首页 > 最新文献

Acta Informatica Pragensia最新文献

英文 中文
Use of FURIA for Improving Task Mining 使用FURIA改进任务挖掘
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-07-02 DOI: 10.18267/j.aip.183
P. Průcha, Jan Skrbek
Companies that use robotic process automation very often deal with the problem of selecting a suitable process for automation. Manual selection of a suitable process is very time-consuming. Therefore, part of the process mining field specializes in selecting suitable processes for automation based on process data. This work deals with the possibility of improving the existing method for finding suitable candidates for automation. To improve the current approach, we remove the limiting restrictions of the current method and use another FURIA rule-learning algorithm for rule detection. We use three different datasets and the WEKA platform to validate the results. The results show that FURIA and the removal of strictly deterministic rules as restrictions turned out to be a competitive approach to the original one. On data presented in this study, the selected approach detected more candidates for automation and with higher accuracy. This study implies that FURIA and not using a strictly deterministic process is an appropriate procedure with certain use cases as other procedures mentioned in this study.
使用机器人流程自动化的公司经常要处理选择合适的流程进行自动化的问题。手动选择合适的流程非常耗时。因此,流程挖掘领域的一部分专门根据流程数据选择合适的流程进行自动化。这项工作探讨了改进现有方法以寻找合适的自动化候选人的可能性。为了改进现有方法,我们取消了现有方法的限制,并使用另一种FURIA规则学习算法进行规则检测。我们使用三个不同的数据集和WEKA平台来验证结果。结果表明,FURIA和取消严格确定性规则作为限制是对原始方法的一种竞争方法。根据本研究中提供的数据,所选方法检测到更多的自动化候选者,并且具有更高的准确性。本研究表明,与本研究中提到的其他程序一样,FURIA和不使用严格确定性程序是一种适当的程序,具有某些用例。
{"title":"Use of FURIA for Improving Task Mining","authors":"P. Průcha, Jan Skrbek","doi":"10.18267/j.aip.183","DOIUrl":"https://doi.org/10.18267/j.aip.183","url":null,"abstract":"Companies that use robotic process automation very often deal with the problem of selecting a suitable process for automation. Manual selection of a suitable process is very time-consuming. Therefore, part of the process mining field specializes in selecting suitable processes for automation based on process data. This work deals with the possibility of improving the existing method for finding suitable candidates for automation. To improve the current approach, we remove the limiting restrictions of the current method and use another FURIA rule-learning algorithm for rule detection. We use three different datasets and the WEKA platform to validate the results. The results show that FURIA and the removal of strictly deterministic rules as restrictions turned out to be a competitive approach to the original one. On data presented in this study, the selected approach detected more candidates for automation and with higher accuracy. This study implies that FURIA and not using a strictly deterministic process is an appropriate procedure with certain use cases as other procedures mentioned in this study.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46371308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving Privacy-preserving Healthcare Data Sharing in a Cloud Environment Using Hybrid Encryption 使用混合加密改进云环境中保护隐私的医疗保健数据共享
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-06-16 DOI: 10.18267/j.aip.182
Insaf Boumezbeur, K. Zarour
In recent years, cloud computing has been widely used in various fields and is gaining importance in healthcare systems. Patients’ health data are outsourced to cloud storage, enabling healthcare professionals to easily access health information from anywhere and at any time to improve health services. Once patient data are stored in the cloud, they are vulnerable to attacks such as data loss, denial of service (DoS), distributed denial of service (DDoS) and other sorts of cyberattacks. Data confidentiality and patient privacy are more of a problem in the cloud computing context due to their public availability. If a patient's personal information is stolen, he or she may face a range of problems. These are concerns that necessitate more security. The transmission of this sensitive information over the internet is always susceptible to hacking. Therefore, the privacy of patients’ data is considered one of healthcare organizations’ main issues. To overcome this problem, encryption mechanisms that place a significant emphasis on securing data within the cloud environment are used to preserve sensitive health data. A hybrid cryptography approach is employed in this paper to ensure the secure sharing of health data over the cloud. To maintain data privacy and secrecy, a hybrid cryptography mechanism for storing and transporting data to and from the cloud is used. To protect data from malevolent insiders, the encryption key is separated into two halves, controlling access to patient records via a specific technique. This paper shows the implementation and performance evaluation of the proposal as a functional system prototype. The evaluation is based on the key generation time, the record encryption time, the record decryption time, the record upload time and the record download time for different user numbers and different file sizes varying from 0.1 MB to 500 MB. The findings show that the proposal performs better than other state-of-the-art systems and can practically share secure health data in cloud environments.
