of a Blended Learning (BL) approach that was applied to a course on Method Engineering (ME) intended for graduate Business Informatics (BIS) students. The main reason for transforming a Master course on ME from traditional to blended is to take advantage of combining frontal instruction with e-learning based instruction and at the same time reducing lecturers’ workload in times of increasing student numbers in BIS and Computer Science (CS) areas. The BL approach consists of three parts, as it consists of the introduction of computer-supported peer assessment, interactive e-lectures, and digital examination. The approach has been reflected upon by course lecturers themselves and it was evaluated through two separate student surveys, from which a variety of positive outcomes can be deduced. Increased generation of feedback, an increase in student motivation, and improved understanding of the course content are three of these outcomes that stand out. On top of student related advantages, especially the BL parts concerning peer assessment and digital examination reduce teaching load. These findings are informative for both education researchers and instructors who are interested in embedding BL in BIS or CS education.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130695824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deriving Workflow Privacy Patterns from Legal Documents 从法律文件中导出工作流隐私模式
Marcin Robak, Erik Buchmann
The General Data Protection Regulation (GDPR) has strengthened the importance of data privacy and protection for enterprises offering their services in the EU. An important part of intensified efforts towards better privacy protection is enterprise workflow (re)design. In particular, the GDPR as strengthen the imperative to apply the privacy by design principle when (re)designing workflows. A conforming and promising approach is to model privacy relevant workflow fragments as Workflow Privacy Patterns (WPPs). Such WPPs allow to specify abstract templates for recurring data-privacy problems in workflows. Thus, WPPs are intended to support workflow engineers, auditors and privacy officers by providing pre-validated patterns that comply with existing data privacy regulations. However, it is unclear yet how to obtain WPPs systematically with an appropriate level of detail. In this paper, we introduce our approach to derive WPPs from legal texts and similar normative regulations. We propose a structure of a WPP, which we derive from pattern approaches from other research areas. We also introduce a framework that allows to design WPPs which make legal regulations accessible for persons who do not possess in-depth legal expertise. We have applied our approach to different articles of the GDPR, and we have obtained evidence that we can transfer legal text into a structured WPP representation. If a workflow correctly implements a WPP that has been designed that way, the workflow automatically complies to the respective fragment of the underlying legal text.
通用数据保护条例(GDPR)加强了在欧盟提供服务的企业的数据隐私和保护的重要性。加强隐私保护的一个重要部分是企业工作流(重新)设计。特别是,GDPR加强了在(重新)设计工作流时应用隐私设计原则的必要性。将与隐私相关的工作流片段建模为工作流隐私模式(workflow privacy Patterns, wpp)是一种符合标准且有前景的方法。这样的wpp允许为工作流中反复出现的数据隐私问题指定抽象模板。因此,wpp旨在通过提供符合现有数据隐私法规的预先验证模式来支持工作流工程师、审计员和隐私官。然而,目前尚不清楚如何以适当的详细程度系统地获得wpp。在本文中,我们介绍了我们从法律文本和类似的规范性规定中推导wpp的方法。本文提出了一种基于其他研究领域模式方法的WPP结构。我们还引入了一个框架,允许设计wpp,使没有深入法律专业知识的人也能获得法律法规。我们已经将我们的方法应用于GDPR的不同条款,并且我们已经获得了证据,证明我们可以将法律文本转换为结构化的WPP表示。如果工作流正确地实现了以这种方式设计的WPP,那么工作流将自动遵守基础法律文本的相应片段。
{"title":"Deriving Workflow Privacy Patterns from Legal Documents","authors":"Marcin Robak, Erik Buchmann","doi":"10.15439/2019F275","DOIUrl":"https://doi.org/10.15439/2019F275","url":null,"abstract":"The General Data Protection Regulation (GDPR) has strengthened the importance of data privacy and protection for enterprises offering their services in the EU. An important part of intensified efforts towards better privacy protection is enterprise workflow (re)design. In particular, the GDPR as strengthen the imperative to apply the privacy by design principle when (re)designing workflows. A conforming and promising approach is to model privacy relevant workflow fragments as Workflow Privacy Patterns (WPPs). Such WPPs allow to specify abstract templates for recurring data-privacy problems in workflows. Thus, WPPs are intended to support workflow engineers, auditors and privacy officers by providing pre-validated patterns that comply with existing data privacy regulations. However, it is unclear yet how to obtain WPPs systematically with an appropriate level of detail. In this paper, we introduce our approach to derive WPPs from legal texts and similar normative regulations. We propose a structure of a WPP, which we derive from pattern approaches from other research areas. We also introduce a framework that allows to design WPPs which make legal regulations accessible for persons who do not possess in-depth legal expertise. We have applied our approach to different articles of the GDPR, and we have obtained evidence that we can transfer legal text into a structured WPP representation. If a workflow correctly implements a WPP that has been designed that way, the workflow automatically complies to the respective fragment of the underlying legal text.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security-oriented agile approach with AgileSafe and OWASP ASVS 使用AgileSafe和OWASP ASVS的面向安全的敏捷方法
Katarzyna Lukasiewicz, Sara Cyganska
In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these practices were used as an input to AgileSafe method as well as to demonstrate their potential to comply with OWASP ASVS requirements.
