Acta Informatica Pragensia最新文献

筛选
英文 中文
Use of FURIA for Improving Task Mining 使用FURIA改进任务挖掘
Acta Informatica Pragensia Pub Date : 2022-07-02 DOI: 10.18267/j.aip.183
P. Průcha, Jan Skrbek
{"title":"Use of FURIA for Improving Task Mining","authors":"P. Průcha, Jan Skrbek","doi":"10.18267/j.aip.183","DOIUrl":"https://doi.org/10.18267/j.aip.183","url":null,"abstract":"Companies that use robotic process automation very often deal with the problem of selecting a suitable process for automation. Manual selection of a suitable process is very time-consuming. Therefore, part of the process mining field specializes in selecting suitable processes for automation based on process data. This work deals with the possibility of improving the existing method for finding suitable candidates for automation. To improve the current approach, we remove the limiting restrictions of the current method and use another FURIA rule-learning algorithm for rule detection. We use three different datasets and the WEKA platform to validate the results. The results show that FURIA and the removal of strictly deterministic rules as restrictions turned out to be a competitive approach to the original one. On data presented in this study, the selected approach detected more candidates for automation and with higher accuracy. This study implies that FURIA and not using a strictly deterministic process is an appropriate procedure with certain use cases as other procedures mentioned in this study.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46371308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving Privacy-preserving Healthcare Data Sharing in a Cloud Environment Using Hybrid Encryption 使用混合加密改进云环境中保护隐私的医疗保健数据共享
Acta Informatica Pragensia Pub Date : 2022-06-16 DOI: 10.18267/j.aip.182
Insaf Boumezbeur, K. Zarour
{"title":"Improving Privacy-preserving Healthcare Data Sharing in a Cloud Environment Using Hybrid Encryption","authors":"Insaf Boumezbeur, K. Zarour","doi":"10.18267/j.aip.182","DOIUrl":"https://doi.org/10.18267/j.aip.182","url":null,"abstract":"In recent years, cloud computing has been widely used in various fields and is gaining importance in healthcare systems. Patients’ health data are outsourced to cloud storage, enabling healthcare professionals to easily access health information from anywhere and at any time to improve health services. Once patient data are stored in the cloud, they are vulnerable to attacks such as data loss, denial of service (DoS), distributed denial of service (DDoS) and other sorts of cyberattacks. Data confidentiality and patient privacy are more of a problem in the cloud computing context due to their public availability. If a patient's personal information is stolen, he or she may face a range of problems. These are concerns that necessitate more security. The transmission of this sensitive information over the internet is always susceptible to hacking. Therefore, the privacy of patients’ data is considered one of healthcare organizations’ main issues. To overcome this problem, encryption mechanisms that place a significant emphasis on securing data within the cloud environment are used to preserve sensitive health data. A hybrid cryptography approach is employed in this paper to ensure the secure sharing of health data over the cloud. To maintain data privacy and secrecy, a hybrid cryptography mechanism for storing and transporting data to and from the cloud is used. To protect data from malevolent insiders, the encryption key is separated into two halves, controlling access to patient records via a specific technique. This paper shows the implementation and performance evaluation of the proposal as a functional system prototype. The evaluation is based on the key generation time, the record encryption time, the record decryption time, the record upload time and the record download time for different user numbers and different file sizes varying from 0.1 MB to 500 MB. The findings show that the proposal performs better than other state-of-the-art systems and can practically share secure health data in cloud environments.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45098146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring Facebook Identity Construction of Vietnamese Netizens 越南网民脸书身份建构探析
Acta Informatica Pragensia Pub Date : 2022-05-21 DOI: 10.18267/j.aip.181
Hai Chung Pham, Lien Nguyen, Phuong Tran, T. Tran
