首页 > 最新文献

2017 Federated Conference on Computer Science and Information Systems (FedCSIS)最新文献

英文 中文
DNS as resolution infrastructure for persistent identifiers DNS作为持久标识符的解析基础设施
Fatih Berber, R. Yahyapour
The concept of persistent identification is increasingly important for research data management. At the beginnings it was only considered as a persistent naming mechanism for research datasets, which is achieved by providing an abstraction for addresses of research datasets. However, recent developments in research data management have led persistent identification to move towards a concept which realizes a virtual global research data network. The base for this is the ability of persistent identifiers of holding semantic information about the identified dataset itself. Hence, community-specific representations of research datasets are mapped into globally common data structures provided by persistent identifiers. This ultimately enables a standardized data exchange between diverse scientific fields. Therefore, for the immense amount of research datasets, a robust and performant global resolution system is essential. However, for persistent identifiers the number of resolution systems is in comparison to the count of DNS resolvers extremely small. For the Handle System for instance, which is the most established persistent identifier system, there are currently only five globally distributed resolvers available. The fundamental idea of this work is therefore to enable persistent identifier resolution over DNS traffic. On the one side, this leads to a faster resolution of persistent identifiers. On the other side, this approach transforms the DNS system to a data dissemination system.
持久识别的概念对研究数据管理越来越重要。起初,它只是被认为是研究数据集的持久命名机制,这是通过为研究数据集的地址提供抽象来实现的。然而,最近在研究数据管理方面的发展导致了持续的识别,朝着实现虚拟全球研究数据网络的概念迈进。其基础是持久标识符保存有关已标识数据集本身的语义信息的能力。因此,研究数据集的社区特定表示被映射到由持久标识符提供的全球通用数据结构中。这最终使不同科学领域之间的标准化数据交换成为可能。因此,对于大量的研究数据集,一个强大的、高性能的全球分辨率系统是必不可少的。但是,对于持久标识符,解析系统的数量与DNS解析器的数量相比非常少。以Handle System为例,它是最成熟的持久标识符系统,目前只有五个全局分布式解析器可用。因此,这项工作的基本思想是在DNS流量上启用持久的标识符解析。一方面,这可以更快地解析持久标识符。另一方面,这种方法将DNS系统转换为数据分发系统。
{"title":"DNS as resolution infrastructure for persistent identifiers","authors":"Fatih Berber, R. Yahyapour","doi":"10.15439/2017F114","DOIUrl":"https://doi.org/10.15439/2017F114","url":null,"abstract":"The concept of persistent identification is increasingly important for research data management. At the beginnings it was only considered as a persistent naming mechanism for research datasets, which is achieved by providing an abstraction for addresses of research datasets. However, recent developments in research data management have led persistent identification to move towards a concept which realizes a virtual global research data network. The base for this is the ability of persistent identifiers of holding semantic information about the identified dataset itself. Hence, community-specific representations of research datasets are mapped into globally common data structures provided by persistent identifiers. This ultimately enables a standardized data exchange between diverse scientific fields. Therefore, for the immense amount of research datasets, a robust and performant global resolution system is essential. However, for persistent identifiers the number of resolution systems is in comparison to the count of DNS resolvers extremely small. For the Handle System for instance, which is the most established persistent identifier system, there are currently only five globally distributed resolvers available. The fundamental idea of this work is therefore to enable persistent identifier resolution over DNS traffic. On the one side, this leads to a faster resolution of persistent identifiers. On the other side, this approach transforms the DNS system to a data dissemination system.","PeriodicalId":402724,"journal":{"name":"2017 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"12 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120862259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
H.265 inverse transform FPGA implementation in Impulse C H.265逆变换的FPGA实现
Slawomir Cichon, M. Gorgon
High Efficiency Video Coding (HEVC), a modern video compression standard, exceeds the predecessor H.264 in efficiency by 50%, but with cost of increased complexity. It is one of main research topics for FPGA engineers working on image compression algorithms. On the other hand high-level synthesis tools after few years of lower interest from the industry and academic research, started to gain more of it recently. This paper presents FPGA implementation of HEVC 2D Inverse DCT transform implemented on Xilinx Virtex-6 using Impulse C high level language. Achieved results exceed 1080p@30fps with relatively high FPGA clock frequency and moderate resource usage.