近年来,云计算在各个领域得到了广泛应用,并在医疗保健系统中越来越重要。患者的健康数据外包到云存储,使医疗保健专业人员能够随时随地轻松访问健康信息,以改善健康服务。一旦患者数据存储在云中,他们就很容易受到攻击,如数据丢失、拒绝服务(DoS)、分布式拒绝服务(DDoS)和其他类型的网络攻击。数据保密性和患者隐私在云计算环境中更是一个问题,因为它们是公开的。如果患者的个人信息被盗,他或她可能会面临一系列问题。这些问题需要加强安全。通过互联网传输这些敏感信息总是容易受到黑客攻击。因此,患者数据的隐私被认为是医疗机构的主要问题之一。为了克服这个问题,使用了非常重视云环境中数据安全的加密机制来保存敏感的健康数据。本文采用了一种混合密码学方法来确保云上健康数据的安全共享。为了维护数据的隐私和保密性,使用了一种混合密码机制来存储数据和从云中传输数据。为了保护数据不受恶意内部人员的攻击,加密密钥分为两半,通过特定技术控制对患者记录的访问。本文展示了该方案作为功能系统原型的实施和性能评估。评估基于密钥生成时间、记录加密时间、记录解密时间、记录上传时间和记录下载时间,用于不同的用户编号和从0.1MB到500MB不等的不同文件大小。研究结果表明,该提案的性能优于其他最先进的系统,并且可以在云环境中共享安全的健康数据。
{"title":"Improving Privacy-preserving Healthcare Data Sharing in a Cloud Environment Using Hybrid Encryption","authors":"Insaf Boumezbeur, K. Zarour","doi":"10.18267/j.aip.182","DOIUrl":"https://doi.org/10.18267/j.aip.182","url":null,"abstract":"In recent years, cloud computing has been widely used in various fields and is gaining importance in healthcare systems. Patients’ health data are outsourced to cloud storage, enabling healthcare professionals to easily access health information from anywhere and at any time to improve health services. Once patient data are stored in the cloud, they are vulnerable to attacks such as data loss, denial of service (DoS), distributed denial of service (DDoS) and other sorts of cyberattacks. Data confidentiality and patient privacy are more of a problem in the cloud computing context due to their public availability. If a patient's personal information is stolen, he or she may face a range of problems. These are concerns that necessitate more security. The transmission of this sensitive information over the internet is always susceptible to hacking. Therefore, the privacy of patients’ data is considered one of healthcare organizations’ main issues. To overcome this problem, encryption mechanisms that place a significant emphasis on securing data within the cloud environment are used to preserve sensitive health data. A hybrid cryptography approach is employed in this paper to ensure the secure sharing of health data over the cloud. To maintain data privacy and secrecy, a hybrid cryptography mechanism for storing and transporting data to and from the cloud is used. To protect data from malevolent insiders, the encryption key is separated into two halves, controlling access to patient records via a specific technique. This paper shows the implementation and performance evaluation of the proposal as a functional system prototype. The evaluation is based on the key generation time, the record encryption time, the record decryption time, the record upload time and the record download time for different user numbers and different file sizes varying from 0.1 MB to 500 MB. The findings show that the proposal performs better than other state-of-the-art systems and can practically share secure health data in cloud environments.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45098146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring Facebook Identity Construction of Vietnamese Netizens 越南网民脸书身份建构探析
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-05-21 DOI: 10.18267/j.aip.181
Hai Chung Pham, Lien Nguyen, Phuong Tran, T. Tran
Studying the ways in which people construct their identities in online environments is a pressing contemporary concern. The research reported in this article was designed to examine the uses of, and influences on, Vietnamese respondents’ identity formation on Facebook. Data were collected by means of a social survey and the application of the Zaltman metaphor elicitation technique, a procedure that searches fo r customers’ thoughts and emotions by digging deep into the visual and non -visual illustrations that customers collect or make on their own. The findings show how Vietnamese Facebook users present themselves and how they thereby facilitate their self-expansion and maintain their sense of self-esteem. According to the analysis, it can be suggested that Facebook is where adults portray their socially conformed versions against social reflection. They use this platform to seek validation, demonstrate their professional side to make them look better in the eyes of society. Drivers of online identity formation are revealed through negotiating with conflicts in their existing identities. The level of self-modification amongst respondents is adjusted in relation to their social vigilance, conformity and motivations in and between social categorization.
