{"title":"Self-service kits to scale knowledge to autonomous teams - concept, application and limitations","authors":"Alexander Poth, Mario Kottke, A. Riel","doi":"10.2298/csis211112048p","DOIUrl":"https://doi.org/10.2298/csis211112048p","url":null,"abstract":"In large organizations, it is not trivial to spread knowledge to all teams. Often, individual teams need to handle similar topics and re-invent the wheel. Another scenario is that a group of people with a common role (for example ?guild? in Spotify model) has to distill their practices to make them shareable. Trainings should have empower participants so to apply the learnings easily in their daily businesses. To realize this, the proposed Self-Service Kit (SSK) approach can be used in the context of a holistic methodology that fosters team autonomy while leveraging knowledge spread and sharing throughout a large organization. Such a methodology is presented and instantiated in an enterprise context in facing the mentioned challenges.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"21 1","pages":"229-249"},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72769762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud-based ERP construction process framework in the customer's perspective","authors":"Hyeong-Soo Kim, Deuk-Soo Oh, Seung-Hee Kim","doi":"10.2298/csis211230045k","DOIUrl":"https://doi.org/10.2298/csis211230045k","url":null,"abstract":"Process frameworks for the implementation of cloud enterprise resource planning (ERP) were derived and each process was examined through detailed comparisons with on-premise ERP construction processes, using process engineering characteristics. The process frameworks for implementing cloud ERP are classified into infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), content-as-a-service (CaaS), and software-as-a-service (SaaS), depending on the construction type, and are defined based on 6 derived processes, 21 activities, and numerous specific tasks. The process engineering characteristics of the final proposed process framework were further analyzed and examined in comparison to on-premise ERP construction processes with respect to differences and similarities. This study provides a theoretical foundation of standardized research on cloud ERP construction methods. As a practical guideline for stakeholders, it can be used in practice as a process tailoring tool, providing information on specific activities and tasks for each construction phase, contributing to the construction and spread of reliable cloud-based ERP systems from the customer?s perspective.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"38 1","pages":"25-50"},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76576108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based model for tracking compliance with security requirements","authors":"Jelena Marjanovic, Nikola Dalčeković, G. Sladić","doi":"10.2298/csis210923060m","DOIUrl":"https://doi.org/10.2298/csis210923060m","url":null,"abstract":"The increasing threat landscape in Industrial Control Systems (ICS) brings different risk profiles with comprehensive impacts on society and safety. The complexity of cybersecurity risk assessment increases with a variety of third-party software components that comprise a modern ICS supply chain. A central issue in software supply chain security is the evaluation whether the secure development lifecycle process (SDL) is being methodologically and continuously practiced by all vendors. In this paper, we investigate the possibility of using a decentralized, tamper-proof system that will provide trustworthy visibility of the SDL metrics over a certain period, to any authorized auditing party. Results of the research provide a model for creating a blockchain-based approach that allows inclusion of auditors through a consortium decision while responding to SDL use cases defined by this paper. The resulting blockchain architecture successfully responded to requirements mandated by the security management practice as defined by IEC 62443-4-1 standard.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"19 1","pages":"359-380"},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87180384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guest editorial: Machine learning-based decision support systems in IoT systems","authors":"Mu-Yen Chen, J. Rubio, M. Ivanović","doi":"10.2298/csis230200ic","DOIUrl":"https://doi.org/10.2298/csis230200ic","url":null,"abstract":"<jats:p>nema</jats:p>","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"80 1","pages":"i-iii"},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86526123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qasim Khalid, Alberto Fernández, Marin Lujak, Arnaud Doniec
