Gabriel Nunes Crispino, Valdinei Freire, Karina Valdivia Delgado
The Stochastic Shortest Path (SSP) is a formalism widely used for modeling goal-oriented probabilistic planning problems. When dead ends, which are states from which goal states cannot be reached, are present in the problem and cannot be avoided, the standard criterion for solving SSPs is not well defined in these scenarios. Because of that, several alternate criteria for solving SSPs with unavoidable dead ends have been proposed in the literature. One of these criteria is GUBS (Goals with Utility-Based Semantics), a criterion that makes trade-offs between probability-to-goal and cost by combining goal prioritization with Expected Utility Theory. GUBS is a good choice for these problems because it is one of the only criteria that are known to maintain the ?-strong probability-to-goal priority property, a property that provides guarantees on how a decision criterion can choose policies without having to preprocess any specific SSP problem. Although there already exist two exact algorithms for solving GUBS, eGUBS-VI and eGUBS-AO*, both are offline and there is no algorithm for solving GUBS in an online manner. In this paper we propose UCT-GUBS, an online approximate algorithm based on UCT (a Monte Carlo tree search algorithm) that solves SSPs under the GUBS criterion. We provide an analysis of an empirical evaluation performed on two probabilistic planning domains (Triangle Tireworld and Navigation) to observe how the probability-to-goal and utility values of the resulting policies compare to the optimal values, and also how the time performance of UCT-GUBS compares to the ones of eGUBS-VI and eGUBS-AO*. Our conclusion is that, like other algorithms, the usage of UCT-GUBS has to be evaluated considering the application requirements and of the problem being solved. Depending on these factors, it can be a good alternative for obtaining policies in an online fashion while, for some problems, also being able to have better time performance than other algorithms
{"title":"Monte Carlo Tree Search Algorithm for SSPs Under the GUBS Criterion","authors":"Gabriel Nunes Crispino, Valdinei Freire, Karina Valdivia Delgado","doi":"10.19153/cleiej.27.3.5","DOIUrl":"https://doi.org/10.19153/cleiej.27.3.5","url":null,"abstract":"The Stochastic Shortest Path (SSP) is a formalism widely used for modeling goal-oriented probabilistic planning problems. When dead ends, which are states from which goal states cannot be reached, are present in the problem and cannot be avoided, the standard criterion for solving SSPs is not well defined in these scenarios. Because of that, several alternate criteria for solving SSPs with unavoidable dead ends have been proposed in the literature. One of these criteria is GUBS (Goals with Utility-Based Semantics), a criterion that makes trade-offs between probability-to-goal and cost by combining goal prioritization with Expected Utility Theory. GUBS is a good choice for these problems because it is one of the only criteria that are known to maintain the ?-strong probability-to-goal priority property, a property that provides guarantees on how a decision criterion can choose policies without having to preprocess any specific SSP problem. Although there already exist two exact algorithms for solving GUBS, eGUBS-VI and eGUBS-AO*, both are offline and there is no algorithm for solving GUBS in an online manner. In this paper we propose UCT-GUBS, an online approximate algorithm based on UCT (a Monte Carlo tree search algorithm) that solves SSPs under the GUBS criterion. We provide an analysis of an empirical evaluation performed on two probabilistic planning domains (Triangle Tireworld and Navigation) to observe how the probability-to-goal and utility values of the resulting policies compare to the optimal values, and also how the time performance of UCT-GUBS compares to the ones of eGUBS-VI and eGUBS-AO*. Our conclusion is that, like other algorithms, the usage of UCT-GUBS has to be evaluated considering the application requirements and of the problem being solved. Depending on these factors, it can be a good alternative for obtaining policies in an online fashion while, for some problems, also being able to have better time performance than other algorithms","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"106 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141926676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Héctor Cancela, Rhadamés Carmona, Alicia García-Holgado, Ana Maguitman, Francisco Tirado
This special issue features four invited papers from the 2023 edition of the MSc. and PhD. thesis contests, organized by CLEI, the Latin American Center for Computing Studies. CLEI's mission includes promoting the scientific growth of all computing fields across Latin America. To recognize these advancements and foster the region's graduate programs, CLEI has been hosting the Latin American Master Thesis Contest (CLTM) annually since 1993 and the Doctoral Thesis Contest (CLTD) since 2016. Both contests are held in conjunction with the Latin American Computing Conference (CLEI conference). The 2023 conference took place in La Paz, Bolivia, and received numerous high-quality submissions for both the MSc. and PhD. contests. Post-conference, the authors of the best works were invited to submit original, unpublished papers to the CLEIej journal. These submissions went through another evaluation round, adhering to the journal's standard review process.
