Pub Date : 2019-05-03DOI: 10.5220/0007727502160222
Bruno Oliveira, Óscar Oliveira, Vasco Santos, O. Belo
Extract-Transform-Load (ETL) workflows are commonly developed using frameworks and tools that provide a set of useful pre-configured components to develop complete ETL packages. The pattern concept for ETL development is being studied as a way to simplify and improve the ETL development lifecycle. Patterns are independent composite tasks that can be changed without affecting the ETL structure. The pattern implementation reveals several challenges when used with existing ETL tools, mainly due to the monolith architectural style usually followed. The use of small and loosely-coupled components provided by the microservices architectural style can improve the way ETL patterns are used. In this paper, we present an analysis for the use of microservices for ETL application development using patterns.
{"title":"ETL Development using Patterns: A Service-Oriented Approach","authors":"Bruno Oliveira, Óscar Oliveira, Vasco Santos, O. Belo","doi":"10.5220/0007727502160222","DOIUrl":"https://doi.org/10.5220/0007727502160222","url":null,"abstract":"Extract-Transform-Load (ETL) workflows are commonly developed using frameworks and tools that provide a set of useful pre-configured components to develop complete ETL packages. The pattern concept for ETL development is being studied as a way to simplify and improve the ETL development lifecycle. Patterns are independent composite tasks that can be changed without affecting the ETL structure. The pattern implementation reveals several challenges when used with existing ETL tools, mainly due to the monolith architectural style usually followed. The use of small and loosely-coupled components provided by the microservices architectural style can improve the way ETL patterns are used. In this paper, we present an analysis for the use of microservices for ETL application development using patterns.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129992766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Natural language processing in combination with advances in artificial intelligence is on the rise. However, compliance constraints while handling personal data in many types of documents hinder various application scenarios. We describe the challenges of working with personal and particularly sensitive data in practice with three different use cases. We present the anonymization bootstrap challenge in creating a prototype in a cloud environment. Finally, we outline an architecture for privacy compliant AI cloud applications and an anonymization tool. With these preliminary results, we describe future work in bridging privacy and AI.
{"title":"Towards a Privacy Compliant Cloud Architecture for Natural Language Processing Platforms","authors":"Matthias Blohm, Claudia Dukino, Maximilien Kintz, Monika Kochanowski, Falko Koetter, T. Renner","doi":"10.5220/0007746204540461","DOIUrl":"https://doi.org/10.5220/0007746204540461","url":null,"abstract":"Natural language processing in combination with advances in artificial intelligence is on the rise. However, compliance constraints while handling personal data in many types of documents hinder various application scenarios. We describe the challenges of working with personal and particularly sensitive data in practice with three different use cases. We present the anonymization bootstrap challenge in creating a prototype in a cloud environment. Finally, we outline an architecture for privacy compliant AI cloud applications and an anonymization tool. With these preliminary results, we describe future work in bridging privacy and AI.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121441209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.1007/978-3-030-40783-4_14
Anne Faber, Sven-Volker Rehm
{"title":"Towards Design Principles for Visualizing Business Ecosystems","authors":"Anne Faber, Sven-Volker Rehm","doi":"10.1007/978-3-030-40783-4_14","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_14","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125696306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.1007/978-3-030-40783-4_22
M. Krichen
{"title":"Improving and Optimizing Verification and Testing Techniques for Distributed Information Systems","authors":"M. Krichen","doi":"10.1007/978-3-030-40783-4_22","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_22","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126037040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.1007/978-3-030-40783-4_25
I. Bider, Azeem Lodhi
{"title":"Moving from Manufacturing to Software Business: A Business Model Transformation Pattern","authors":"I. Bider, Azeem Lodhi","doi":"10.1007/978-3-030-40783-4_25","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_25","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121692791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007752803200327
C. A. G. Huve, Alex Mateus Porn, L. Peres
Ontologies are structures used to represent a specific domain. One well-known method to simplify the ontology building is to extract domain concepts from a relational database. This article presents an architecture which enables an automatic mapping process from a relational database to OWL ontology. It proposes to enrich the terminology of ontology elements and it was validated with mutation tests. The architecture mapping process makes use of new and existent mapping rules and overcome lacks not previously addressed, such as the use of database logic model to eliminate duplicated elements of ontology and mapping inheritance relationships from tables and records. We stand out the structure of element mapping, which allows maintaining source-to-target traceability for verification. We validate our approach with two experiments: the first one focuses on architecture validation applying an experiment with three scenarios and the second one uses a testing engine applying a mutation test methodology to OWL ontology validation.