研究人们在网络环境中构建身份的方式是当代迫切需要关注的问题。本文报道的这项研究旨在调查越南受访者在脸书上的身份形成的用途和影响。数据是通过社会调查和应用Zaltman隐喻启发技术收集的,这是一种通过深入挖掘客户自己收集或制作的视觉和非视觉插图来搜索客户想法和情绪的过程。研究结果显示了越南脸书用户如何展示自己,以及他们如何促进自我扩张和保持自尊。根据分析,可以认为,在Facebook上,成年人描绘了他们与社会一致的版本,以对抗社会反思。他们利用这个平台寻求认可,展示自己专业的一面,让自己在社会眼中看起来更好。网络身份形成的驱动因素是通过与现有身份中的冲突进行谈判来揭示的。受访者的自我修正水平是根据他们在社会分类中的社会警惕性、一致性和动机进行调整的。
{"title":"Exploring Facebook Identity Construction of Vietnamese Netizens","authors":"Hai Chung Pham, Lien Nguyen, Phuong Tran, T. Tran","doi":"10.18267/j.aip.181","DOIUrl":"https://doi.org/10.18267/j.aip.181","url":null,"abstract":"Studying the ways in which people construct their identities in online environments is a pressing contemporary concern. The research reported in this article was designed to examine the uses of, and influences on, Vietnamese respondents’ identity formation on Facebook. Data were collected by means of a social survey and the application of the Zaltman metaphor elicitation technique, a procedure that searches fo r customers’ thoughts and emotions by digging deep into the visual and non -visual illustrations that customers collect or make on their own. The findings show how Vietnamese Facebook users present themselves and how they thereby facilitate their self-expansion and maintain their sense of self-esteem. According to the analysis, it can be suggested that Facebook is where adults portray their socially conformed versions against social reflection. They use this platform to seek validation, demonstrate their professional side to make them look better in the eyes of society. Drivers of online identity formation are revealed through negotiating with conflicts in their existing identities. The level of self-modification amongst respondents is adjusted in relation to their social vigilance, conformity and motivations in and between social categorization.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44938528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incremental Model Transformation with Epsilon in Model-Driven Engineering 模型驱动工程中基于Epsilon的增量模型转换
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-04-27 DOI: 10.18267/j.aip.179
Marzieh Ghorbani, Mohammadreza Sharbaf, B. Zamani
Model-Driven Engineering (MDE) is a software development paradigm that uses models as the main artifacts in the development process. MDE uses model transformations to propagate changes between source and target models. In some development scenarios, target models should be updated based on the evolution of source models. In such cases, it is required to re-execute all transformation rules to update the target model. Incremental execution of transformations, which partially executes the transformation rules, is a solution to this problem. The Epsilon Transformation Language (ETL) is a well-known model transformation language that does not support incremental executions. In this paper, we propose an approach to support the incremental execution of ETL transformations. Our proposal includes a process, as well as a prototype, to propagate changes to the target model. In the proposed approach, all the changes in the source model are detected to identify and re-execute the rules which deal with computing the required elements for updating the target model. We evaluated the correctness and performance of our approach by means of a case study. Compared to the standard ETL, the results are promising regarding the correctness of target models as well as faster execution of the transformation.
