{"title":"Use of FURIA for Improving Task Mining","authors":"P. Průcha, Jan Skrbek","doi":"10.18267/j.aip.183","DOIUrl":"https://doi.org/10.18267/j.aip.183","url":null,"abstract":"Companies that use robotic process automation very often deal with the problem of selecting a suitable process for automation. Manual selection of a suitable process is very time-consuming. Therefore, part of the process mining field specializes in selecting suitable processes for automation based on process data. This work deals with the possibility of improving the existing method for finding suitable candidates for automation. To improve the current approach, we remove the limiting restrictions of the current method and use another FURIA rule-learning algorithm for rule detection. We use three different datasets and the WEKA platform to validate the results. The results show that FURIA and the removal of strictly deterministic rules as restrictions turned out to be a competitive approach to the original one. On data presented in this study, the selected approach detected more candidates for automation and with higher accuracy. This study implies that FURIA and not using a strictly deterministic process is an appropriate procedure with certain use cases as other procedures mentioned in this study.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46371308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Privacy-preserving Healthcare Data Sharing in a Cloud Environment Using Hybrid Encryption","authors":"Insaf Boumezbeur, K. Zarour","doi":"10.18267/j.aip.182","DOIUrl":"https://doi.org/10.18267/j.aip.182","url":null,"abstract":"In recent years, cloud computing has been widely used in various fields and is gaining importance in healthcare systems. Patients’ health data are outsourced to cloud storage, enabling healthcare professionals to easily access health information from anywhere and at any time to improve health services. Once patient data are stored in the cloud, they are vulnerable to attacks such as data loss, denial of service (DoS), distributed denial of service (DDoS) and other sorts of cyberattacks. Data confidentiality and patient privacy are more of a problem in the cloud computing context due to their public availability. If a patient's personal information is stolen, he or she may face a range of problems. These are concerns that necessitate more security. The transmission of this sensitive information over the internet is always susceptible to hacking. Therefore, the privacy of patients’ data is considered one of healthcare organizations’ main issues. To overcome this problem, encryption mechanisms that place a significant emphasis on securing data within the cloud environment are used to preserve sensitive health data. A hybrid cryptography approach is employed in this paper to ensure the secure sharing of health data over the cloud. To maintain data privacy and secrecy, a hybrid cryptography mechanism for storing and transporting data to and from the cloud is used. To protect data from malevolent insiders, the encryption key is separated into two halves, controlling access to patient records via a specific technique. This paper shows the implementation and performance evaluation of the proposal as a functional system prototype. The evaluation is based on the key generation time, the record encryption time, the record decryption time, the record upload time and the record download time for different user numbers and different file sizes varying from 0.1 MB to 500 MB. The findings show that the proposal performs better than other state-of-the-art systems and can practically share secure health data in cloud environments.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45098146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Facebook Identity Construction of Vietnamese Netizens","authors":"Hai Chung Pham, Lien Nguyen, Phuong Tran, T. Tran","doi":"10.18267/j.aip.181","DOIUrl":"https://doi.org/10.18267/j.aip.181","url":null,"abstract":"Studying the ways in which people construct their identities in online environments is a pressing contemporary concern. The research reported in this article was designed to examine the uses of, and influences on, Vietnamese respondents’ identity formation on Facebook. Data were collected by means of a social survey and the application of the Zaltman metaphor elicitation technique, a procedure that searches fo r customers’ thoughts and emotions by digging deep into the visual and non -visual illustrations that customers collect or make on their own. The findings show how Vietnamese Facebook users present themselves and how they thereby facilitate their self-expansion and maintain their sense of self-esteem. According to the analysis, it can be suggested that Facebook is where adults portray their socially conformed versions against social reflection. They use this platform to seek validation, demonstrate their professional side to make them look better in the eyes of society. Drivers of online identity formation are revealed through negotiating with conflicts in their existing identities. The level of self-modification amongst respondents is adjusted in relation to their social vigilance, conformity and motivations in and between social categorization.