{"title":"Architecture for Mapping Relational Database to OWL Ontology: An Approach to Enrich Ontology Terminology Validated with Mutation Test","authors":"C. A. G. Huve, Alex Mateus Porn, L. Peres","doi":"10.5220/0007752803200327","DOIUrl":"https://doi.org/10.5220/0007752803200327","url":null,"abstract":"Ontologies are structures used to represent a specific domain. One well-known method to simplify the ontology building is to extract domain concepts from a relational database. This article presents an architecture which enables an automatic mapping process from a relational database to OWL ontology. It proposes to enrich the terminology of ontology elements and it was validated with mutation tests. The architecture mapping process makes use of new and existent mapping rules and overcome lacks not previously addressed, such as the use of database logic model to eliminate duplicated elements of ontology and mapping inheritance relationships from tables and records. We stand out the structure of element mapping, which allows maintaining source-to-target traceability for verification. We validate our approach with two experiments: the first one focuses on architecture validation applying an experiment with three scenarios and the second one uses a testing engine applying a mutation test methodology to OWL ontology validation.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121843359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007728006040611
Qishan Yang, Mouzhi Ge, M. Helfert
With decades of development and innovation, data warehouses and their architectures have been extended to a variety of derivatives in various environments to achieve different organisations’ requirements. Although there are some ad-hoc studies on data warehouse architecture (DWHA) investigations and classifications, limited research is relevant to systematically model and classify DWHAs. Especially in the big data era, data is generated explosively. More emerging architectures and technologies are leveraged to manipulate and manage big data in this domain. It is therefore valuable to revisit and investigate DWHAs with new innovations. In this paper, we collect 116 publications and model 73 disparate DWHAs using Archimate, then 9 representativeDWHAs are identified and summarised into a ”big picture”. Furthermore, it proposes a new classification model sticking to state-of-the-art DWHAs. This model can guide researchers and practitioners to identify, analyse and compare differences and trends of DWHAs from componental and architectural perspectives.
{"title":"Analysis of Data Warehouse Architectures: Modeling and Classification","authors":"Qishan Yang, Mouzhi Ge, M. Helfert","doi":"10.5220/0007728006040611","DOIUrl":"https://doi.org/10.5220/0007728006040611","url":null,"abstract":"With decades of development and innovation, data warehouses and their architectures have been extended to a variety of derivatives in various environments to achieve different organisations’ requirements. Although there are some ad-hoc studies on data warehouse architecture (DWHA) investigations and classifications, limited research is relevant to systematically model and classify DWHAs. Especially in the big data era, data is generated explosively. More emerging architectures and technologies are leveraged to manipulate and manage big data in this domain. It is therefore valuable to revisit and investigate DWHAs with new innovations. In this paper, we collect 116 publications and model 73 disparate DWHAs using Archimate, then 9 representativeDWHAs are identified and summarised into a ”big picture”. Furthermore, it proposes a new classification model sticking to state-of-the-art DWHAs. This model can guide researchers and practitioners to identify, analyse and compare differences and trends of DWHAs from componental and architectural perspectives.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125123055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007768506820688
S. Kozák, E. Ruzický, A. Kozáková, J. Stefanovic, V. Kozák
Information and communication technologies (ICT), automation, and robotics remain key sciences of the 21st century. Currently, manufacturing enterprises are facing challenges with regard to new concepts such as Internet of Things, Industrial Internet of Things, Cyber-physical Systems or Cloud-based Manufacturing. The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s control industry comprising Internet-enabled cyber-physical devices with the ability to link to new interconnection technologies. Under this perspective, new industrial cyber-physical “things” can be accessible and available from remote locations; information on them can be processed and stored in distributed locations favouring cooperation and coordination to achieve high performance in real time. The paper presents the state-of-the-art in research, development and education in new information a communications technologies for advanced manufacturing based on intelligent modelling and control methods, and their applications with the focus on new trends declared in Industry 4.0.
{"title":"ICT for Advanced Manufacturing","authors":"S. Kozák, E. Ruzický, A. Kozáková, J. Stefanovic, V. Kozák","doi":"10.5220/0007768506820688","DOIUrl":"https://doi.org/10.5220/0007768506820688","url":null,"abstract":"Information and communication technologies (ICT), automation, and robotics remain key sciences of the 21st century. Currently, manufacturing enterprises are facing challenges with regard to new concepts such as Internet of Things, Industrial Internet of Things, Cyber-physical Systems or Cloud-based Manufacturing. The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s control industry comprising Internet-enabled cyber-physical devices with the ability to link to new interconnection technologies. Under this perspective, new industrial cyber-physical “things” can be accessible and available from remote locations; information on them can be processed and stored in distributed locations favouring cooperation and coordination to achieve high performance in real time. The paper presents the state-of-the-art in research, development and education in new information a communications technologies for advanced manufacturing based on intelligent modelling and control methods, and their applications with the focus on new trends declared in Industry 4.0.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122481050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-03DOI: 10.5220/0007424601550161
A. Krinah, Y. Challal, Mawloud Omar, O. Nouali
Fog is an extension of the cloud computing paradigm, developed to fix the clouds latency, especially for applications requiring a very short response time, such as e-health applications. However, these applications also require a high level of data confidentiality, hence the need to apply appropriate encryption techniques, which can ensure security needs, while respecting the characteristics of the infrastructures devices. In this article, we will focus on ABE encryption, through the work done to study its applicability in the cloud and the Internet of things, as well as the improvements that can be made to adapt it to the fog computing environment.
{"title":"Using ABE for Medical Data Protection in Fog Computing","authors":"A. Krinah, Y. Challal, Mawloud Omar, O. Nouali","doi":"10.5220/0007424601550161","DOIUrl":"https://doi.org/10.5220/0007424601550161","url":null,"abstract":"Fog is an extension of the cloud computing paradigm, developed to fix the clouds latency, especially for applications requiring a very short response time, such as e-health applications. However, these applications also require a high level of data confidentiality, hence the need to apply appropriate encryption techniques, which can ensure security needs, while respecting the characteristics of the infrastructures devices. In this article, we will focus on ABE encryption, through the work done to study its applicability in the cloud and the Internet of things, as well as the improvements that can be made to adapt it to the fog computing environment.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}