模型驱动工程(MDE)是一种软件开发范式,它使用模型作为开发过程中的主要工件。MDE使用模型转换在源模型和目标模型之间传播更改。在某些开发场景中,应该根据源模型的演变来更新目标模型。在这种情况下,需要重新执行所有转换规则来更新目标模型。转换的增量执行(部分执行转换规则)就是这个问题的解决方案。Epsilon转换语言(ETL)是一种众所周知的模型转换语言,它不支持增量执行。在本文中,我们提出了一种支持ETL转换增量执行的方法。我们的提案包括一个过程以及一个原型,用于将更改传播到目标模型。在所提出的方法中,检测源模型中的所有变化,以识别并重新执行处理计算更新目标模型所需元素的规则。我们通过案例研究评估了我们方法的正确性和性能。与标准ETL相比,在目标模型的正确性以及转换的更快执行方面,结果是有希望的。
{"title":"Incremental Model Transformation with Epsilon in Model-Driven Engineering","authors":"Marzieh Ghorbani, Mohammadreza Sharbaf, B. Zamani","doi":"10.18267/j.aip.179","DOIUrl":"https://doi.org/10.18267/j.aip.179","url":null,"abstract":"Model-Driven Engineering (MDE) is a software development paradigm that uses models as the main artifacts in the development process. MDE uses model transformations to propagate changes between source and target models. In some development scenarios, target models should be updated based on the evolution of source models. In such cases, it is required to re-execute all transformation rules to update the target model. Incremental execution of transformations, which partially executes the transformation rules, is a solution to this problem. The Epsilon Transformation Language (ETL) is a well-known model transformation language that does not support incremental executions. In this paper, we propose an approach to support the incremental execution of ETL transformations. Our proposal includes a process, as well as a prototype, to propagate changes to the target model. In the proposed approach, all the changes in the source model are detected to identify and re-execute the rules which deal with computing the required elements for updating the target model. We evaluated the correctness and performance of our approach by means of a case study. Compared to the standard ETL, the results are promising regarding the correctness of target models as well as faster execution of the transformation.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44508776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comments on Copyright Aspects of Use of Copyright Works in Digital Teaching 浅谈数字教学中版权作品使用的版权问题
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-04-07 DOI: 10.18267/j.aip.178
Martin Boháček
In the current COVID-19 pandemic, teachers and students routinely take part in schooling via digital technologies, using their own and other authors' copyrighted works, even without their permission or licence. The aim of this article is to identify these aspects of copyright in online teaching and to offer solutions to them. Some of these aspects are addressed by EU Directive No. 2019/790 (Digital Directive), the implementation of which was reflected in the draft amendment to the Czech Copyright Act, which had not addressed them. To fulfil this goal, the author asked several research questions: What forms of use of copyright works refer to the terms e-learning, online teaching or digital teaching? Is it possible to apply a statutory teaching exemption to the use of copyright works of other authors without their consent under the current wording of the Copyright Act (AutZ)? Is there any case law regarding such an exemption that would be applicable to e-learning? How will the conditions for the use of copyright works in e-learning change with the AutZ amendment following the implementation of EU Directive No. 2019/790 (Digital Directive) and what practical organizational recommendations can be made? To the above goal and questions, we conducted research in Czech law relating to the use of copyright works in digital teaching. For this purpose, we used the method of empirical research of Czech legislation and case law containing the terms e-learning and online or digital teaching. We also employed a comparative method to compare Czech law and EU law. The article is primarily an overview with elements of reflection. It does not comprehensively address all aspects of copyright in teaching, such as plagiarism in general, but identifies copyright aspects specific to e-learning. Copyright: © 2022 by the author(s).
在当前的新冠肺炎大流行中,教师和学生通常通过数字技术参加学校教育,使用自己和其他作者的版权作品,即使没有他们的许可或执照。本文的目的是识别在线教学中版权的这些方面,并提出解决方案。其中一些方面由欧盟第2019/790号指令(数字指令)解决,该指令的实施反映在捷克《版权法》修正案草案中,但该修正案没有解决这些问题。为了实现这一目标,作者提出了几个研究问题:版权作品的使用形式是指电子学习、在线教学还是数字教学?根据《版权法》(AutZ)的现行措辞,是否有可能在未经其他作者同意的情况下对其版权作品的使用适用法定教学豁免?是否有适用于电子学习的关于此类豁免的判例法?随着欧盟第2019/790号指令(数字指令)的实施,AutZ修正案将如何改变电子学习中使用版权作品的条件,以及可以提出哪些实用的组织建议?针对上述目标和问题,我们在捷克法律中对数字教学中使用版权作品进行了研究。为此,我们使用了捷克立法和案例法的实证研究方法,其中包含电子学习和在线或数字教学这两个术语。我们还采用比较法对捷克法律和欧盟法律进行了比较。这篇文章主要是一篇包含反思元素的综述。它并没有全面解决教学中版权的所有方面,例如一般的剽窃,而是确定了电子学习特有的版权方面。版权所有:©2022,作者所有。