{"title":"Exploring Facebook Identity Construction of Vietnamese Netizens","authors":"Hai Chung Pham, Lien Nguyen, Phuong Tran, T. Tran","doi":"10.18267/j.aip.181","DOIUrl":"https://doi.org/10.18267/j.aip.181","url":null,"abstract":"Studying the ways in which people construct their identities in online environments is a pressing contemporary concern. The research reported in this article was designed to examine the uses of, and influences on, Vietnamese respondents’ identity formation on Facebook. Data were collected by means of a social survey and the application of the Zaltman metaphor elicitation technique, a procedure that searches fo r customers’ thoughts and emotions by digging deep into the visual and non -visual illustrations that customers collect or make on their own. The findings show how Vietnamese Facebook users present themselves and how they thereby facilitate their self-expansion and maintain their sense of self-esteem. According to the analysis, it can be suggested that Facebook is where adults portray their socially conformed versions against social reflection. They use this platform to seek validation, demonstrate their professional side to make them look better in the eyes of society. Drivers of online identity formation are revealed through negotiating with conflicts in their existing identities. The level of self-modification amongst respondents is adjusted in relation to their social vigilance, conformity and motivations in and between social categorization.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44938528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incremental Model Transformation with Epsilon in Model-Driven Engineering 模型驱动工程中基于Epsilon的增量模型转换
Acta Informatica Pragensia Pub Date : 2022-04-27 DOI: 10.18267/j.aip.179
Marzieh Ghorbani, Mohammadreza Sharbaf, B. Zamani
{"title":"Incremental Model Transformation with Epsilon in Model-Driven Engineering","authors":"Marzieh Ghorbani, Mohammadreza Sharbaf, B. Zamani","doi":"10.18267/j.aip.179","DOIUrl":"https://doi.org/10.18267/j.aip.179","url":null,"abstract":"Model-Driven Engineering (MDE) is a software development paradigm that uses models as the main artifacts in the development process. MDE uses model transformations to propagate changes between source and target models. In some development scenarios, target models should be updated based on the evolution of source models. In such cases, it is required to re-execute all transformation rules to update the target model. Incremental execution of transformations, which partially executes the transformation rules, is a solution to this problem. The Epsilon Transformation Language (ETL) is a well-known model transformation language that does not support incremental executions. In this paper, we propose an approach to support the incremental execution of ETL transformations. Our proposal includes a process, as well as a prototype, to propagate changes to the target model. In the proposed approach, all the changes in the source model are detected to identify and re-execute the rules which deal with computing the required elements for updating the target model. We evaluated the correctness and performance of our approach by means of a case study. Compared to the standard ETL, the results are promising regarding the correctness of target models as well as faster execution of the transformation.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44508776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comments on Copyright Aspects of Use of Copyright Works in Digital Teaching 浅谈数字教学中版权作品使用的版权问题
Acta Informatica Pragensia Pub Date : 2022-04-07 DOI: 10.18267/j.aip.178
Martin Boháček
{"title":"Comments on Copyright Aspects of Use of Copyright Works in Digital Teaching","authors":"Martin Boháček","doi":"10.18267/j.aip.178","DOIUrl":"https://doi.org/10.18267/j.aip.178","url":null,"abstract":"In the current COVID-19 pandemic, teachers and students routinely take part in schooling via digital technologies, using their own and other authors' copyrighted works, even without their permission or licence. The aim of this article is to identify these aspects of copyright in online teaching and to offer solutions to them. Some of these aspects are addressed by EU Directive No. 2019/790 (Digital Directive), the implementation of which was reflected in the draft amendment to the Czech Copyright Act, which had not addressed them. To fulfil this goal, the author asked several research questions: What forms of use of copyright works refer to the terms e-learning, online teaching or digital teaching? Is it possible to apply a statutory teaching exemption to the use of copyright works of other authors without their consent under the current wording of the Copyright Act (AutZ)? Is there any case law regarding such an exemption that would be applicable to e-learning? How will the conditions for the use of copyright works in e-learning change with the AutZ amendment following the implementation of EU Directive No. 2019/790 (Digital Directive) and what practical organizational recommendations can be made? To the above goal and questions, we conducted research in Czech law relating to the use of copyright works in digital teaching. For this purpose, we used the method of empirical research of Czech legislation and case law containing the terms e-learning and online or digital teaching. We also employed a comparative method to compare Czech law and EU law. The article is primarily an overview with elements of reflection. It does not comprehensively address all aspects of copyright in teaching, such as plagiarism in general, but identifies copyright aspects specific to e-learning. Copyright: © 2022 by the author(s).","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49643656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preservation and Access Control for Sharing Electronic Health Records Using Blockchain Technology 使用区块链技术共享电子健康记录的隐私保护和访问控制
