Proceedings of the 2021 7th International Conference on Computer Technology Applications最新文献

筛选
英文 中文
Converting Manufacturing Companies into Data-Driven Enterprises: an Evaluation of the Transformation Model 制造业企业向数据驱动型企业转型:转型模式的评价
V. Mezhuyev, Martin Tschandl, M. Mayr
{"title":"Converting Manufacturing Companies into Data-Driven Enterprises: an Evaluation of the Transformation Model","authors":"V. Mezhuyev, Martin Tschandl, M. Mayr","doi":"10.1145/3477911.3477924","DOIUrl":"https://doi.org/10.1145/3477911.3477924","url":null,"abstract":"Several approaches can be found in the literature to describe the transformation of companies into data-driven enterprises. A comparative framework was set up to objectively evaluate such transformation models As an additional result, a new model was derived, in which six steps were finally included: Research and Preparation, Digital Maturity Level Assessment, Target Definition, Gap Analysis, Identifying Measures and Implementation. This paper concentrates on the validation of the proposed model by an expert panel. Through the responses of 20 experts, potential strengths and weaknesses were revealed and analyzed using statistical methods. In summary, the expert attitude towards the proposed model was supportive throughout all evaluation dimensions. Thus, this work provides executives of manufacturing companies with a roadmap to plan and to perform a transformation into a data-driven enterprise. A direction for further research would be an adaptation of the proposed general model to the specific needs of manufacturing companies.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115468638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design Workflows and Algorithm Diagrams Interpretation Method in Software Development 软件开发中的设计工作流和算法图解释方法
N. Voit, S. Bochkov, Sergey Kirillov, M. Ukhanova
{"title":"Design Workflows and Algorithm Diagrams Interpretation Method in Software Development","authors":"N. Voit, S. Bochkov, Sergey Kirillov, M. Ukhanova","doi":"10.1145/3477911.3477916","DOIUrl":"https://doi.org/10.1145/3477911.3477916","url":null,"abstract":"One of the challenges of the modern business process management theory is that it lacks a formal method for analyzing the design workflows and algorithms presented based on the graphic languages, which could have linear computational complexity and take into account the concept of \"time\". The authors present an automated method for interpreting the design workflows in the software development field. The method is based on the temporal automaton RVTI-grammar, which takes into account the \"time\" and \"clock\" concepts. It differs from the existing methods in a linear design workflows interpretation time based on the visual language and allows for a finite time to perform step-by-step workflow analysis, represented in the form of algorithm diagrams. An example of such a diagram in the EPC language is given, its step-by-step interpretation is described.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115882144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Behavioral Economics Issues for Software Requirements Optimization for Personal Data Security and Privacy 个人数据安全和隐私软件需求优化的行为经济学问题
Shatadru Shikta, Somania Nur Mahal, Kazi Bushra Al Jannat, Mahady Hasan, M. Rokonuzzaman
{"title":"Behavioral Economics Issues for Software Requirements Optimization for Personal Data Security and Privacy","authors":"Shatadru Shikta, Somania Nur Mahal, Kazi Bushra Al Jannat, Mahady Hasan, M. Rokonuzzaman","doi":"10.1145/3477911.3477918","DOIUrl":"https://doi.org/10.1145/3477911.3477918","url":null,"abstract":"The effects of psychological, cognitive, emotional, cultural and social factors on the decisions of users and service providers for online service delivery are important factors to take into consideration in designing software applications. Increasing preference of online service delivery is also raising concerns about personal data security and privacy. Hence, there is a need for optimally trading off ease of use and extra measures for ensuring data privacy and security issues. Within this context, behavioral economics is one of the major factors in determining outcomes and successes of underlying software applications. Although much research done on behavioral economics separately, however, behavioral economics is mostly unexplored in the field of software requirements engineering process. With the growing needs of personal data security and privacy concerns, the software community needs to adapt it to software requirements optimization to incorporate and prioritize requirements related to personal data security and privacy. In this study, our main objective is to explore the behavioral economics issues towards data security and privacy and adapt them into the software requirement process. We have proposed a score-based framework. The ultimate goal of this framework is to help companies maximize the benefit and minimize the cost of software products while adapting the data security and privacy requirements in the requirement engineering process.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"3 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115903001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated Planning of Operating Expenditures (OPEX) - A model to apply best practices when running ERP and DWH systems 运营支出综合规划(OPEX) -在运行ERP和DWH系统时应用最佳实践的模型
Sergi Batalla Martinez, Daniela Wilfinger, Martin Tschandl