{"title":"Comments on Copyright Aspects of Use of Copyright Works in Digital Teaching","authors":"Martin Boháček","doi":"10.18267/j.aip.178","DOIUrl":"https://doi.org/10.18267/j.aip.178","url":null,"abstract":"In the current COVID-19 pandemic, teachers and students routinely take part in schooling via digital technologies, using their own and other authors' copyrighted works, even without their permission or licence. The aim of this article is to identify these aspects of copyright in online teaching and to offer solutions to them. Some of these aspects are addressed by EU Directive No. 2019/790 (Digital Directive), the implementation of which was reflected in the draft amendment to the Czech Copyright Act, which had not addressed them. To fulfil this goal, the author asked several research questions: What forms of use of copyright works refer to the terms e-learning, online teaching or digital teaching? Is it possible to apply a statutory teaching exemption to the use of copyright works of other authors without their consent under the current wording of the Copyright Act (AutZ)? Is there any case law regarding such an exemption that would be applicable to e-learning? How will the conditions for the use of copyright works in e-learning change with the AutZ amendment following the implementation of EU Directive No. 2019/790 (Digital Directive) and what practical organizational recommendations can be made? To the above goal and questions, we conducted research in Czech law relating to the use of copyright works in digital teaching. For this purpose, we used the method of empirical research of Czech legislation and case law containing the terms e-learning and online or digital teaching. We also employed a comparative method to compare Czech law and EU law. The article is primarily an overview with elements of reflection. It does not comprehensively address all aspects of copyright in teaching, such as plagiarism in general, but identifies copyright aspects specific to e-learning. Copyright: © 2022 by the author(s).","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49643656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preservation and Access Control for Sharing Electronic Health Records Using Blockchain Technology 使用区块链技术共享电子健康记录的隐私保护和访问控制
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-03-13 DOI: 10.18267/j.aip.176
Insaf Boumezbeur, K. Zarour
Sharing of Electronic Health Records (EHRs) is of significant importance in health care. Lately, a cloudbased electronic health record sharing scheme has been used extensively to share patient records among various healthcare organizations. However, cloud centralization may compromise patients’ privacy and security. Due to the special features of blockchain, it is important to see this technology as a promising solution to resolve these issues. This article proposes a privacy-preserving, secure EHR sharing and access control framework based on blockchain technology. The proposal aims to implement EHR blockchain technology and ensure that electronic records are stored safely by specifying user access permissions. We emulate the cryptographic primitives and use smart contracts to describe the relationships between the EHR owner and EHR user through the proposed system on the Ethereum blockchain. We assess the proposal results based on encryption and decryption time and the costs of the smart contract. The encryption and decryption times are proportional to the size of the EHR, which varies from 128 KB to 128 MB. When it comes to encryption, the smallest EHR takes 0.0012 s to encrypt, while the largest EHR, which is 128 MB, takes 1.4149 s. On the other hand, a 128 KB EHR takes 0.0013 s to decrypt, whereas a 128 MB EHR requires 1.6284 s. As a result, performance evaluation and security analysis confirm that the proposal is secure for practical application.
电子健康记录的共享在医疗保健中具有重要意义。最近,基于云的电子健康记录共享方案已被广泛用于在各种医疗保健组织之间共享患者记录。然而,云集中可能会损害患者的隐私和安全。由于区块链的特殊性,重要的是要将该技术视为解决这些问题的有前景的解决方案。本文提出了一个基于区块链技术的隐私保护、安全的EHR共享和访问控制框架。该提案旨在实施EHR区块链技术,并通过指定用户访问权限来确保电子记录的安全存储。我们在以太坊区块链上模拟加密原语,并使用智能合约来描述EHR所有者和EHR用户之间的关系。我们根据加密和解密时间以及智能合约的成本来评估提案结果。加密和解密时间与EHR的大小成比例,从128KB到128MB不等。当谈到加密时,最小的EHR需要0.0012秒来加密,而最大的EHR(128 MB)需要1.4149秒。另一方面,128 KB的EHR解密需要0.0013秒,而128 MB的EHR则需要1.6284秒。因此,性能评估和安全分析证实了该方案在实际应用中是安全的。
{"title":"Privacy Preservation and Access Control for Sharing Electronic Health Records Using Blockchain Technology","authors":"Insaf Boumezbeur, K. Zarour","doi":"10.18267/j.aip.176","DOIUrl":"https://doi.org/10.18267/j.aip.176","url":null,"abstract":"Sharing of Electronic Health Records (EHRs) is of significant importance in health care. Lately, a cloudbased electronic health record sharing scheme has been used extensively to share patient records among various healthcare organizations. However, cloud centralization may compromise patients’ privacy and security. Due to the special features of blockchain, it is important to see this technology as a promising solution to resolve these issues. This article proposes a privacy-preserving, secure EHR sharing and access control framework based on blockchain technology. The proposal aims to implement EHR blockchain technology and ensure that electronic records are stored safely by specifying user access permissions. We emulate the cryptographic primitives and use smart contracts to describe the relationships between the EHR owner and EHR user through the proposed system on the Ethereum blockchain. We assess the proposal results based on encryption and decryption time and the costs of the smart contract. The encryption and decryption times are proportional to the size of the EHR, which varies from 128 KB to 128 MB. When it comes to encryption, the smallest EHR takes 0.0012 s to encrypt, while the largest EHR, which is 128 MB, takes 1.4149 s. On the other hand, a 128 KB EHR takes 0.0013 s to decrypt, whereas a 128 MB EHR requires 1.6284 s. As a result, performance evaluation and security analysis confirm that the proposal is secure for practical application.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42624858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Call for Special Issue Papers: Sustainable Solutions for Internet of Things Using Artificial Intelligence and Blockchain in Future Networks 特刊论文征集:未来网络中使用人工智能和区块链的物联网可持续解决方案