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44938528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incremental Model Transformation with Epsilon in Model-Driven Engineering","authors":"Marzieh Ghorbani, Mohammadreza Sharbaf, B. Zamani","doi":"10.18267/j.aip.179","DOIUrl":"https://doi.org/10.18267/j.aip.179","url":null,"abstract":"Model-Driven Engineering (MDE) is a software development paradigm that uses models as the main artifacts in the development process. MDE uses model transformations to propagate changes between source and target models. In some development scenarios, target models should be updated based on the evolution of source models. In such cases, it is required to re-execute all transformation rules to update the target model. Incremental execution of transformations, which partially executes the transformation rules, is a solution to this problem. The Epsilon Transformation Language (ETL) is a well-known model transformation language that does not support incremental executions. In this paper, we propose an approach to support the incremental execution of ETL transformations. Our proposal includes a process, as well as a prototype, to propagate changes to the target model. In the proposed approach, all the changes in the source model are detected to identify and re-execute the rules which deal with computing the required elements for updating the target model. We evaluated the correctness and performance of our approach by means of a case study. Compared to the standard ETL, the results are promising regarding the correctness of target models as well as faster execution of the transformation.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44508776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Preservation and Access Control for Sharing Electronic Health Records Using Blockchain Technology","authors":"Insaf Boumezbeur, K. Zarour","doi":"10.18267/j.aip.176","DOIUrl":"https://doi.org/10.18267/j.aip.176","url":null,"abstract":"Sharing of Electronic Health Records (EHRs) is of significant importance in health care. Lately, a cloudbased electronic health record sharing scheme has been used extensively to share patient records among various healthcare organizations. However, cloud centralization may compromise patients’ privacy and security. Due to the special features of blockchain, it is important to see this technology as a promising solution to resolve these issues. This article proposes a privacy-preserving, secure EHR sharing and access control framework based on blockchain technology. The proposal aims to implement EHR blockchain technology and ensure that electronic records are stored safely by specifying user access permissions. We emulate the cryptographic primitives and use smart contracts to describe the relationships between the EHR owner and EHR user through the proposed system on the Ethereum blockchain. We assess the proposal results based on encryption and decryption time and the costs of the smart contract. The encryption and decryption times are proportional to the size of the EHR, which varies from 128 KB to 128 MB. When it comes to encryption, the smallest EHR takes 0.0012 s to encrypt, while the largest EHR, which is 128 MB, takes 1.4149 s. On the other hand, a 128 KB EHR takes 0.0013 s to decrypt, whereas a 128 MB EHR requires 1.6284 s. As a result, performance evaluation and security analysis confirm that the proposal is secure for practical application.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42624858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Venkatachalam Kandasamy, M. Abouhawwash, N. Bačanin
{"title":"Call for Special Issue Papers: Sustainable Solutions for Internet of Things Using Artificial Intelligence and Blockchain in Future Networks","authors":"Venkatachalam Kandasamy, M. Abouhawwash, N. Bačanin","doi":"10.18267/j.aip.177","DOIUrl":"https://doi.org/10.18267/j.aip.177","url":null,"abstract":"ing and Indexing: Scopus (Elsevier), DBLP Computer Science Bibliography, RSCI – Russian Science Citation Index, Open J-Gate, CEEOL, ERIH PLUS, DOAJ and other databases. Acta Informatica Pragensia Volume 11, 2022 https://doi.org/10.18267/j.aip.177 148 Notes for prospective authors Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. All papers must be submitted online. To submit a paper, please read our Submitting articles page. When you are submitting a manuscript, please select the “Special issue” option in “Section”. If you have any suggestions or questions regarding the subject matter, please contact the special issue editor Venkatachalam Kandasamy (venkatachalam.k@ieee.org). Before submitting your paper, please make sure you carefully read the instructions to authors. The journal