Cloud Computing has been developed to deliver information technologies services on demand to organizations such as well as individual users. In this paper, we will describe an approach which proposes a security model based on Organization Role Based Access Control and encryption system. This model aims to give users a possibility to control security of their data.
{"title":"Security model based encryption to protect data on cloud","authors":"Yasmina Ghebghoub, Omar Boussaïd, S. Oukid","doi":"10.1145/2618168.2618176","DOIUrl":"https://doi.org/10.1145/2618168.2618176","url":null,"abstract":"Cloud Computing has been developed to deliver information technologies services on demand to organizations such as well as individual users. In this paper, we will describe an approach which proposes a security model based on Organization Role Based Access Control and encryption system. This model aims to give users a possibility to control security of their data.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128162058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents an examination and performance analysis of Redundant Array of Inexpensive Disks ver. 5 (RAID-5) and its comparison to the single disk drive performances. The focus is on the influence of the number of disks in RAID-5 to the globally achieved disk performances. Initially, we have applied the M/G/1 queue for the needs of analytically modeling a single disk performances. Then, we have set up an adequate analytical model for underlying file system. Finally, the proper workload analytical model has been defined and applied for four different RAID performance cases. Additionally, to provide a more comprehensive analysis, we have defined three types of workloads. The obtained test results have shown that there is a solid slowing in the RAID-5 performance, specifically for the workloads which are dominated by small updates. Increasing the number of disks has a different impact on the performances and depends on the workload. All benchmark results are interpreted based on a mathematical model of workload, file system access times and single disk access times.
{"title":"Stripped disk array organizations with distributed parity RAID-5: study and performance analysis","authors":"V. Timčenko, B. Djordjevic, Nikola Davidovic","doi":"10.1145/2618168.2618186","DOIUrl":"https://doi.org/10.1145/2618168.2618186","url":null,"abstract":"This paper presents an examination and performance analysis of Redundant Array of Inexpensive Disks ver. 5 (RAID-5) and its comparison to the single disk drive performances. The focus is on the influence of the number of disks in RAID-5 to the globally achieved disk performances. Initially, we have applied the M/G/1 queue for the needs of analytically modeling a single disk performances. Then, we have set up an adequate analytical model for underlying file system. Finally, the proper workload analytical model has been defined and applied for four different RAID performance cases. Additionally, to provide a more comprehensive analysis, we have defined three types of workloads. The obtained test results have shown that there is a solid slowing in the RAID-5 performance, specifically for the workloads which are dominated by small updates. Increasing the number of disks has a different impact on the performances and depends on the workload. All benchmark results are interpreted based on a mathematical model of workload, file system access times and single disk access times.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124503296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research proposes an evaluation model to measure a computer programming learning system success, for helping students to overcome learning difficulties. Teachers use programming learning environments, as computer-assisted instruction systems. The proposed model is supported in a the theory of information systems success evaluation, and in the characteristics of a virtual programming learning tool. The used tool was a web-based virtual robot learning system. Results presented here suggest the main features that this type of solution should include.
{"title":"Evaluating success of a programming learning tool","authors":"C. Costa, M. Aparicio","doi":"10.1145/2618168.2618180","DOIUrl":"https://doi.org/10.1145/2618168.2618180","url":null,"abstract":"This research proposes an evaluation model to measure a computer programming learning system success, for helping students to overcome learning difficulties. Teachers use programming learning environments, as computer-assisted instruction systems. The proposed model is supported in a the theory of information systems success evaluation, and in the characteristics of a virtual programming learning tool. The used tool was a web-based virtual robot learning system. Results presented here suggest the main features that this type of solution should include.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132629134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of framework to provide dynamic web pages has been, in recent decades, quite common in the corporate environment so that arise in the "world of technology" several open source projects that are intended to facilitate the management, increasingly efficient, of content. This paper describes Django-CMS overview regarding its history, architecture, installation process, functionality and identify certain companies that using it.
{"title":"Django-CMS overview","authors":"Jorge Quitério, José Ribeiro","doi":"10.1145/2618168.2618201","DOIUrl":"https://doi.org/10.1145/2618168.2618201","url":null,"abstract":"The use of framework to provide dynamic web pages has been, in recent decades, quite common in the corporate environment so that arise in the \"world of technology\" several open source projects that are intended to facilitate the management, increasingly efficient, of content. This paper describes Django-CMS overview regarding its history, architecture, installation process, functionality and identify certain companies that using it.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123882372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information systems in the form of Decision Support Systems (DSS) and Expert Systems (ES) have been used for considerable years in finance, marketing, portfolio management and other fields. Most of these systems use artificial intelligence techniques. Systems have been designed to address the problem of allocating the wealth of an individual across various assets in order to maximize return subject to a certain risk. This problem is known as the investment portfolio management problem. This problem can be comprised of the investment advisory problem and the portfolio allocation problem. This paper proposes an information system for the investment advisory problem to aid the wealth managers in providing regulatory compliant investment advice. The system considers the behavioral traits of the customer and calculates his risk appetite. It then does a risk scoring and allocates the wealth of the customer proportionately in different investment asset classes. It then checks the suitability of the advisory note prepared by the wealth manager subject to a set of inbuilt rules.