{"title":"Preface to the CLTM-CLTD 2023 Special Issue","authors":"Héctor Cancela, Rhadamés Carmona, Alicia García-Holgado, Ana Maguitman, Francisco Tirado","doi":"10.19153/cleiej.27.3.1","DOIUrl":"https://doi.org/10.19153/cleiej.27.3.1","url":null,"abstract":"This special issue features four invited papers from the 2023 edition of the MSc. and PhD. thesis contests, organized by CLEI, the Latin American Center for Computing Studies. CLEI's mission includes promoting the scientific growth of all computing fields across Latin America. To recognize these advancements and foster the region's graduate programs, CLEI has been hosting the Latin American Master Thesis Contest (CLTM) annually since 1993 and the Doctoral Thesis Contest (CLTD) since 2016. Both contests are held in conjunction with the Latin American Computing Conference (CLEI conference). \u0000The 2023 conference took place in La Paz, Bolivia, and received numerous high-quality submissions for both the MSc. and PhD. contests. Post-conference, the authors of the best works were invited to submit original, unpublished papers to the CLEIej journal. These submissions went through another evaluation round, adhering to the journal's standard review process.","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"11 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141926052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A cryptocurrency is a digital currency that enables online transactions for various products and services. Cryptocurrencies are deployed over public blockchains which have the transactions duplicated and dispersed across multiple nodes within a computer network. This decentralized mechanism is devised in order to achieve reliability in a network consisting of unreliable nodes. Privacy, anonymity and security have become crucial in this context. For that reason, formal and mathematical approaches are gaining popularity in order to guarantee the correctness of the cryptocurrency implementations. Mimblewimble is a privacy-oriented cryptocurrency technology which provides security and scalability properties that distinguish it from other protocols of its kind. Mimblewimble combines confidential transactions, CoinJoin and cut-through to achieve a higher level of privacy and security, as well as, scalability. In this work, we present and discuss these security properties and outline the basis of a model-driven verification approach to address the certification of the correctness of the protocol implementations. In particular, we propose an idealized model that is key in the described verification process. Then, we identify and precisely state the conditions for our model to ensure the verification of relevant security properties of Mimblewimble. In addition, we analyze the Grin and Beam implementations of Mimblewimble in their current state of development. We present detailed connections between our model and their implementations regarding the Mimblewimble structure and its security properties. Finally, we analyze the Litecoin soft-fork that enhances privacy over the blockchain based on Mimblewimble features.
{"title":"A Formal Analysis of the Mimblewimble Cryptocurrency Protocol with a Security Approach","authors":"Adrián Silveira, Gustavo Betarte, C. Luna","doi":"10.19153/cleiej.27.4.3","DOIUrl":"https://doi.org/10.19153/cleiej.27.4.3","url":null,"abstract":"\u0000 \u0000 \u0000A cryptocurrency is a digital currency that enables online transactions for various products and services. Cryptocurrencies are deployed over public blockchains which have the transactions duplicated and dispersed across multiple nodes within a computer network. This decentralized mechanism is devised in order to achieve reliability in a network consisting of unreliable nodes. Privacy, anonymity and security have become crucial in this context. For that reason, formal and mathematical approaches are gaining popularity in order to guarantee the correctness of the cryptocurrency implementations. Mimblewimble is a privacy-oriented cryptocurrency technology which provides security and scalability properties that distinguish it from other protocols of its kind. Mimblewimble combines confidential transactions, CoinJoin and cut-through to achieve a higher level of privacy and security, as well as, scalability. In this work, we present and discuss these security properties and outline the basis of a model-driven verification approach to address the certification of the correctness of the protocol implementations. In particular, we propose an idealized model that is key in the described verification process. Then, we identify and precisely state the conditions for our model to ensure the verification of relevant security properties of Mimblewimble. In addition, we analyze the Grin and Beam implementations of Mimblewimble in their current state of development. We present detailed connections between our model and their implementations regarding the Mimblewimble structure and its security properties. Finally, we analyze the Litecoin soft-fork that enhances privacy over the blockchain based on Mimblewimble features. \u0000 \u0000 \u0000","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"33 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141926245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When developing JavaScript (JS) applications, the assessment and selection of JS packages becomes challenging for developers due to the growing number of technology options available. Given a technology-related task, a common