在本文中,我们展示了一种基于AgileSafe方法的安全增强方法,该方法可以用于支持OWASP ASVS兼容实践的引入,该实践专注于提高敏捷软件开发过程的安全级别。我们还提供了调查的结果,评估了一些受敏捷启发的安全实践,这些实践可以被纳入敏捷过程。根据调查的结果,这些实践被用作AgileSafe方法的输入,并证明它们符合OWASP ASVS需求的潜力。
{"title":"Security-oriented agile approach with AgileSafe and OWASP ASVS","authors":"Katarzyna Lukasiewicz, Sara Cyganska","doi":"10.15439/2019F213","DOIUrl":"https://doi.org/10.15439/2019F213","url":null,"abstract":"In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these practices were used as an input to AgileSafe method as well as to demonstrate their potential to comply with OWASP ASVS requirements.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126393741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Effects of Augmented Training Dataset on Performance of Convolutional Neural Networks in Face Recognition System 增强训练数据集对人脸识别系统中卷积神经网络性能的影响
Mehmet Ali Kutlugun, Yahya Sirin, Mehmet Ali Karakaya
Nowadays, deep learning methods have been used in many areas such as big data analysis, speech and image processing with the increasing processing power and the development of graphics processors. In particular, face recognition systems have become one of the most important research topics in biometry. Light direction, reflection, emotional and physical changes in facial expression are the main factors in face recognition systems that make recognition difficult. Training of the system with the available data in small data sets is an important factor that negatively affects the performance. The Convolutional Neural Network (CNN) model is a deep learning architecture used for large amounts of training data. In this study, a small number of employee images set of a small-scale company has been increased by applying different filters. In addition, it has been tried to determine which data augmentation options have more effect on face recognition. Thus, non-real-time face recognition has been performed by training with new augmented dataset of each picture with many features.
如今,随着处理能力的提高和图形处理器的发展,深度学习方法已被应用于大数据分析、语音和图像处理等许多领域。特别是人脸识别系统已成为生物计量学研究的重要课题之一。光线方向、反射、面部表情的情绪和身体变化是人脸识别系统中使识别困难的主要因素。使用小数据集中的可用数据对系统进行训练是影响性能的一个重要因素。卷积神经网络(CNN)模型是一种用于大量训练数据的深度学习架构。在本研究中,通过应用不同的过滤器,增加了一家小型公司的少量员工图像集。此外,还试图确定哪些数据增强选项对人脸识别更有效。因此,非实时人脸识别是通过使用具有许多特征的每张图片的新增强数据集进行训练来实现的。
{"title":"The Effects of Augmented Training Dataset on Performance of Convolutional Neural Networks in Face Recognition System","authors":"Mehmet Ali Kutlugun, Yahya Sirin, Mehmet Ali Karakaya","doi":"10.15439/2019F181","DOIUrl":"https://doi.org/10.15439/2019F181","url":null,"abstract":"Nowadays, deep learning methods have been used in many areas such as big data analysis, speech and image processing with the increasing processing power and the development of graphics processors. In particular, face recognition systems have become one of the most important research topics in biometry. Light direction, reflection, emotional and physical changes in facial expression are the main factors in face recognition systems that make recognition difficult. Training of the system with the available data in small data sets is an important factor that negatively affects the performance. The Convolutional Neural Network (CNN) model is a deep learning architecture used for large amounts of training data. In this study, a small number of employee images set of a small-scale company has been increased by applying different filters. In addition, it has been tried to determine which data augmentation options have more effect on face recognition. Thus, non-real-time face recognition has been performed by training with new augmented dataset of each picture with many features.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126324232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Adaptation of IoT to Improve Parcel Delivery System 利用物联网改善包裹递送系统