高效视频编码(High Efficiency Video Coding, HEVC)是一种现代视频压缩标准,其效率比H.264高出50%,但其成本增加了复杂度。它是研究图像压缩算法的FPGA工程师的主要研究课题之一。另一方面,高水平的合成工具在经过几年的工业和学术研究的低兴趣之后,最近开始获得更多的关注。本文介绍了在Xilinx Virtex-6上使用Impulse C高级语言实现HEVC二维逆DCT变换的FPGA实现。通过相对较高的FPGA时钟频率和适度的资源使用,实现的结果超过1080p@30fps。
{"title":"H.265 inverse transform FPGA implementation in Impulse C","authors":"Slawomir Cichon, M. Gorgon","doi":"10.15439/2017F185","DOIUrl":"https://doi.org/10.15439/2017F185","url":null,"abstract":"High Efficiency Video Coding (HEVC), a modern video compression standard, exceeds the predecessor H.264 in efficiency by 50%, but with cost of increased complexity. It is one of main research topics for FPGA engineers working on image compression algorithms. On the other hand high-level synthesis tools after few years of lower interest from the industry and academic research, started to gain more of it recently. This paper presents FPGA implementation of HEVC 2D Inverse DCT transform implemented on Xilinx Virtex-6 using Impulse C high level language. Achieved results exceed 1080p@30fps with relatively high FPGA clock frequency and moderate resource usage.","PeriodicalId":402724,"journal":{"name":"2017 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127244493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative analysis of multitouch interactive surfaces 多点触控交互界面的对比分析
Przemysław Kucharski, Dawid Sielski, K. Grudzień, Wiktor Kozakiewicz, Michal Basiuras, Klaudia Greif, Jakub Santorek, L. Babout
The subject of this paper is to compare two different modality multi-touch interactive surfaces based on both: user experience and results of measurements in order to examine how different properties influence usefulness, in specific, their fitness to act as a “coffee table”. Tests were conducted on the Microsoft PixelSense (AKA Surface) and a Samsung touch screen overlay both 40+ inches diagonally. The study covers analysis of obtained measurements and summary of user experience collected over a number of summits and experiments. While tests for both devices returned very similar results, with the overlay more favorable, neither device could truly fit the tested use case due to their inconvenience, form factor and other issues.
本文的主题是基于用户体验和测量结果来比较两种不同模态的多点触摸交互表面,以检查不同的属性如何影响有用性,具体来说,它们是否适合充当“咖啡桌”。在微软PixelSense(又名Surface)和三星触摸屏上进行了测试,两者对角线均超过40英寸。该研究包括对获得的测量结果的分析,以及对通过一系列峰会和实验收集的用户体验的总结。虽然对这两款设备的测试结果非常相似,但由于它们的不便、外形和其他问题,这两款设备都不能真正适合测试用例。
{"title":"Comparative analysis of multitouch interactive surfaces","authors":"Przemysław Kucharski, Dawid Sielski, K. Grudzień, Wiktor Kozakiewicz, Michal Basiuras, Klaudia Greif, Jakub Santorek, L. Babout","doi":"10.15439/2017F393","DOIUrl":"https://doi.org/10.15439/2017F393","url":null,"abstract":"The subject of this paper is to compare two different modality multi-touch interactive surfaces based on both: user experience and results of measurements in order to examine how different properties influence usefulness, in specific, their fitness to act as a “coffee table”. Tests were conducted on the Microsoft PixelSense (AKA Surface) and a Samsung touch screen overlay both 40+ inches diagonally. The study covers analysis of obtained measurements and summary of user experience collected over a number of summits and experiments. While tests for both devices returned very similar results, with the overlay more favorable, neither device could truly fit the tested use case due to their inconvenience, form factor and other issues.","PeriodicalId":402724,"journal":{"name":"2017 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125796199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interface-based semi-automated testing of software components 基于接口的软件组件半自动测试
T. Potuzak, Richard Lipka, Přemek Brada
The component-based software development enables to construct applications from reusable components providing particular functionalities and simplifies application evolution. To ensure the correct functioning of a given component-based application and its preservation across evolution steps, it is necessary to test not only the functional properties of the individual components but also the correctness of their mutual interactions and cooperation. This is complicated by the fact that third-party components often come without source code and/or documentation of functional and interaction properties. In this paper, we describe an approach for performing rigorous semi-automated testing of software components with unavailable source code. Utilizing an automated analysis of the component interfaces, scenarios invoking methods with generated parameter values are created. When they are performed on a stable application version and their runtime effects (component interactions) are recorded, the resulting scenarios with recorded effects can be used for accurate regression testing of newly installed versions of selected components. Our experiences with a prototype implementation show that the approach has acceptable demands on manual work and computational resources.