developers’ strategy is to query Web repositories (e.g., from GitHub) via a search engine (e.g., NPM, Google) and then shortlist candidate JS packages. However, this search might return a long list of results and not all of them might be relevant. Thus, these results often need to be (re-)ordered according to the developer’s criteria. To address these problems, in prior work, we developed a recommender system called AIDT that assists developers in the package selection task. AIDT relies on meta-search and machine learning techniques to infer the relevant packages for a query. An initial evaluation of AIDT showed good search effectiveness, but the tool was unable to explain its choices to the developer. Research on Large Language Models (LLMs) has recently opened new opportunities for this kind of recommender systems. Anyway, human developers should judge whether the recommendations (e.g., JS packages) of these tools (either AIDT or LLMs) are fit to purpose. In this paper, we propose a Retrieval Augmented Generation (RAG) architecture for using LLMs in the domain of technology selection, which enhances the AIDT original design. Furthermore, we report on a user study using both AIDT and different LLM-based variants (ChatGPT, Cohere, Llama2) on a sample of JS-related queries, in which we compared their results and also validated them against developers’ criteria for the task. Our findings show that, although the ranking capabilities of LLMs are not yet on par with AIDT or human efforts, the RAG architecture can achieve a decent performance and is good at providing explanations for the package choices in the rankings. The latter feature makes it more transparent than AIDT and, thus, potentially more flexible to support developers’ tasks.
{"title":"The JavaScript Package Selection Task: A Comparative Experiment Using an LLM-based Approach","authors":"Andres Diaz Pace, Antonela Tommasel, H. Vázquez","doi":"10.19153/cleiej.27.2.4","DOIUrl":"https://doi.org/10.19153/cleiej.27.2.4","url":null,"abstract":"\u0000 \u0000 \u0000When developing JavaScript (JS) applications, the assessment and selection of JS packages becomes challenging for developers due to the growing number of technology options available. Given a technology-related task, a common developers’ strategy is to query Web repositories (e.g., from GitHub) via a search engine (e.g., NPM, Google) and then shortlist candidate JS packages. However, this search might return a long list of results and not all of them might be relevant. Thus, these results often need to be (re-)ordered according to the developer’s criteria. To address these problems, in prior work, we developed a recommender system called AIDT that assists developers in the package selection task. AIDT relies on meta-search and machine learning techniques to infer the relevant packages for a query. An initial evaluation of AIDT showed good search effectiveness, but the tool was unable to explain its choices to the developer. Research on Large Language Models (LLMs) has recently opened new opportunities for this kind of recommender systems. Anyway, human developers should judge whether the recommendations (e.g., JS packages) of these tools (either AIDT or LLMs) are fit to purpose. In this paper, we propose a Retrieval Augmented Generation (RAG) architecture for using LLMs in the domain of technology selection, which enhances the AIDT original design. Furthermore, we report on a user study using both AIDT and different LLM-based variants (ChatGPT, Cohere, Llama2) on a sample of JS-related queries, in which we compared their results and also validated them against developers’ criteria for the task. Our findings show that, although the ranking capabilities of LLMs are not yet on par with AIDT or human efforts, the RAG architecture can achieve a decent performance and is good at providing explanations for the package choices in the rankings. The latter feature makes it more transparent than AIDT and, thus, potentially more flexible to support developers’ tasks. \u0000 \u0000 \u0000","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"56 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141818051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A growing number of projects from various areas have recently incorporated support for io_uring, a novel technique to reduce system calls and accelerate processing capabilities in network services. This new approach promises to yield benefits within the context of modern infrastructure patterns, such as those embracing the service mesh paradigm. Among these projects, Envoy Proxy has been in the process of gaining io_uring support. An initial experimental trial using Envoy with io_uring reports a 10% increase in bandwidth along with a 10% reduction in latency. Unfortunately there is scarce companion data to support the results and the corresponding communication protocols that were used, all of which would have been quite useful to facilitate the reproducibility of these experiences. Therefore, the main contribution of the present study aims to measure and systematise the impact of io_uring in an Envoy-based service mesh using our proposed matrix of operations and protocols. We have also designed a measurement strategy which is composed of key metrics to assess the impact of io_uring. Our test results show improvements reducing latency and increasing bandwidth. More specifically, for HTTP/1 the obtained results are on par with the initial claims whereas for HTTP/2 they are better than the previous study.