H. Song, Hyo Chang Han
Recently, IoT technology has been applied in various field. One of the possible fields of an application is logistics system. In current system, a delivery must go through the designated logistics hub, which doesn’t provide shortest distance. Such system costs time and inefficient expenses. In this paper, we propose an enhanced parcel delivery system based on IoT technology for reducing total delivery distance and seeking for much economy. First, we designed a sort of IoT devices which can be attached to parcels. This device has various functionalities including the ability to figure out current delivery route. Second, we addressed some difficulties such as: (i) issues linking IoT device into its platform; (ii) issues for designing IoT devices functionalities. Third, we propose ways to improve the efficiency of IoT based parcel delivery system. From these considerations, our system may improve total economics of parcel delivery system.
近年来,物联网技术在各个领域得到了应用。其中一个可能的应用领域是物流系统。在目前的系统中,货物必须经过指定的物流中心,这并不是最短的距离。这种制度耗费时间和低效费用。本文提出了一种基于物联网技术的增强型包裹递送系统,以减少总递送距离并寻求更大的经济性。首先,我们设计了一种可以附着在包裹上的物联网设备。该设备具有多种功能,包括能够计算出当前的交付路线。其次,我们解决了一些困难,例如:(i)将物联网设备连接到其平台的问题;(ii)设计物联网设备功能的问题。第三,我们提出了提高基于物联网的包裹递送系统效率的方法。从这些考虑出发,我们的系统可以提高包裹递送系统的整体经济性。
{"title":"An Adaptation of IoT to Improve Parcel Delivery System","authors":"H. Song, Hyo Chang Han","doi":"10.15439/2019F321","DOIUrl":"https://doi.org/10.15439/2019F321","url":null,"abstract":"Recently, IoT technology has been applied in various field. One of the possible fields of an application is logistics system. In current system, a delivery must go through the designated logistics hub, which doesn’t provide shortest distance. Such system costs time and inefficient expenses. In this paper, we propose an enhanced parcel delivery system based on IoT technology for reducing total delivery distance and seeking for much economy. First, we designed a sort of IoT devices which can be attached to parcels. This device has various functionalities including the ability to figure out current delivery route. Second, we addressed some difficulties such as: (i) issues linking IoT device into its platform; (ii) issues for designing IoT devices functionalities. Third, we propose ways to improve the efficiency of IoT based parcel delivery system. From these considerations, our system may improve total economics of parcel delivery system.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116600960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Approach to Applications Integration for World Data Center Interdisciplinary Scientific Investigations 世界数据中心跨学科科学研究的应用集成方法
Grzegorz Nowakowski, S. Telenyk, K. Yefremov, V. Khmeliuk
The approach to applications integration for World Data Center (WDC) interdisciplinary scientific investigations is developed in the article. The integration is based on mathematical logic and artificial intelligence. Key elements of the approach-a multilevel system architecture, formal logical system, implementation– are based on intelligent agents interaction. The formal logical system is proposed. The inference method and mechanism of solution tree recovery are elaborated. The implementation of application integration for interdisciplinary scientific research is based on a stack of modern protocols, enabling communication of business processes over the transport layer of the OSI model. Application integration is also based on coordinated models of business processes, for which an integrated set of business applications are designed and realized.