基于组件的软件开发支持从提供特定功能的可重用组件构建应用程序,并简化了应用程序的发展。为了确保给定的基于组件的应用程序的正确功能及其跨发展步骤的保存,不仅需要测试单个组件的功能属性,还需要测试它们相互交互和合作的正确性。由于第三方组件通常没有源代码和/或功能和交互属性的文档,这一点变得更加复杂。在本文中,我们描述了一种对具有不可用源代码的软件组件执行严格的半自动化测试的方法。利用对组件接口的自动分析,将创建调用具有生成的参数值的方法的场景。当它们在一个稳定的应用程序版本上执行,并且它们的运行时效果(组件交互)被记录下来时,所产生的具有记录效果的场景可以用于对所选组件的新安装版本进行精确的回归测试。我们对原型实现的经验表明,该方法对手工工作和计算资源的需求是可以接受的。
{"title":"Interface-based semi-automated testing of software components","authors":"T. Potuzak, Richard Lipka, Přemek Brada","doi":"10.15439/2017F139","DOIUrl":"https://doi.org/10.15439/2017F139","url":null,"abstract":"The component-based software development enables to construct applications from reusable components providing particular functionalities and simplifies application evolution. To ensure the correct functioning of a given component-based application and its preservation across evolution steps, it is necessary to test not only the functional properties of the individual components but also the correctness of their mutual interactions and cooperation. This is complicated by the fact that third-party components often come without source code and/or documentation of functional and interaction properties. In this paper, we describe an approach for performing rigorous semi-automated testing of software components with unavailable source code. Utilizing an automated analysis of the component interfaces, scenarios invoking methods with generated parameter values are created. When they are performed on a stable application version and their runtime effects (component interactions) are recorded, the resulting scenarios with recorded effects can be used for accurate regression testing of newly installed versions of selected components. Our experiences with a prototype implementation show that the approach has acceptable demands on manual work and computational resources.","PeriodicalId":402724,"journal":{"name":"2017 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123567666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Re-engineering enterprise architectures 重新设计企业架构
M. Uysal, Ali Halici, A. Mergen
An Enterprise Architecture (EA) is used for the design and realization of the business processes, along with user roles, applications, data, and technical infrastructures. Over time, maintaining an EA update may become a complex issue, let alone an organization-wide architecture and its related artifacts. EA practices provide much of the required guidelines for the design and development of EAs. However, they cannot present a comprehensive method or solution for the re-engineering processes of EAs. In this paper, we propose an EA re-engineering model and present its potential contributions. The study is conducted according to the Design Science Research Method. The research contribution is classified as an “application of a new solution (process model) to a known problem (re-engineering EA)”. The future research efforts will focus on the implementation and evaluation of the model in case studies for gathering empirical evidences.