{"title":"An information system for investment advisory process","authors":"Amitava Ghosh, A. Mahanti","doi":"10.1145/2618168.2618191","DOIUrl":"https://doi.org/10.1145/2618168.2618191","url":null,"abstract":"Information systems in the form of Decision Support Systems (DSS) and Expert Systems (ES) have been used for considerable years in finance, marketing, portfolio management and other fields. Most of these systems use artificial intelligence techniques. Systems have been designed to address the problem of allocating the wealth of an individual across various assets in order to maximize return subject to a certain risk. This problem is known as the investment portfolio management problem. This problem can be comprised of the investment advisory problem and the portfolio allocation problem. This paper proposes an information system for the investment advisory problem to aid the wealth managers in providing regulatory compliant investment advice. The system considers the behavioral traits of the customer and calculates his risk appetite. It then does a risk scoring and allocates the wealth of the customer proportionately in different investment asset classes. It then checks the suitability of the advisory note prepared by the wealth manager subject to a set of inbuilt rules.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114612795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As 3D displays become increasingly affordable, meanwhile production techniques and computational resources to create stereoscopic content being ever more accessible, a new dimension is literally introduced along with new expressive and immersive potentialities in support of designing for the screen. Prospective design visionaries have already at the reach of their hands an innovative and powerful visualization technology, which enables them to actively envision future trends and vanguardist directions. This paper explores the aesthetic and informational potentialities of stereoscopic motion graphics, providing insight on the application of 3D displays in design practice, proposing strategies to investigate stereoscopic communication, discussing potential repercussions to extant theory and impacts on audience.
{"title":"S3D motion graphics: assessing the benefits and implications of stereoscopic visual communication","authors":"Edgar Teixeira, E. Carrapatoso","doi":"10.1145/2618168.2618189","DOIUrl":"https://doi.org/10.1145/2618168.2618189","url":null,"abstract":"As 3D displays become increasingly affordable, meanwhile production techniques and computational resources to create stereoscopic content being ever more accessible, a new dimension is literally introduced along with new expressive and immersive potentialities in support of designing for the screen. Prospective design visionaries have already at the reach of their hands an innovative and powerful visualization technology, which enables them to actively envision future trends and vanguardist directions. This paper explores the aesthetic and informational potentialities of stereoscopic motion graphics, providing insight on the application of 3D displays in design practice, proposing strategies to investigate stereoscopic communication, discussing potential repercussions to extant theory and impacts on audience.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128231100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the previous and ongoing work of the development of GSG, an extensible expert system shell tool to support creative work involving shape computing with Shape Grammars, this paper shows an evolution and refinement of the system. A refined class structure and the line intersections types appropriate for matching shapes in the process of shape grammar rule application are presented. Operations for the algebras of shapes (which are essential in the mechanics of the application of rules in shape computing) are discussed, for both maximal and non maximal shapes. In particular, details and tests of the implementation of these operations for the maximal case are also shown.
{"title":"Crossing lines in GSG","authors":"Joaquim Reis","doi":"10.1145/2618168.2618185","DOIUrl":"https://doi.org/10.1145/2618168.2618185","url":null,"abstract":"Based on the previous and ongoing work of the development of GSG, an extensible expert system shell tool to support creative work involving shape computing with Shape Grammars, this paper shows an evolution and refinement of the system. A refined class structure and the line intersections types appropriate for matching shapes in the process of shape grammar rule application are presented. Operations for the algebras of shapes (which are essential in the mechanics of the application of rules in shape computing) are discussed, for both maximal and non maximal shapes. In particular, details and tests of the implementation of these operations for the maximal case are also shown.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124804790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Understanding the states of learners at a lecture is expected to be useful for improving the quality of the lecture. This paper investigates the possibility of use of a simple electroencephalograph MindTune for activity recognition of a learner. The authors considered three kinds of activities for detecting states of a learner, and collected electroencephalography data with the activities by MindTune. Then, they applied K-nearest neighbor algorithm to the collected data, and the accuracy of the activity recognition was 58.2%. The result indicates a possibility of using MindTune for the activity recognition of learners.