{"title":"On the Measurement of io_uring Performance: a Strategy and Experience in the Envoy Service Mesh","authors":"Lucas O. Martínez, Raúl Gutierrez, Luca Cernuzzi","doi":"10.19153/cleiej.27.2.3","DOIUrl":"https://doi.org/10.19153/cleiej.27.2.3","url":null,"abstract":"\u0000 \u0000 \u0000 \u0000A growing number of projects from various areas have recently incorporated support for io_uring, a novel technique to reduce system calls and accelerate processing capabilities in network services. This new approach promises to yield benefits within the context of modern infrastructure patterns, such as those embracing the service mesh paradigm. Among these projects, Envoy Proxy has been in the process of gaining io_uring support. An initial experimental trial using Envoy with io_uring reports a 10% increase in bandwidth along with a 10% reduction in latency. Unfortunately there is scarce companion data to support the results and the corresponding communication protocols that were used, all of which would have been quite useful to facilitate the reproducibility of these experiences. Therefore, the main contribution of the present study aims to measure and systematise the impact of io_uring in an Envoy-based service mesh using our proposed matrix of operations and protocols. We have also designed a measurement strategy which is composed of key metrics to assess the impact of io_uring. Our test results show improvements reducing latency and increasing bandwidth. More specifically, for HTTP/1 the obtained results are on par with the initial claims whereas for HTTP/2 they are better than the previous study. \u0000 \u0000 \u0000 \u0000","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"91 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141818628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In light of escalating concerns over climate change, harnessing oceanic data becomes increasingly urgent. Oceans serve as linchpins in understanding the intricate dynamics governing climate phenomena, exerting pivotal influence over global weather patterns and ecological systems. Despite scientific consensus on climate change impacts, including temperature shifts and acidification, a lack of data infrastructure hampers understanding marine ecosystems.This paper presents an adaptive control system for autonomous sailboats that aims to navigate efficiently in varied conditions by favoring the acquisition of oceanographic data. Combining reinforcement and imitation learning, the controller emulates human decision-making, enabling robust navigation. While showcasing promising results, challenges persist in adverse varied conditions. This challenge is exacerbated when confronting necessitating adaptive control mechanisms resilient to wear and tear.Simulators are vital for training due to the need for vast data volumes. Real-world data collection is costly and risky, while simulations accelerate learning. This study employs a simulator operating at ten times real-time speed, significantly simplifying scenario generation by adjusting factors such as sailboat position, orientation, target location, water current, and wind.Nevertheless, this novel approach signifies progress in addressing climate challenges and advancing oceanic research, using advanced computational methods
{"title":"Simulation-based Reinforcement and Imitation Learning for Autonomous Sailboat Navigation in Variable Environmental Conditions","authors":"Agustín Rieppi, Florencia Rieppi, Mercedes Marzoa, Gonzalo Tejera","doi":"10.19153/cleiej.27.2.5","DOIUrl":"https://doi.org/10.19153/cleiej.27.2.5","url":null,"abstract":"In light of escalating concerns over climate change, harnessing oceanic data becomes increasingly urgent. Oceans serve as linchpins in understanding the intricate dynamics governing climate phenomena, exerting pivotal influence over global weather patterns and ecological systems. Despite scientific consensus on climate change impacts, including temperature shifts and acidification, a lack of data infrastructure hampers understanding marine ecosystems.This paper presents an adaptive control system for autonomous sailboats that aims to navigate efficiently in varied conditions by favoring the acquisition of oceanographic data. Combining reinforcement and imitation learning, the controller emulates human decision-making, enabling robust navigation. While showcasing promising results, challenges persist in adverse varied conditions. This challenge is exacerbated when confronting necessitating adaptive control mechanisms resilient to wear and tear.Simulators are vital for training due to the need for vast data volumes. Real-world data collection is costly and risky, while simulations accelerate learning. This study employs a simulator operating at ten times real-time speed, significantly simplifying scenario generation by adjusting factors such as sailboat position, orientation, target location, water current, and wind.Nevertheless, this novel approach signifies progress in addressing climate challenges and advancing oceanic research, using advanced computational methods","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"99 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141818674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preface to the CLEI 2023 Special Issue","authors":"Hernán Astudillo, Carlos Luna, José Miguel Rojas","doi":"10.19153/cleiej.27.2.1","DOIUrl":"https://doi.org/10.19153/cleiej.27.2.1","url":null,"abstract":"","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"44 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141818154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Francisco Leonardo Ponce Mella, J. Soldani, Carla Taramasco, Hernán Astudillo, Antonio Brogi