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-03-13 DOI: 10.18267/j.aip.177
Venkatachalam Kandasamy, M. Abouhawwash, N. Bačanin
ing and Indexing: Scopus (Elsevier), DBLP Computer Science Bibliography, RSCI – Russian Science Citation Index, Open J-Gate, CEEOL, ERIH PLUS, DOAJ and other databases. Acta Informatica Pragensia Volume 11, 2022 https://doi.org/10.18267/j.aip.177 148 Notes for prospective authors Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. All papers must be submitted online. To submit a paper, please read our Submitting articles page. When you are submitting a manuscript, please select the “Special issue” option in “Section”. If you have any suggestions or questions regarding the subject matter, please contact the special issue editor Venkatachalam Kandasamy (venkatachalam.k@ieee.org). Before submitting your paper, please make sure you carefully read the instructions to authors. The journal has no strict formatting requirements on submission. There is no restriction on the length of manuscripts. Accepted articles will be published immediately on the journal website with a digital object identifier (DOI) prior to the release of the special issue. Important dates: Deadline for manuscript submissions: 31 October 2022 Notification to authors within four weeks. Special issue will be published in December 2022. Visit the instructions for authors Submit your paper for peer review online
编制和索引:Scopus(爱思唯尔)、DBLP计算机科学书目、RSCI——俄罗斯科学引文索引、Open J-Gate、CEEOL、ERIH PLUS、DOAJ等数据库。Pragensia信息学报2022年第11卷https://doi.org/10.18267/j.aip.177148潜在作者须知提交的论文以前不应发表,目前也不应考虑在其他地方发表。所有论文必须在线提交。要提交论文,请阅读我们的提交文章页面。当您提交稿件时,请在“部分”中选择“特刊”选项。如果您对主题有任何建议或问题,请联系特刊编辑Venkatachalam Kandasamy(venkatachalam.k@ieee.org)。在提交论文之前,请确保仔细阅读作者的说明。该期刊对提交没有严格的格式要求。手稿的篇幅没有限制。被接受的文章将在特刊发行前立即在期刊网站上发布,并附上数字对象标识符(DOI)。重要日期:稿件提交截止日期:2022年10月31日四周内通知作者。特刊将于2022年12月出版。访问作者说明在线提交论文供同行评审
{"title":"Call for Special Issue Papers: Sustainable Solutions for Internet of Things Using Artificial Intelligence and Blockchain in Future Networks","authors":"Venkatachalam Kandasamy, M. Abouhawwash, N. Bačanin","doi":"10.18267/j.aip.177","DOIUrl":"https://doi.org/10.18267/j.aip.177","url":null,"abstract":"ing and Indexing: Scopus (Elsevier), DBLP Computer Science Bibliography, RSCI – Russian Science Citation Index, Open J-Gate, CEEOL, ERIH PLUS, DOAJ and other databases. Acta Informatica Pragensia Volume 11, 2022 https://doi.org/10.18267/j.aip.177 148 Notes for prospective authors Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. All papers must be submitted online. To submit a paper, please read our Submitting articles page. When you are submitting a manuscript, please select the “Special issue” option in “Section”. If you have any suggestions or questions regarding the subject matter, please contact the special issue editor Venkatachalam Kandasamy (venkatachalam.k@ieee.org). Before submitting your paper, please make sure you carefully read the instructions to authors. The journal has no strict formatting requirements on submission. There is no restriction on the length of manuscripts. Accepted articles will be published immediately on the journal website with a digital object identifier (DOI) prior to the release of the special issue. Important dates: Deadline for manuscript submissions: 31 October 2022 Notification to authors within four weeks. Special issue will be published in December 2022. Visit the instructions for authors Submit your paper for peer review online","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48601132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Call for Special Issue Papers: Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems 特刊论文征集:深度学习区块链技术用于改善医疗保健工业系统
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-02-02 DOI: 10.18267/j.aip.175
Mazin Abed Mohammed, Seifedine Kadry, O. Geman
ing and Indexing: Scopus (Elsevier), DBLP Computer Science Bibliography, RSCI – Russian Science Citation Index, Open J-Gate, CEEOL, ERIH PLUS, DOAJ and other databases. Acta Informatica Pragensia Volume 11, 2022 https://doi.org/10.18267/j.aip.175 4 Notes for prospective authors Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. All papers must be submitted online. To submit a paper, please read our Submitting articles page. When you are submitting a manuscript, please select the “Special issue” option in “Section”. If you have any suggestions or questions regarding the subject matter, please contact the special issue editor Mazin Abed Mohammed (mazinalshujeary@uoanbar.edu.iq). Before submitting your paper, please make sure you carefully read the instructions to authors. The journal has no strict formatting requirements on submission. There is no restriction on the length of manuscripts. Accepted articles will be published immediately on the journal website with a digital object identifier (DOI) prior to the release of the special issue.