{"title":"Towards activity recognition of learners by simple electroencephalographs","authors":"H. Abe, K. Baba, S. Takano, K. Murakami","doi":"10.1145/2618168.2618194","DOIUrl":"https://doi.org/10.1145/2618168.2618194","url":null,"abstract":"Understanding the states of learners at a lecture is expected to be useful for improving the quality of the lecture. This paper investigates the possibility of use of a simple electroencephalograph MindTune for activity recognition of a learner. The authors considered three kinds of activities for detecting states of a learner, and collected electroencephalography data with the activities by MindTune. Then, they applied K-nearest neighbor algorithm to the collected data, and the accuracy of the activity recognition was 58.2%. The result indicates a possibility of using MindTune for the activity recognition of learners.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, statutory auditors' profiles will be defined on Computer Assisted Audit Tools and Techniques' intention to use and use concerning the influence of statutory auditors firms' dimension (number of collaborators, number of financial auditors and number of statutory auditors), peers impact (other statutory auditors and the professional group influence on the professional context) and social influence (people and firm support). Additionally, previous research on the experience with tools and its influence on the acceptance are documented this research group, and also the professional experience (number of years of professional experience). The variety of computer assisted audit tools available in the firm and its impact on the acceptance is also addressed. In the reference group, was possible to conclude that firm dimension, peers and social influence and experience have a positive impact on Computer Assisted Audit Tools and Techniques' acceptance. However, the number of available tools has a negative impact on intention to use confirming that is not relevant to have several tools but to be expert in one or two tools.
{"title":"Statutory auditor's profile and computer assisted audit tools and techniques' acceptance: indicators on firms and peers' influence","authors":"I. Pedrosa, C. Costa","doi":"10.1145/2618168.2618172","DOIUrl":"https://doi.org/10.1145/2618168.2618172","url":null,"abstract":"In this paper, statutory auditors' profiles will be defined on Computer Assisted Audit Tools and Techniques' intention to use and use concerning the influence of statutory auditors firms' dimension (number of collaborators, number of financial auditors and number of statutory auditors), peers impact (other statutory auditors and the professional group influence on the professional context) and social influence (people and firm support). Additionally, previous research on the experience with tools and its influence on the acceptance are documented this research group, and also the professional experience (number of years of professional experience). The variety of computer assisted audit tools available in the firm and its impact on the acceptance is also addressed. In the reference group, was possible to conclude that firm dimension, peers and social influence and experience have a positive impact on Computer Assisted Audit Tools and Techniques' acceptance. However, the number of available tools has a negative impact on intention to use confirming that is not relevant to have several tools but to be expert in one or two tools.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"68 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113992782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web-based communities and internal social networks have become common part of the work environment in many organizations. These Enterprise Social Networks (ESN) link employees, capture organizational knowledge and support collaboration in virtual teams. Even though ESN intend to break up knowledge silos, improve communication and foster knowledge sharing, their limited ability to cover corporate workows hinders them from realizing their full potential. Information is often scattered either across several systems outside of ESN software or distinct groups and conversations within ESN due to the lack of support of cross-team communication patterns required in complex business processes. To discover gaps we use a real-world example and analyze a critical sales process. Thereafter, extensions to existing software are proposed with the goal to better cover the end-to-end collaboration in virtual teams. We discovered limitations in the group concepts and the mechanisms of sharing content between groups in ESN and conducted a first evaluation of our enhanced concepts with process experts.
{"title":"Exploring collaboration requirements of heterogeneous teams on the example of a critical sales process","authors":"A. Pursche","doi":"10.1145/2618168.2618183","DOIUrl":"https://doi.org/10.1145/2618168.2618183","url":null,"abstract":"Web-based communities and internal social networks have become common part of the work environment in many organizations. These Enterprise Social Networks (ESN) link employees, capture organizational knowledge and support collaboration in virtual teams. Even though ESN intend to break up knowledge silos, improve communication and foster knowledge sharing, their limited ability to cover corporate workows hinders them from realizing their full potential. Information is often scattered either across several systems outside of ESN software or distinct groups and conversations within ESN due to the lack of support of cross-team communication patterns required in complex business processes. To discover gaps we use a real-world example and analyze a critical sales process. Thereafter, extensions to existing software are proposed with the goal to better cover the end-to-end collaboration in virtual teams. We discovered limitations in the group concepts and the mechanisms of sharing content between groups in ESN and conducted a first evaluation of our enhanced concepts with process experts.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133499436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}