Microservices gained momentum in enterprise IT, as they enable building cloud-native applications. At the same time, they come with new security challenges, including security smells, viz., symptoms of bad (though often unintentional) design decisions that might affect application security. This study aims to explore the impacts of microservice security smells –and of the refactorings known to mitigate their effects– beyond security. In particular, we systematically elicit possible impacts of smells and refactorings on applications’ maintainability, performance efficiency, and adherence to microservices’ key design principles. We then validate the elicited impacts through an online survey targeting experienced practitioners and researchers. Our main contributions include 35 validated impacts and a discussion of the survey results geared towards analyzing the (mis)alignment between practitioners and researchers. Finally, we also provide a holistic view of these impacts, through Softgoal Interdependency Graphs (SIGs).
微服务在企业 IT 领域的发展势头迅猛,因为它们能够构建云原生应用程序。与此同时,微服务也带来了新的安全挑战,包括安全隐患,即可能影响应用程序安全的不良(尽管通常是无意的)设计决策的症状。本研究旨在探索微服务安全气味的影响--以及已知可减轻其影响的重构--的安全性之外的影响。特别是,我们将系统地引出安全漏洞和重构对应用程序可维护性、性能效率以及遵守微服务关键设计原则的可能影响。然后,我们通过一项针对经验丰富的从业人员和研究人员的在线调查来验证所得出的影响。我们的主要贡献包括 35 项经过验证的影响,以及对调查结果的讨论,旨在分析从业人员和研究人员之间的(误)协调。最后,我们还通过软目标相互依存图(Softgoal Interdependency Graphs,SIGs)提供了这些影响的整体视图。
{"title":"Beyond Security: Understanding the Multiple Impacts of Security Smells for Microservices","authors":"Francisco Leonardo Ponce Mella, J. Soldani, Carla Taramasco, Hernán Astudillo, Antonio Brogi","doi":"10.19153/cleiej.27.2.6","DOIUrl":"https://doi.org/10.19153/cleiej.27.2.6","url":null,"abstract":"Microservices gained momentum in enterprise IT, as they enable building cloud-native applications. At the same time, they come with new security challenges, including security smells, viz., symptoms of bad (though often unintentional) design decisions that might affect application security. This study aims to explore the impacts of microservice security smells –and of the refactorings known to mitigate their effects– beyond security. In particular, we systematically elicit possible impacts of smells and refactorings on applications’ maintainability, performance efficiency, and adherence to microservices’ key design principles. We then validate the elicited impacts through an online survey targeting experienced practitioners and researchers. Our main contributions include 35 validated impacts and a discussion of the survey results geared towards analyzing the (mis)alignment between practitioners and researchers. Finally, we also provide a holistic view of these impacts, through Softgoal Interdependency Graphs (SIGs).","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"87 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141818736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
José Aguilar, Jairo Fuentes, E. Montoya, W. Hoyos, Diego Benito
the concept of digital transformation involves exploiting digital technologies to generate new ways of doing things in organizations, including the creation of new processes, models, and services that produce value based on the digitization of data and processes. The application of digital technologies enables organizations to develop capabilities for innovation, automation, etc., utilizing both established and emerging technologies, including the widespread use of artificial intelligence. This article proposes the implementation of Fuzzy Cognitive Maps (FCMs) based on experts and data for the evaluation of the level of digital transformation in MSMEs (Micro, Small and Medium Enterprises). Additionally, this work carries out an explainability analysis of the evaluation models based on FCMs. The main digital transformation variables used to define our FCMs were classified into five groups, based on the COBIT standard: i) Organization and Culture variables related to strategies, way of working, and ecosystems, ii) Customer variables related to services and digital channels and products, iii) Operations and Internal Processes variables related to supply chain, suppliers, and business model, iv) Information Technologies variables related to innovation, digitization, data and analytic. Finally, the fifth type of variable is the target, which indicates the level of digital transformation of the organization. Our model managed to specify with 99.4% the level of digital transformation of the organization. Furthermore, the explanatory capacity of the FCMs developed in this work was explored using different explainability methods, some general and others specific to the FCMs. In general, the results obtained in the work are very encouraging since the quality metrics obtained with the evaluation models are very good, almost always higher than 90%; and the explanations obtained with the explainability methods allow for an in-depth analysis of the behavior of the variables in the results obtained, something very important to understand how to improve the levels of digital transformation in organizations.