编制和索引:Scopus(爱思唯尔)、DBLP计算机科学书目、RSCI——俄罗斯科学引文索引、Open J-Gate、CEEOL、ERIH PLUS、DOAJ等数据库。Pragensia信息学报2022年第11卷https://doi.org/10.18267/j.aip.1754潜在作者须知提交的论文以前不应发表,目前也不应考虑在其他地方发表。所有论文必须在线提交。要提交论文,请阅读我们的提交文章页面。当您提交稿件时,请在“部分”中选择“特刊”选项。如果您对本主题有任何建议或问题,请联系特刊编辑Mazin Abed Mohammed(mazinalshujeary@uoanbar.edu.iq)。在提交论文之前,请确保仔细阅读作者的说明。该期刊对提交没有严格的格式要求。手稿的篇幅没有限制。被接受的文章将在特刊发行前立即在期刊网站上发布,并附上数字对象标识符(DOI)。
{"title":"Call for Special Issue Papers: Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems","authors":"Mazin Abed Mohammed, Seifedine Kadry, O. Geman","doi":"10.18267/j.aip.175","DOIUrl":"https://doi.org/10.18267/j.aip.175","url":null,"abstract":"ing and Indexing: Scopus (Elsevier), DBLP Computer Science Bibliography, RSCI – Russian Science Citation Index, Open J-Gate, CEEOL, ERIH PLUS, DOAJ and other databases. Acta Informatica Pragensia Volume 11, 2022 https://doi.org/10.18267/j.aip.175 4 Notes for prospective authors Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. All papers must be submitted online. To submit a paper, please read our Submitting articles page. When you are submitting a manuscript, please select the “Special issue” option in “Section”. If you have any suggestions or questions regarding the subject matter, please contact the special issue editor Mazin Abed Mohammed (mazinalshujeary@uoanbar.edu.iq). Before submitting your paper, please make sure you carefully read the instructions to authors. The journal has no strict formatting requirements on submission. There is no restriction on the length of manuscripts. Accepted articles will be published immediately on the journal website with a digital object identifier (DOI) prior to the release of the special issue.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48302840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CA-BPEL: A New Approach to Facilitate the Development and Execution of Context-Aware Service Orchestrations CA-BPEL:一种促进开发和执行上下文感知服务编排的新方法
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-01-26 DOI: 10.18267/j.aip.174
Hossein Moradi, B. Zamani, K. Zamanifar
The proliferation of smartphones and sensor-based networks has led to a greater need for context-aware applications and pervasive business processes. One of the key approaches that seek to satisfy this need is context-aware service composition. Service composition can be achieved in two ways, i.e., service choreography and service orchestration. Embedding the context into an orchestrated composite service enhances its flexibility, but makes its development and execution more complicated. This study aims to reduce this complexity by introducing the CA-BPEL approach. Our proposed approach enables developers to turn a standard orchestrated service into a context-aware orchestrated service, consistent with the standard WS-BPEL language. This study applies the Design Science Research Methodology, in which we evaluate CA-BPEL by using a tourism demonstration along with the conduction of a usability survey that shows the convenience of the proposed approach. We also compare our proposed approach with 14 related studies. Our investigations suggest that CA-BPEL has much potential to facilitate the development and execution of context-aware service compositions.