本文提出了世界数据中心(WDC)跨学科科学研究的应用集成方法。这种集成是基于数理逻辑和人工智能的。该方法的关键要素是基于智能代理交互的多层系统架构、形式化逻辑系统和实现。提出了形式逻辑系统。阐述了解树恢复的推理方法和机理。跨学科科学研究的应用集成的实现是基于一堆现代协议,使业务流程能够在OSI模型的传输层上通信。应用程序集成还基于业务流程的协调模型,为此设计和实现了一组集成的业务应用程序。
{"title":"The Approach to Applications Integration for World Data Center Interdisciplinary Scientific Investigations","authors":"Grzegorz Nowakowski, S. Telenyk, K. Yefremov, V. Khmeliuk","doi":"10.15439/2019F71","DOIUrl":"https://doi.org/10.15439/2019F71","url":null,"abstract":"The approach to applications integration for World Data Center (WDC) interdisciplinary scientific investigations is developed in the article. The integration is based on mathematical logic and artificial intelligence. Key elements of the approach-a multilevel system architecture, formal logical system, implementation– are based on intelligent agents interaction. The formal logical system is proposed. The inference method and mechanism of solution tree recovery are elaborated. The implementation of application integration for interdisciplinary scientific research is based on a stack of modern protocols, enabling communication of business processes over the transport layer of the OSI model. Application integration is also based on coordinated models of business processes, for which an integrated set of business applications are designed and realized.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121673405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Best Response Dynamics for VLSI Physical Design Placement 超大规模集成电路物理设计放置的最佳响应动力学
M. Rapoport, Tami Tamir
The physical design placement problem is one of the hardest and most important problems in micro chips production. The placement defines how to place the electrical components on the chip. We consider the problem as a combinatorial optimization problem, whose instance is defined by a set of 2-dimensional rectangles, with various sizes and wire connectivity requirements. We focus on minimizing the placement area and the total wire-length.We propose a local-search method for coping with the problem, based on natural dynamics common in game theory. Specifically, we suggest to perform variants of Best-Response Dynamics (BRD). In our method, we assume that every component is controlled by a selfish agent, who aim at minimizing his individual cost, which depends on his own location and the wire-length of his connections.We suggest several BRD methods, based on selfish migrations of a single or a cooperative of components. We performed a comprehensive experimental study on various test-benches, and compared our results with commonly known algorithms, in particular, with simulated annealing. The results show that selfish local-search, especially when applied with cooperatives of components, may be beneficial for the placement problem.
在微芯片生产中,物理设计放置问题是最困难也是最重要的问题之一。放置定义了如何将电子元件放置在芯片上。我们认为该问题是一个组合优化问题,其实例由一组二维矩形定义,这些矩形具有不同的尺寸和连接要求。我们专注于最小化放置面积和总导线长度。我们提出了一种基于博弈论中常见的自然动力学的局部搜索方法来解决这个问题。具体来说,我们建议执行最佳反应动力学(BRD)的变体。在我们的方法中,我们假设每个组件都由一个自私的代理控制,他的目标是最小化他的个人成本,这取决于他自己的位置和他的连接的电线长度。我们提出了几种基于单个或多个组件的自迁移的BRD方法。我们在各种测试台上进行了全面的实验研究,并将我们的结果与已知的算法进行了比较,特别是与模拟退火进行了比较。结果表明,自私的局部搜索,特别是在组件协作的情况下,可能有利于定位问题的解决。
{"title":"Best Response Dynamics for VLSI Physical Design Placement","authors":"M. Rapoport, Tami Tamir","doi":"10.15439/2019F91","DOIUrl":"https://doi.org/10.15439/2019F91","url":null,"abstract":"The physical design placement problem is one of the hardest and most important problems in micro chips production. The placement defines how to place the electrical components on the chip. We consider the problem as a combinatorial optimization problem, whose instance is defined by a set of 2-dimensional rectangles, with various sizes and wire connectivity requirements. We focus on minimizing the placement area and the total wire-length.We propose a local-search method for coping with the problem, based on natural dynamics common in game theory. Specifically, we suggest to perform variants of Best-Response Dynamics (BRD). In our method, we assume that every component is controlled by a selfish agent, who aim at minimizing his individual cost, which depends on his own location and the wire-length of his connections.We suggest several BRD methods, based on selfish migrations of a single or a cooperative of components. We performed a comprehensive experimental study on various test-benches, and compared our results with commonly known algorithms, in particular, with simulated annealing. The results show that selfish local-search, especially when applied with cooperatives of components, may be beneficial for the placement problem.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 Federated Conference on Computer Science and Information Systems (FedCSIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1