企业架构(Enterprise Architecture, EA)用于设计和实现业务流程,以及用户角色、应用程序、数据和技术基础设施。随着时间的推移,维护EA更新可能会成为一个复杂的问题,更不用说组织范围的体系结构及其相关工件了。EA实践为EA的设计和开发提供了许多必需的指导方针。然而,他们不能为ea的再造过程提供一个全面的方法或解决方案。在本文中,我们提出了一个EA再工程模型,并提出了它的潜在贡献。本研究依据设计科学研究方法进行。研究贡献被归类为“将新解决方案(过程模型)应用于已知问题(重新设计EA)”。未来的研究工作将集中在案例研究中对模型的实施和评估,以收集经验证据。
{"title":"Re-engineering enterprise architectures","authors":"M. Uysal, Ali Halici, A. Mergen","doi":"10.15439/2017F17","DOIUrl":"https://doi.org/10.15439/2017F17","url":null,"abstract":"An Enterprise Architecture (EA) is used for the design and realization of the business processes, along with user roles, applications, data, and technical infrastructures. Over time, maintaining an EA update may become a complex issue, let alone an organization-wide architecture and its related artifacts. EA practices provide much of the required guidelines for the design and development of EAs. However, they cannot present a comprehensive method or solution for the re-engineering processes of EAs. In this paper, we propose an EA re-engineering model and present its potential contributions. The study is conducted according to the Design Science Research Method. The research contribution is classified as an “application of a new solution (process model) to a known problem (re-engineering EA)”. The future research efforts will focus on the implementation and evaluation of the model in case studies for gathering empirical evidences.","PeriodicalId":402724,"journal":{"name":"2017 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125307726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Determining the significance of features with the use of Sobol method in probabilistic neural network classification tasks 在概率神经网络分类任务中使用Sobol方法确定特征的显著性
Piotr A. Kowalski, Maciej Kusy
In this article, the problem of determining the significance of data features is considered. For this purpose the algorithm is proposed, which with the use of Sobol method, provides the global sensitivity indices. On the basis of these indices, the aggregated sensitivity coefficients are determined which are used to indicate significant features. Using such an information, the process of features' removal is performed. The results are verified by the probabilistic neural network in the classification of medical data sets by computing model's quality. We show that it is possible to point the least significant features which can be removed from the input space achieving higher classification performance.
在本文中,考虑了确定数据特征的重要性的问题。为此,提出了一种基于Sobol方法的全局灵敏度指标求解算法。在这些指标的基础上,确定了用于表示重要特征的综合敏感系数。利用这些信息,执行特征的去除过程。通过计算模型的质量,验证了概率神经网络在医学数据集分类中的应用。我们表明,有可能指出最不重要的特征,这些特征可以从输入空间中去除,从而获得更高的分类性能。
{"title":"Determining the significance of features with the use of Sobol method in probabilistic neural network classification tasks","authors":"Piotr A. Kowalski, Maciej Kusy","doi":"10.15439/2017F225","DOIUrl":"https://doi.org/10.15439/2017F225","url":null,"abstract":"In this article, the problem of determining the significance of data features is considered. For this purpose the algorithm is proposed, which with the use of Sobol method, provides the global sensitivity indices. On the basis of these indices, the aggregated sensitivity coefficients are determined which are used to indicate significant features. Using such an information, the process of features' removal is performed. The results are verified by the probabilistic neural network in the classification of medical data sets by computing model's quality. We show that it is possible to point the least significant features which can be removed from the input space achieving higher classification performance.","PeriodicalId":402724,"journal":{"name":"2017 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126914644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Quantum color image encryption based on multiple discrete chaotic systems 基于多个离散混沌系统的量子彩色图像加密
Li Li, Bassem Abd-El-Atty, A. El-latif, A. Ghoneim
In this paper, a novel quantum encryption algorithm for color image is proposed based on multiple discrete chaotic systems. The proposed quantum image encryption algorithm utilize the quantum controlled-NOT image generated by chaotic logistic map, asymmetric tent map and logistic Chebyshev map to control the XOR operation in the encryption process. Experiment results and analysis show that the proposed algorithm has high efficiency and security against differential and statistical attacks.