{"title":"Explainability Analysis of the Evaluation Model of the Level of Digital Transformation in MSMEs based on Fuzzy Cognitive Maps","authors":"José Aguilar, Jairo Fuentes, E. Montoya, W. Hoyos, Diego Benito","doi":"10.19153/cleiej.27.2.2","DOIUrl":"https://doi.org/10.19153/cleiej.27.2.2","url":null,"abstract":"the concept of digital transformation involves exploiting digital technologies to generate new ways of doing things in organizations, including the creation of new processes, models, and services that produce value based on the digitization of data and processes. The application of digital technologies enables organizations to develop capabilities for innovation, automation, etc., utilizing both established and emerging technologies, including the widespread use of artificial intelligence. This article proposes the implementation of Fuzzy Cognitive Maps (FCMs) based on experts and data for the evaluation of the level of digital transformation in MSMEs (Micro, Small and Medium Enterprises). Additionally, this work carries out an explainability analysis of the evaluation models based on FCMs. The main digital transformation variables used to define our FCMs were classified into five groups, based on the COBIT standard: i) Organization and Culture variables related to strategies, way of working, and ecosystems, ii) Customer variables related to services and digital channels and products, iii) Operations and Internal Processes variables related to supply chain, suppliers, and business model, iv) Information Technologies variables related to innovation, digitization, data and analytic. Finally, the fifth type of variable is the target, which indicates the level of digital transformation of the organization. Our model managed to specify with 99.4% the level of digital transformation of the organization. Furthermore, the explanatory capacity of the FCMs developed in this work was explored using different explainability methods, some general and others specific to the FCMs. In general, the results obtained in the work are very encouraging since the quality metrics obtained with the evaluation models are very good, almost always higher than 90%; and the explanations obtained with the explainability methods allow for an in-depth analysis of the behavior of the variables in the results obtained, something very important to understand how to improve the levels of digital transformation in organizations.","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"53 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141817974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study presents progress in revising curriculum of the Cyber Security course by integrating international security certifications from Cisco, ECCouncil and ISACA in a vocational education. The main objective of establishing a new Cyber Security curriculum is to improve the quality of learning materials and updating its contents in order to enhance student competitive advantages at international levels. Considering the issue involves multi criteria perspectives, the study proposes the application of Ternary Analytic Hierarchy Process (Ternary AHP) technique as a novel approach in dealing with the problem. Final result suggests selecting 14 topics from Cisco, ECCouncil and ISACA for the formation of the new curriculum of Cyber Security course.
{"title":"The Application of Ternary AHP in Adopting Security Certifications into Vocational Cyber Security Course","authors":"Irfan Syamsuddin, Alimin Daude, David Al-Dabass","doi":"10.19153/cleiej.26.2.8","DOIUrl":"https://doi.org/10.19153/cleiej.26.2.8","url":null,"abstract":"This study presents progress in revising curriculum of the Cyber Security course by integrating international security certifications from Cisco, ECCouncil and ISACA in a vocational education. The main objective of establishing a new Cyber Security curriculum is to improve the quality of learning materials and updating its contents in order to enhance student competitive advantages at international levels. Considering the issue involves multi criteria perspectives, the study proposes the application of Ternary Analytic Hierarchy Process (Ternary AHP) technique as a novel approach in dealing with the problem. Final result suggests selecting 14 topics from Cisco, ECCouncil and ISACA for the formation of the new curriculum of Cyber Security course.","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136060463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}