智能手机和基于传感器的网络的激增导致了对上下文感知应用程序和普及业务流程的更大需求。寻求满足这种需求的关键方法之一是上下文感知的服务组合。服务组合可以通过两种方式实现,即服务编排和服务编排。将上下文嵌入到编排好的组合服务中可以增强其灵活性,但也会使其开发和执行变得更加复杂。本研究旨在通过引入CA-BPEL方法来降低这种复杂性。我们建议的方法使开发人员能够将标准的编排服务转换为上下文感知的编排服务,并与标准WS-BPEL语言保持一致。本研究应用了设计科学研究方法,在该方法中,我们通过使用旅游演示以及可用性调查来评估CA-BPEL,该调查显示了所建议方法的便利性。我们还将我们提出的方法与14项相关研究进行了比较。我们的调查表明,CA-BPEL在促进上下文感知服务组合的开发和执行方面具有很大的潜力。
{"title":"CA-BPEL: A New Approach to Facilitate the Development and Execution of Context-Aware Service Orchestrations","authors":"Hossein Moradi, B. Zamani, K. Zamanifar","doi":"10.18267/j.aip.174","DOIUrl":"https://doi.org/10.18267/j.aip.174","url":null,"abstract":"The proliferation of smartphones and sensor-based networks has led to a greater need for context-aware applications and pervasive business processes. One of the key approaches that seek to satisfy this need is context-aware service composition. Service composition can be achieved in two ways, i.e., service choreography and service orchestration. Embedding the context into an orchestrated composite service enhances its flexibility, but makes its development and execution more complicated. This study aims to reduce this complexity by introducing the CA-BPEL approach. Our proposed approach enables developers to turn a standard orchestrated service into a context-aware orchestrated service, consistent with the standard WS-BPEL language. This study applies the Design Science Research Methodology, in which we evaluate CA-BPEL by using a tourism demonstration along with the conduction of a usability survey that shows the convenience of the proposed approach. We also compare our proposed approach with 14 related studies. Our investigations suggest that CA-BPEL has much potential to facilitate the development and execution of context-aware service compositions.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44220908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Praxeological Research Programme of Socio-Informatics - the Siegen School 社会信息学实践研究计划——齐根学派
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-01-22 DOI: 10.18267/j.aip.171
V. Wulf, Anne Weibert, Konstantin Aal, Sarah Rüller, M. Rohde
This paper introduces the praxeologically grounded research programme on socio-informatics developed at the University of Siegen and the International Institute for Socio-Informatics in Germany. We outline our methodological framework of grounded design, guiding and binding together a variety of different engagements in practice which we call design case studies (DCS). While grounded design is applied to a broad variety of different areas, in this paper we deal specifically with our engagements in support of communities and political activists. To exemplify our approach, we present one DCS: It focuses on the participatory development of a computer club in the High Atlas as a facilitation infrastructure to support public community participation in the process of modernization and social transformation in the Maghreb. Insights into the project context, the objectives and methodology and the depiction of some of its first findings lays the ground for the discussion of socio-informatics research principles.
本文介绍了德国锡根大学和国际社会信息学研究所制定的基于实践的社会信息学的研究计划。我们概述了我们的基础设计方法框架,指导并结合了实践中的各种不同活动,我们称之为设计案例研究(DCS)。虽然接地气的设计应用于各种不同的领域,但在本文中,我们专门讨论了我们对社区和政治活动家的支持。为了举例说明我们的方法,我们提出了一个DCS:它侧重于在High Atlas中参与开发一个计算机俱乐部,作为促进基础设施,支持公众社区参与马格里布的现代化和社会转型进程。对项目背景、目标和方法的深入了解,以及对一些最初发现的描述,为讨论社会信息学研究原则奠定了基础。
{"title":"The Praxeological Research Programme of Socio-Informatics - the Siegen School","authors":"V. Wulf, Anne Weibert, Konstantin Aal, Sarah Rüller, M. Rohde","doi":"10.18267/j.aip.171","DOIUrl":"https://doi.org/10.18267/j.aip.171","url":null,"abstract":"This paper introduces the praxeologically grounded research programme on socio-informatics developed at the University of Siegen and the International Institute for Socio-Informatics in Germany. We outline our methodological framework of grounded design, guiding and binding together a variety of different engagements in practice which we call design case studies (DCS). While grounded design is applied to a broad variety of different areas, in this paper we deal specifically with our engagements in support of communities and political activists. To exemplify our approach, we present one DCS: It focuses on the participatory development of a computer club in the High Atlas as a facilitation infrastructure to support public community participation in the process of modernization and social transformation in the Maghreb. Insights into the project context, the objectives and methodology and the depiction of some of its first findings lays the ground for the discussion of socio-informatics research principles.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42545306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Acta Informatica Pragensia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1