提出了一种基于多个离散混沌系统的彩色图像量子加密算法。提出的量子图像加密算法利用混沌逻辑映射、非对称帐篷映射和逻辑切比雪夫映射生成的量子控制非图像来控制加密过程中的异或操作。实验结果和分析表明,该算法对差分攻击和统计攻击具有较高的效率和安全性。
{"title":"Quantum color image encryption based on multiple discrete chaotic systems","authors":"Li Li, Bassem Abd-El-Atty, A. El-latif, A. Ghoneim","doi":"10.15439/2017F163","DOIUrl":"https://doi.org/10.15439/2017F163","url":null,"abstract":"In this paper, a novel quantum encryption algorithm for color image is proposed based on multiple discrete chaotic systems. The proposed quantum image encryption algorithm utilize the quantum controlled-NOT image generated by chaotic logistic map, asymmetric tent map and logistic Chebyshev map to control the XOR operation in the encryption process. Experiment results and analysis show that the proposed algorithm has high efficiency and security against differential and statistical attacks.","PeriodicalId":402724,"journal":{"name":"2017 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122365573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
On end-to-end approach for slice isolation in 5G networks. Fundamental challenges 5G网络中片隔离的端到端方法。基本的挑战
Z. Kotulski, T. Nowak, Mariusz Sepczuk, M. Tunia, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko, Jean-Philippe Wary
There are several reports and white papers which attempt to precise 5G architectural requirements presenting them from different points of view, including techno-socio-economic impacts and technological constraints. Most of them deal with network slicing aspects as a central point, often strengthening slices with slice isolation. The goal of this paper is to present and examine the isolation capabilities and selected approaches for its realization in network slicing context. As the 5G architecture is still evolving, the specification of isolated slices operation and management brings new requirements that need to be addressed, especially in a context of End-to-End (E2E) security. Thus, an outline of recent trends in slice isolation and a set of challenges are proposed, which (if properly addressed) could be a step to E2E user's security based on slices isolation.
有几份报告和白皮书试图从不同的角度阐述5G架构需求,包括技术社会经济影响和技术限制。它们大多以处理网络切片方面为中心点,通常用切片隔离来加强切片。本文的目的是介绍和研究隔离功能以及在网络切片环境中实现隔离功能的选择方法。随着5G架构的不断发展,隔离切片操作和管理的规范带来了新的需求,需要解决,特别是在端到端(E2E)安全的背景下。因此,本文概述了切片隔离的最新趋势和一系列挑战,这些挑战(如果得到适当解决)可能是实现基于切片隔离的端到端用户安全性的一步。
{"title":"On end-to-end approach for slice isolation in 5G networks. Fundamental challenges","authors":"Z. Kotulski, T. Nowak, Mariusz Sepczuk, M. Tunia, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko, Jean-Philippe Wary","doi":"10.15439/2017F228","DOIUrl":"https://doi.org/10.15439/2017F228","url":null,"abstract":"There are several reports and white papers which attempt to precise 5G architectural requirements presenting them from different points of view, including techno-socio-economic impacts and technological constraints. Most of them deal with network slicing aspects as a central point, often strengthening slices with slice isolation. The goal of this paper is to present and examine the isolation capabilities and selected approaches for its realization in network slicing context. As the 5G architecture is still evolving, the specification of isolated slices operation and management brings new requirements that need to be addressed, especially in a context of End-to-End (E2E) security. Thus, an outline of recent trends in slice isolation and a set of challenges are proposed, which (if properly addressed) could be a step to E2E user's security based on slices isolation.","PeriodicalId":402724,"journal":{"name":"2017 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126983513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Towards process-oriented ontology for financial analysis 面向过程的财务分析本体
J. Korczak, Helena Dudycz, Bartłomiej Nita, Piotr Oleksyk
The article presents an approach to integrate a business process knowledge of Decision Support Systems. It concerns two major aspects of the system, i.e. the formalization of processes predefined in Business Process Modeling Notation, the reuse of a domain ontology, and the analysis of economic and financial information. The described approach is a continuation of the construction of the intelligent cockpit for managers (InKoM project), whose main objective was to facilitate financial analysis and the evaluation of the economic status of the company in a competitive market. The current project is related to the design of smart decision support systems based on static (structural) and procedural knowledge. The content of the knowledge is focused on essential financial concepts and relationships related to the management of small and medium enterprises (SME). An experiment was carried out on real financial data extracted from the financial information system.
