{"title":"Modeling metadata of CCTV systems and Indoor Location Sensors for automatic filtering of relevant video content","authors":"Franck Jeveme Panta, G. Roman-Jimenez, F. Sèdes","doi":"10.1109/RCIS.2018.8406677","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406677","url":null,"abstract":"Location sensors and Closed-circuit Television (CCTV) cameras are widely used for the surveillance of people, objects and areas. These devices (sensors, CCTV cameras, etc.) generate a large amount of heterogeneous data, making their analysis and management difficult and very time-consuming. In the context of video-surveillance, automatic extraction of the relevant information among the mass of multi-sources information produced by these systems could significantly reduce the investigation time and facilitate their analysis. In this paper, we propose an approach that combines data from Indoor Location Sensors and metadata from CCTV cameras to automatically retrieve relevant video segments during research of evidence accident or crime events in indoor environments. The proposed method consists in i) the reconstruction of the mobile device trajectories from indoor location sensors and ii) the identification of the CCTV cameras intersecting the reconstructed trajectories. To ensure industrial transferability, indoor location sensors data were embedded in a generic model of CCTV cameras metadata that instantiates the standard ISO 22311 (relative to digital video-surveillance contents). We provide an experimental evaluation demonstrating the utility of our approach in a real-world case. Results show that our method helps the CCTV operators to effectively retrieve the relevant video and drastically reduce the time of analysis.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114904457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formalizing compound MAPE patterns for decentralized control in self-adaptive systems","authors":"Marwa Hachicha, Riadh Ben Halima, A. Kacem","doi":"10.1109/RCIS.2018.8406680","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406680","url":null,"abstract":"Self-adaptive systems are able to adjust au-tonomously their behavior when the software or hardware is not accomplishing what it is intended to do. The MAPE control loop, based on the following components: Monitor, Analyze, Plan and Execute, is a prominent approach for realizing adaptation. Engineering complex self-adaptive systems needs the use of several architectural patterns in a composed form in their designs. In this paper, we focus on modeling compound MAPE patterns for decentralized control in self-adaptive systems and defining formally the composition process using the Event-B method. The composition of design patterns is illustrated by the composition of the master/slave and the coordinated control patterns.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130994761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic integration of security knowledge sources","authors":"Ana-Maria Ghiran, R. Buchmann","doi":"10.1109/RCIS.2018.8406673","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406673","url":null,"abstract":"For evaluating the security in enterprise systems, we need a security model that is amenable to integration, automated comparison and assessment. Over the years, practitioners have used various frameworks or standards (COBIT, ISO 2700x family) as checklists against which they could assess the security level in enterprise systems. On the other hand, researchers were more concerned with analysing security requirements or designing software for describing those requirements. These security models are either too general and contain unnecessary information for a particular organisation, or are highly dependent on the expertise of a security engineer. Besides these standards that are giving guidelines regarding security, there are many other sources like books, blogs, news, trainings and courses that produce security recommendations, there are regulations that mandate awareness about security, but still, organisations are missing appropriate knowledge and their systems are often attacked and breached. Having all these means available at a click of a mouse, it is questionable how can we use them in order to find the right solution that generates appropriate behaviour. This paper intends to tackle this problem by formulating a proposal for a methodology to setup a hybrid security knowledge repository for enterprise systems. The proposed solution will enable various stakeholders to add/share security knowledge in/from a repository and at the same time can use external trusted security data (from collaborative partners or reliable organisations) to enrich this knowledge base via semantic inter-operability techniques. Combining various online sources with knowledge from security officers would enable inferring new insights. The security knowledge holds some key characteristics that are considered as imperative. We referred to these as the 5C: Complexity, Continuity, Comprehensive and Cross-organisations, Compliance and Common representation. Our approach is making use of a common representation based on semantic technology for describing both security requirements pertaining to an organisation and trusted external security data.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133167788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systematic analysis and evaluation of visual conceptual modeling language notations","authors":"D. Bork, D. Karagiannis, Benedikt Pittl","doi":"10.1109/RCIS.2018.8406652","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406652","url":null,"abstract":"In systems analysis and design it is common to refer to some widely used de-facto industry standards like Unified Modeling Language (UML) and Business Process Model and Notation (BPMN). Albeit the wide adoption of such standard modeling languages, only limited research focuses on the techniques in which these standards are specified and the quality they provide. Most research focuses on case studies of applying standards, ways of extending standards to domain-specific requirements, e.g., by means of profiling, or evaluations of single modeling languages, e.g., using questionnaires or semiotic theories. By contrast, this paper critically reflects on the current state of modeling standards with a focus on their graphical representation (notation). The contribution of this paper is threefold: First, a systematic analysis is performed thereby investigating how different modeling standards specify notational aspects. Second, an evaluation is performed by applying Moody's Physics of Notation theory to the identified standards. Third, based on the findings, recommendations are given to improve modeling standard specifications in the future w.r.t. their notational aspects.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129024782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Where enterprise architecture development fails a multiple case study of governmental organizations","authors":"Negin Banaeianjahromi","doi":"10.1109/RCIS.2018.8406644","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406644","url":null,"abstract":"Enterprise Architecture (EA) adoption by governmental organizations has been substantially increased not only to improve performance and efficiency, but as a prerequisite to E-Government implementation. Many efforts have been done to create frameworks and methodologies for government sector organizations to develop EA smoothly and flawlessly. Based on a survey in 2004, governmental organizations in Iran had been among the top ten countries in EA activities but since then it has faced with an on-going decline. Therefore, the goal of this study is to investigate the obstacles that governmental organizations have encountered in recent years during EA development. Employing multiple case study approach, the data were collected through semi-structured interviews with 9 governmental organizations in Iran. In total, 18 obstacles were identified. Moreover, a priority framework was created to determine the precedence in addressing these obstacles. In analogy to previous literature, five of the identified obstacles have not been mentioned in the earlier literature. This study is a great assist for both practitioners and researchers because of the essentials of digital capability in the success of businesses and EA being the central competence area in digital transformation.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124298039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}