{"title":"Integrated Planning of Operating Expenditures (OPEX) - A model to apply best practices when running ERP and DWH systems","authors":"Sergi Batalla Martinez, Daniela Wilfinger, Martin Tschandl","doi":"10.1145/3477911.3477926","DOIUrl":"https://doi.org/10.1145/3477911.3477926","url":null,"abstract":"Controlling departments are confronted with complex and time-consuming OPEX (Operating expenses) planning processes several times a financial year. Medium-sized enterprises and (multinational) corporations usually use Enterprise Resource Planning (ERP) and Data Warehouse (DWH) systems to support, integrate and automate their business processes. ERP and DWH provide a wide range of functionality and features to support planning processes, however since OPEX planning processes are often complex and problematic, it can be challenging to decide which planning activities should be performed in the ERP and which in the DWH system. This paper proposes a model to identify for each one of the main planning activities, when they should be carried out into the ERP system or in DWH according to best practices. First, the OPEX planning process is analyzed in detail, identifying the main phases and activities and revealing inefficiencies. Then, the purposes and best practices related to ERP and DWH systems will be reviewed and outlined. Thereafter, we will formulate our model detailing the best practice for each concerned planning task. The model subsequently developed describes in detail the best practices for each planning task concerned. Finally, this model is applied to a real use case in the context of SAP S/4HANA as ERP system and BW/4HANA as DWH system. This paper is aimed at controllers and their finance and controlling departments, as well as IT-ERP and DWH consultants involved in business planning processes.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115337631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Video Analytics Architecture with Metadata Event-Engine for Urban Safe Cities 基于元数据事件引擎的城市安全城市视频分析架构
David Eneko Ruiz de Gauna, E. Irigoyen, Iñaki Cejudo, Harbil Arregui, P. Leskovský, O. Otaegui
{"title":"Video Analytics Architecture with Metadata Event-Engine for Urban Safe Cities","authors":"David Eneko Ruiz de Gauna, E. Irigoyen, Iñaki Cejudo, Harbil Arregui, P. Leskovský, O. Otaegui","doi":"10.1145/3477911.3477919","DOIUrl":"https://doi.org/10.1145/3477911.3477919","url":null,"abstract":"Intelligent video analysis from sources such as urban surveillance cameras is a prolific research area today. Multiple types of computer architectures offer a wide range of possibilities when addressing the needs of computer vision technologies. When it comes to real time processing for high level and complex event detections, however, some limitations may arise, such as the computing power in the edge or the cost of sending real time video to the cloud for running advanced algorithms. In this paper, we present a functional architecture of a complete video surveillance solution and we focus on the metadata-processing event engine which takes care of the high-level video processing that is decoupled from a low-level video analysis. The low-level video analysis running in the edge generates and publishes a flow of JSON messages structure containing the details of bounding boxes detected in each frame into an asynchronous messaging service. The metadata event engine is running in a remote cloud, far from the camera locations. We present the performance evaluation of this event engine under different circumstances simulating data coming simultaneously from multiple cameras, in order to study the best strategies when deploying and partitioning distributed processing tasks.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115099384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Encryption scheme based on small Ree groups 基于小Ree组的加密方案
G. Khalimov, Y. Kotukh, I. Didmanidze, Svitlana Khalimova
{"title":"Encryption scheme based on small Ree groups","authors":"G. Khalimov, Y. Kotukh, I. Didmanidze, Svitlana Khalimova","doi":"10.1145/3477911.3477917","DOIUrl":"https://doi.org/10.1145/3477911.3477917","url":null,"abstract":"The article describes an encryption scheme based on the small Ree groups. Our proposal is to use the small Ree group that improved security parameters of the encryption scheme in general. We extended the logarithmic signature to the entire group and got changed the encryption algorithm to protect against a sequential key recovery attack.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130135438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How changing API terms changed Instagram's domain? A bibliometric analysis API条款的变化如何改变Instagram的域名?文献计量学分析
R. Hartman, T. Šímová
{"title":"How changing API terms changed Instagram's domain? A bibliometric analysis","authors":"R. Hartman, T. Šímová","doi":"10.1145/3477911.3477923","DOIUrl":"https://doi.org/10.1145/3477911.3477923","url":null,"abstract":"In 2018 Facebook blocked a public Application Programming Interfaces (API) that could be used to download data from Facebook and Instagram. Much uncertainty still exists about the effect on social media research due to changes in Instagram API conditions. The presented paper provides an overview of the Instagram domain in terms of a research area. The main focus of this research is on the comparison of the key topics before and after the change of the Instagram API terms (comparing Instagram's research domain before and after 2018). A partial goal was to find out how the change in the conditions of the Instagram API has changed the number of social media research itself. We used a bibliometric approach to map the domain of Instagram. The paper has identified key topics in the domain of Instagram. Between the years 2010 and 2018 the key topics were gender, behavior on social media, dissemination of information, and platform selection. After the change of Instagram API conditions, after 2018, the key topics were gratifications, body image, dissatisfaction, and basic Instagram topics. The paper has found that generally, there was no change in research topics, nor the number of papers published after the Instagram API condition. Further study should focus on establish the relationships between Instagram use and psychological well-being; investigate the motives for Instagram use a study the effect of Instagram API on research with the use of different methods; gaining a better understanding of social media consumer activity; establish whatever our key topics are relevant to other social media platforms (Facebook, Twitter or Tiktok); study Instagram domain on different citation databases (e.g., in Scopus). This paper has also raised important questions about whether the Instagram API should be or should not be open for research purposes.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128096156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信