Acta Informatica Pragensia Pub Date : 2022-03-13 DOI: 10.18267/j.aip.176
Insaf Boumezbeur, K. Zarour
{"title":"Privacy Preservation and Access Control for Sharing Electronic Health Records Using Blockchain Technology","authors":"Insaf Boumezbeur, K. Zarour","doi":"10.18267/j.aip.176","DOIUrl":"https://doi.org/10.18267/j.aip.176","url":null,"abstract":"Sharing of Electronic Health Records (EHRs) is of significant importance in health care. Lately, a cloudbased electronic health record sharing scheme has been used extensively to share patient records among various healthcare organizations. However, cloud centralization may compromise patients’ privacy and security. Due to the special features of blockchain, it is important to see this technology as a promising solution to resolve these issues. This article proposes a privacy-preserving, secure EHR sharing and access control framework based on blockchain technology. The proposal aims to implement EHR blockchain technology and ensure that electronic records are stored safely by specifying user access permissions. We emulate the cryptographic primitives and use smart contracts to describe the relationships between the EHR owner and EHR user through the proposed system on the Ethereum blockchain. We assess the proposal results based on encryption and decryption time and the costs of the smart contract. The encryption and decryption times are proportional to the size of the EHR, which varies from 128 KB to 128 MB. When it comes to encryption, the smallest EHR takes 0.0012 s to encrypt, while the largest EHR, which is 128 MB, takes 1.4149 s. On the other hand, a 128 KB EHR takes 0.0013 s to decrypt, whereas a 128 MB EHR requires 1.6284 s. As a result, performance evaluation and security analysis confirm that the proposal is secure for practical application.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42624858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Call for Special Issue Papers: Sustainable Solutions for Internet of Things Using Artificial Intelligence and Blockchain in Future Networks 特刊论文征集:未来网络中使用人工智能和区块链的物联网可持续解决方案
Acta Informatica Pragensia Pub Date : 2022-03-13 DOI: 10.18267/j.aip.177
Venkatachalam Kandasamy, M. Abouhawwash, N. Bačanin
{"title":"Call for Special Issue Papers: Sustainable Solutions for Internet of Things Using Artificial Intelligence and Blockchain in Future Networks","authors":"Venkatachalam Kandasamy, M. Abouhawwash, N. Bačanin","doi":"10.18267/j.aip.177","DOIUrl":"https://doi.org/10.18267/j.aip.177","url":null,"abstract":"ing and Indexing: Scopus (Elsevier), DBLP Computer Science Bibliography, RSCI – Russian Science Citation Index, Open J-Gate, CEEOL, ERIH PLUS, DOAJ and other databases. Acta Informatica Pragensia Volume 11, 2022 https://doi.org/10.18267/j.aip.177 148 Notes for prospective authors Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. All papers must be submitted online. To submit a paper, please read our Submitting articles page. When you are submitting a manuscript, please select the “Special issue” option in “Section”. If you have any suggestions or questions regarding the subject matter, please contact the special issue editor Venkatachalam Kandasamy (venkatachalam.k@ieee.org). Before submitting your paper, please make sure you carefully read the instructions to authors. The journal has no strict formatting requirements on submission. There is no restriction on the length of manuscripts. Accepted articles will be published immediately on the journal website with a digital object identifier (DOI) prior to the release of the special issue. Important dates: Deadline for manuscript submissions: 31 October 2022 Notification to authors within four weeks. Special issue will be published in December 2022. Visit the instructions for authors Submit your paper for peer review online","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48601132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Call for Special Issue Papers: Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems 特刊论文征集:深度学习区块链技术用于改善医疗保健工业系统
Acta Informatica Pragensia Pub Date : 2022-02-02 DOI: 10.18267/j.aip.175
Mazin Abed Mohammed, Seifedine Kadry, O. Geman