has no strict formatting requirements on submission. There is no restriction on the length of manuscripts. Accepted articles will be published immediately on the journal website with a digital object identifier (DOI) prior to the release of the special issue. Important dates: Deadline for manuscript submissions: 31 October 2022 Notification to authors within four weeks. Special issue will be published in December 2022. Visit the instructions for authors Submit your paper for peer review online","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48601132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Call for Special Issue Papers: Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems","authors":"Mazin Abed Mohammed, Seifedine Kadry, O. Geman","doi":"10.18267/j.aip.175","DOIUrl":"https://doi.org/10.18267/j.aip.175","url":null,"abstract":"ing and Indexing: Scopus (Elsevier), DBLP Computer Science Bibliography, RSCI – Russian Science Citation Index, Open J-Gate, CEEOL, ERIH PLUS, DOAJ and other databases. Acta Informatica Pragensia Volume 11, 2022 https://doi.org/10.18267/j.aip.175 4 Notes for prospective authors Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. All papers must be submitted online. To submit a paper, please read our Submitting articles page. When you are submitting a manuscript, please select the “Special issue” option in “Section”. If you have any suggestions or questions regarding the subject matter, please contact the special issue editor Mazin Abed Mohammed (mazinalshujeary@uoanbar.edu.iq). Before submitting your paper, please make sure you carefully read the instructions to authors. The journal has no strict formatting requirements on submission. There is no restriction on the length of manuscripts. Accepted articles will be published immediately on the journal website with a digital object identifier (DOI) prior to the release of the special issue.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48302840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CA-BPEL: A New Approach to Facilitate the Development and Execution of Context-Aware Service Orchestrations","authors":"Hossein Moradi, B. Zamani, K. Zamanifar","doi":"10.18267/j.aip.174","DOIUrl":"https://doi.org/10.18267/j.aip.174","url":null,"abstract":"The proliferation of smartphones and sensor-based networks has led to a greater need for context-aware applications and pervasive business processes. One of the key approaches that seek to satisfy this need is context-aware service composition. Service composition can be achieved in two ways, i.e., service choreography and service orchestration. Embedding the context into an orchestrated composite service enhances its flexibility, but makes its development and execution more complicated. This study aims to reduce this complexity by introducing the CA-BPEL approach. Our proposed approach enables developers to turn a standard orchestrated service into a context-aware orchestrated service, consistent with the standard WS-BPEL language. This study applies the Design Science Research Methodology, in which we evaluate CA-BPEL by using a tourism demonstration along with the conduction of a usability survey that shows the convenience of the proposed approach. We also compare our proposed approach with 14 related studies. Our investigations suggest that CA-BPEL has much potential to facilitate the development and execution of context-aware service compositions.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44220908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Wulf, Anne Weibert, Konstantin Aal, Sarah Rüller, M. Rohde
{"title":"The Praxeological Research Programme of Socio-Informatics - the Siegen School","authors":"V. Wulf, Anne Weibert, Konstantin Aal, Sarah Rüller, M. Rohde","doi":"10.18267/j.aip.171","DOIUrl":"https://doi.org/10.18267/j.aip.171","url":null,"abstract":"This paper introduces the praxeologically grounded research programme on socio-informatics developed at the University of Siegen and the International Institute for Socio-Informatics in Germany. We outline our methodological framework of grounded design, guiding and binding together a variety of different engagements in practice which we call design case studies (DCS). While grounded design is applied to a broad variety of different areas, in this paper we deal specifically with our engagements in support of communities and political activists. To exemplify our approach, we present one DCS: It focuses on the participatory development of a computer club in the High Atlas as a facilitation infrastructure to support public community participation in the process of modernization and social transformation in the Maghreb. Insights into the project context, the objectives and methodology and the depiction of some of its first findings lays the ground for the discussion of socio-informatics research principles.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42545306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}