{"title":"SBEO: Smart Building Evacuation Ontology","authors":"Qasim Khalid, Alberto Fernández, Marin Lujak, Arnaud Doniec","doi":"10.2298/csis220118046k","DOIUrl":"https://doi.org/10.2298/csis220118046k","url":null,"abstract":"Semantically rich depiction of the concepts for context-aware indoor routing brings appealing benefits for the safety of occupants of smart spaces in emergency evacuation. In this paper, we propose Smart Building Evacuation Ontology (SBEO3), a reusable ontology for indoor spaces, based on three different data models: user, building, and context. We provide a common representation of indoor routing and navigation, describe users? characteristics and preferences, grouping of individuals and their role in a specific context, hazards, and emergency evacuation. Among other characteristics, we consider abilities of individuals, safety and accessibility of spaces related to each person, intensity, impact, and severity of an emergency event or activity. SBEO is flexible and compatible with other ontologies of its domain, including SEAS, SSN/SOSA, SEMA4A, and empathi. We evaluate SBEO based on several metrics demonstrating that it addresses the information needs for the context-aware route recommendation system for emergency evacuation in indoor spaces. In the end, a simulation-based application example exploits SBEO using Context-Aware Emergency Evacuation Software (CAREE).","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"78 1","pages":"51-76"},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84719257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Miroslav Stefanović, D. Przulj, Darko Stefanović, S. Ristić, D. Capko
{"title":"The proposal of new Ethereum request for comments for supporting fractional ownership of non-fungible tokens","authors":"Miroslav Stefanović, D. Przulj, Darko Stefanović, S. Ristić, D. Capko","doi":"10.2298/csis230127038s","DOIUrl":"https://doi.org/10.2298/csis230127038s","url":null,"abstract":"During the last couple of years, non-fungible tokens became the most prominent implementation of blockchain technology apart from cryptocurrencies. This is mainly due to their recent association with digital art, but the application of non-fungible tokens has been in the focus of researchers since the appearance of Blockchain 2.0. It was usually tightly coupled with the research on possible applications of blockchain technology in some real-life applications, such as land administration, healthcare, or supply chain management. Since the initial release of the Ethereum blockchain in 2015, until 2022, more than 44 million smart contracts have been created, and out of those that are still active, more than 70% are based on some prominent templates. In the Ethereum blockchain, the creation of non fungible tokens is usually based on Ethereum Request for Comments 721. In this paper, the authors are proposing the creation of a new standard that would support 23 fractional ownership of non-fungible tokens. Fractional ownership is necessary so 24 non-fungible tokens and blockchain technology could be applied to an even wider 25 number of use cases. This paper also presents an example of a possible implementation of the newly proposed standard in the Solidity programming language.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"143 1","pages":"1133-1155"},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75932415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peter Backeman, Ashalatha Kunnappilly, C. Seceleanu
{"title":"Supporting 5G service orchestration with formal verification","authors":"Peter Backeman, Ashalatha Kunnappilly, C. Seceleanu","doi":"10.2298/csis211001059b","DOIUrl":"https://doi.org/10.2298/csis211001059b","url":null,"abstract":"The 5G communication technology has the ability to create logical net works, called network slices, which are specifically carved to serve particular application domains. Due to the mix of different application criticality, it becomes crucial to verify if the applications? service level agreements are met. In this pa per, we propose a novel framework for modeling and verifying 5G orchestration, considering simultaneous access and admission of new requests to slices as well as virtual network function scheduling and routing. By combining modeling in user friendly UML, with UPPAAL model checking and satisfiability-modulo-theories based model finding, our framework supports both modeling and formal verification of service orchestration. We demonstrate our approach on a e-health case study showing how a user, with no knowledge of formal methods, can model a system in UML and verify that the application meets its requirements.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"18 1","pages":"329-357"},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82185798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inverse halftoning based on sparse representation with boosted dictionary","authors":"Jun Yang, Zihao Liu, Li Chen, Ying Wu, Gang Ke","doi":"10.2298/csis220808022y","DOIUrl":"https://doi.org/10.2298/csis220808022y","url":null,"abstract":"Halftone image is widely used in printing and scanning equipment. It is significant for the halftone image to be preserved and processed. For the different resolution of the display devices, the processing and displaying of halftone image are faced with great challenges, such as Moore pattern and image blur ring. The inverse halftone technique is required to remove the halftone screen. In this paper, we propose an inverse halftone algorithm based on sparse representation with the dictionary learned by two steps: deconvolution and sparse optimization in the transform domain to remove the noise. The main contributions of this paper include three aspects: first, we analysis the denoising effects for different training sets and the dictionary; Then we propose the denoising algorithm through adaptively learning the dictionary, which iteratively remove the noise of the training set and improve the dictionary; Then the inverse halftone algorithm is proposed. Finally, we verify that the noise level in the error diffusion linear model is fixed, and the noise level is only related to the diffusion operator. Experimental results show that the proposed algorithm has better PSNR and visual performance than state-of-the-art methods. The codes and constructed models are available at https://github.com/juneryoung2022/IH-WNNM.