{"title":"Call for Special Issue Papers: Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems","authors":"Mazin Abed Mohammed, Seifedine Kadry, O. Geman","doi":"10.18267/j.aip.175","DOIUrl":"https://doi.org/10.18267/j.aip.175","url":null,"abstract":"ing and Indexing: Scopus (Elsevier), DBLP Computer Science Bibliography, RSCI – Russian Science Citation Index, Open J-Gate, CEEOL, ERIH PLUS, DOAJ and other databases. Acta Informatica Pragensia Volume 11, 2022 https://doi.org/10.18267/j.aip.175 4 Notes for prospective authors Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. All papers must be submitted online. To submit a paper, please read our Submitting articles page. When you are submitting a manuscript, please select the “Special issue” option in “Section”. If you have any suggestions or questions regarding the subject matter, please contact the special issue editor Mazin Abed Mohammed (mazinalshujeary@uoanbar.edu.iq). Before submitting your paper, please make sure you carefully read the instructions to authors. The journal has no strict formatting requirements on submission. There is no restriction on the length of manuscripts. Accepted articles will be published immediately on the journal website with a digital object identifier (DOI) prior to the release of the special issue.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48302840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CA-BPEL: A New Approach to Facilitate the Development and Execution of Context-Aware Service Orchestrations CA-BPEL:一种促进开发和执行上下文感知服务编排的新方法
Acta Informatica Pragensia Pub Date : 2022-01-26 DOI: 10.18267/j.aip.174
Hossein Moradi, B. Zamani, K. Zamanifar
{"title":"CA-BPEL: A New Approach to Facilitate the Development and Execution of Context-Aware Service Orchestrations","authors":"Hossein Moradi, B. Zamani, K. Zamanifar","doi":"10.18267/j.aip.174","DOIUrl":"https://doi.org/10.18267/j.aip.174","url":null,"abstract":"The proliferation of smartphones and sensor-based networks has led to a greater need for context-aware applications and pervasive business processes. One of the key approaches that seek to satisfy this need is context-aware service composition. Service composition can be achieved in two ways, i.e., service choreography and service orchestration. Embedding the context into an orchestrated composite service enhances its flexibility, but makes its development and execution more complicated. This study aims to reduce this complexity by introducing the CA-BPEL approach. Our proposed approach enables developers to turn a standard orchestrated service into a context-aware orchestrated service, consistent with the standard WS-BPEL language. This study applies the Design Science Research Methodology, in which we evaluate CA-BPEL by using a tourism demonstration along with the conduction of a usability survey that shows the convenience of the proposed approach. We also compare our proposed approach with 14 related studies. Our investigations suggest that CA-BPEL has much potential to facilitate the development and execution of context-aware service compositions.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44220908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Praxeological Research Programme of Socio-Informatics - the Siegen School 社会信息学实践研究计划——齐根学派
Acta Informatica Pragensia Pub Date : 2022-01-22 DOI: 10.18267/j.aip.171
V. Wulf, Anne Weibert, Konstantin Aal, Sarah Rüller, M. Rohde
{"title":"The Praxeological Research Programme of Socio-Informatics - the Siegen School","authors":"V. Wulf, Anne Weibert, Konstantin Aal, Sarah Rüller, M. Rohde","doi":"10.18267/j.aip.171","DOIUrl":"https://doi.org/10.18267/j.aip.171","url":null,"abstract":"This paper introduces the praxeologically grounded research programme on socio-informatics developed at the University of Siegen and the International Institute for Socio-Informatics in Germany. We outline our methodological framework of grounded design, guiding and binding together a variety of different engagements in practice which we call design case studies (DCS). While grounded design is applied to a broad variety of different areas, in this paper we deal specifically with our engagements in support of communities and political activists. To exemplify our approach, we present one DCS: It focuses on the participatory development of a computer club in the High Atlas as a facilitation infrastructure to support public community participation in the process of modernization and social transformation in the Maghreb. Insights into the project context, the objectives and methodology and the depiction of some of its first findings lays the ground for the discussion of socio-informatics research principles.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42545306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信