本文提出了一种集成决策支持系统业务流程知识的方法。它涉及系统的两个主要方面,即在业务流程建模符号中预定义的流程的形式化、领域本体的重用以及经济和金融信息的分析。所描述的方法是管理人员智能座舱(InKoM项目)建设的延续,其主要目标是促进财务分析和评估公司在竞争市场中的经济地位。当前的项目涉及基于静态(结构)和程序知识的智能决策支持系统的设计。知识的内容集中在基本的财务概念和关系相关的中小型企业(SME)的管理。对从财务信息系统中提取的真实财务数据进行了实验。
{"title":"Towards process-oriented ontology for financial analysis","authors":"J. Korczak, Helena Dudycz, Bartłomiej Nita, Piotr Oleksyk","doi":"10.15439/2017F181","DOIUrl":"https://doi.org/10.15439/2017F181","url":null,"abstract":"The article presents an approach to integrate a business process knowledge of Decision Support Systems. It concerns two major aspects of the system, i.e. the formalization of processes predefined in Business Process Modeling Notation, the reuse of a domain ontology, and the analysis of economic and financial information. The described approach is a continuation of the construction of the intelligent cockpit for managers (InKoM project), whose main objective was to facilitate financial analysis and the evaluation of the economic status of the company in a competitive market. The current project is related to the design of smart decision support systems based on static (structural) and procedural knowledge. The content of the knowledge is focused on essential financial concepts and relationships related to the management of small and medium enterprises (SME). An experiment was carried out on real financial data extracted from the financial information system.","PeriodicalId":402724,"journal":{"name":"2017 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121496708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Representation of attacker motivation in software risk assessment using attack probability trees 用攻击概率树表示软件风险评估中攻击者动机
M. Esche, F. G. Toro, F. Thiel
Since software plays an ever more important role in measuring instruments, risk assessments for such instruments required by European regulations will usually include also a risk assessment of the software. Although previously introduced methods still lack efficient means for the representation of attacker motivation and have no prescribed way of constructing attack scenarios, attack trees have been used for several years in similar application scenarios. These trees are here developed into attack probability trees, specifically tailored to meet the requirements for software risk assessment. A real-world example based on taximeters is given to illustrate the application of attack probability trees approach and their advantages.
由于软件在测量仪器中扮演着越来越重要的角色,欧洲法规要求的此类仪器的风险评估通常也将包括软件的风险评估。虽然以前引入的方法仍然缺乏有效的攻击动机表示手段,并且没有规定的构建攻击场景的方法,但是攻击树已经在类似的应用场景中使用了几年。这些树在这里被发展成攻击概率树,专门用于满足软件风险评估的需求。以出租车计价器为例,说明了攻击概率树方法的应用及其优点。
{"title":"Representation of attacker motivation in software risk assessment using attack probability trees","authors":"M. Esche, F. G. Toro, F. Thiel","doi":"10.15439/2017F112","DOIUrl":"https://doi.org/10.15439/2017F112","url":null,"abstract":"Since software plays an ever more important role in measuring instruments, risk assessments for such instruments required by European regulations will usually include also a risk assessment of the software. Although previously introduced methods still lack efficient means for the representation of attacker motivation and have no prescribed way of constructing attack scenarios, attack trees have been used for several years in similar application scenarios. These trees are here developed into attack probability trees, specifically tailored to meet the requirements for software risk assessment. A real-world example based on taximeters is given to illustrate the application of attack probability trees approach and their advantages.","PeriodicalId":402724,"journal":{"name":"2017 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"393 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124293680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2017 Federated Conference on Computer Science and Information Systems (FedCSIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1