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"2 1","pages":"813-829"},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82275490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure cloud internet of vehicles based on blockchain and data transmission scheme of map/reduce","authors":"Hua-Yi Lin","doi":"10.2298/csis220921056l","DOIUrl":"https://doi.org/10.2298/csis220921056l","url":null,"abstract":"Over the past few years, because of the popularity of the Internet of vehicles and cloud computing, the exchange of group information between vehicles is no longer out of reach. Through WiFi/5G wireless communication protocol, vehicles can instantly deliver traffic conditions and accidents to the back end or group vehicles traveling together, which can reduce traffic congestion and accidents. In addition, vehicles transmit real-time road conditions to the cloud vehicle management center, which can also share real-time road conditions and improve the road efficiency for pedestrians and drivers. However, the transmission of information in an open environment raises the issue of personal information security. Most of the security mechanisms provided by the existing Internet of vehicles require centralized authentication servers, which increase the burden of certificate management and computing. Moreover, the road side unit as a decentralized authentication center may be open to hacking or modification, but due to personal privacy and security concerns, vehicle-to-vehicle is not willing to share information with each other. Therefore, this study is conducted through blockchain to ensure the security of vehicle-based information transmission. Moreover, the elliptic curve Diffie-Hellman (ECDH) key exchange protocol and a secure conference key mechanism with direct user confirmation combined with the back-end cloud platform Map/Reduce is proposed to ensure the identities of Mappers and Reducers that participate in the cloud operation, avoid malicious participants to modify the transmission information, so as to achieve secure Map/Reduce operations, and improves vehicle and passenger traffic safety.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"1 1","pages":"137-156"},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87857815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Landslide detection based on efficient residual channel attention mechanism network and faster R-CNN","authors":"Yabing Jin, Ou Ou, Shanwen Wang, Yijun Liu, Haoqing Niu, X. Leng","doi":"10.2298/csis220831003j","DOIUrl":"https://doi.org/10.2298/csis220831003j","url":null,"abstract":"Accurate landslide detection plays an important role in land planning, disaster prediction and disaster relief. At present, field investigation and exploration based on professional personnel is the most widely used landslide mapping and detection technology, but this method consumes a lot of manpower and material resources and is inefficient. With the development of artificial intelligence, landslide identification and target detection based on deep learning have attracted more and more attention due to their remarkable advantages over traditional technologies. It is a technical problem to identify landslides from satellite remote sensing images. Although there are some methods at present, there is still room for improvement in the target detection algorithm of landslides against the background of the diversity and complexity of landslides. In this paper, target detection algorithm models such as Faster R-CNN apply to landslide recognition and detection tasks, and various commonly used recognition and detection algorithm network structures are used as the basic models for landslide recognition. Efficient residual channel soft thresholding attention mechanism algorithm (ERCA) is proposed, which intends to reduce the background noise of images in complex environments by means of deep learning adaptive soft thresholding to improve the feature learning capability of deep learning target detection algorithms. ERCA is added to the backbone network of the target detection algorithm for basic feature extraction to enhance the feature extraction and expression capability of the network. During the experiment ERCA combined with ResNet50, ResNet101 and other backbone networks, the objective indicators of detection results such as AP50 (Average Precision at IOU=0.50), AP75 (Average Precision at IOU=0.75) and AP (Average Precision) were improved, and the AP values were all improved to about 4%, and the final detection results using ResNet101 combined with ERCA as the backbone network reached 76.4% AP value. ERCA and other advanced channel attention networks such as ECA (Efficient Channel Attention for Deep Convolutional Neural Networks) and SENet (Squeeze-and-Excitation Networks) are fused into the backbone network of the target detection algorithm and experimented on the landslide identification detection task, and the detection results are that the objective detection indexes AP50, AP75, AP, etc. are higher for ERCA compared with other channel attention, and the subjective detection image detection effect and feature map visualization display are also better. We released our code at: https://github.com/fluoritess/Efficient-residual-channel-attention-mechanism-network-and-Faster-R-CNN.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"1 1","pages":"893-910"},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81281257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}