Latest Articles from JUCS - Journal of Universal Computer Science Latest 8 Articles from JUCS - Journal of Universal Computer Science https://lib.jucs.org/ Thu, 28 Mar 2024 17:17:16 +0200 Pensoft FeedCreator https://lib.jucs.org/i/logo.jpg Latest Articles from JUCS - Journal of Universal Computer Science https://lib.jucs.org/ Digitalization Canvas - Towards Identifying Digitalization Use Cases and Projects https://lib.jucs.org/article/23691/ JUCS - Journal of Universal Computer Science 23(11): 1070-1097

DOI: 10.3217/jucs-023-11-1070

Authors: Andreas Heberle, Welf Löwe, Anders Gustafsson, Örjan Vorrei

Abstract: Nowadays, many companies are running digitalization initiatives or are planning to do so. There exist various models to evaluate the digitalization potential of a company and to define the maturity level of a company in exploiting digitalization technologies summarized under buzzwords such as Big Data, Artificial Intelligence (AI), Deep Learning, and the Industrial Internet of Things (IIoT). While platforms, protocols, patterns, technical implementations, and standards are in place to adopt these technologies, small- to medium-sized enterprises (SME) still struggle with digitalization. This is because it is hard to identify the most beneficial projects with manageable cost, limited resources and restricted know-how. In the present paper, we describe a real-life project where digitalization use cases have been identified, evaluated, and prioritized with respect to benefits and costs. This effort led to a portfolio of projects, some with quick and easy wins and some others with mid- to long-term benefits. From our experiences, we extracted a general approach that could be useful for other SMEs to identify concrete digitalization activities and to define projects implementing their digital transformation. The results are summarized in a Digitalization Canvas.

HTML

XML

PDF

]]>
Research Article Tue, 28 Nov 2017 00:00:00 +0200
Big Data in Cross-Disciplinary Research https://lib.jucs.org/article/23681/ JUCS - Journal of Universal Computer Science 23(11): 1035-1037

DOI: 10.3217/jucs-023-11-1035

Authors: Giangiacomo Bravo, Mikko Laitinen, Magnus Levin, Welf Löwe, Göran Petersson

Abstract: The ubiquity of sensor, computing, communication, and storage technologies provides us with access to previously unknown amounts of data - Big Data. Big Data has revolutionized research communities and their scientific methodologies. It has, for instance, innovated the approaches to knowledge and theory building, validation, and exploitation taken in the engineering sciences. The humanities and social sciences even face a paradigm shift away from data-scarce, static, coarse-grained and simple studies towards data-rich, dynamic, high resolution, and complex observations and simulations. The present focused topic presents investigations from different research fields in which the focus is either on utilizing Big Data or charting the benefits of using such evidence in basic research.

HTML

XML

PDF

]]>
Research Article Tue, 28 Nov 2017 00:00:00 +0200
A Secure Multi-Layer e-Document Method for Improving e-Government Processes https://lib.jucs.org/article/23647/ JUCS - Journal of Universal Computer Science 20(11): 1583-1604

DOI: 10.3217/jucs-020-11-1583

Authors: Gia Vo, Richard Lai

Abstract: In recent years, there has been a tremendous growth in e-Government services due to advances in Information Communication Technology and the number of citizens engaging in e-Government transactions. In government administration, it is very time consuming to process different types of documents and there are many data input problems. There is also a need to satisfy citizens’ requests to retrieve government information and to link these requests to build an online document without asking the citizen to input the data more than once. To provide an e-Government service which is easy to access, fast and secure, the e-Document plays an important role in the management and interoperability of e-Government Systems. To meet these challenges, this paper presents a Secure Multilayer e-Application (SMeA) method for improving e-Government processes. This method involves five steps: namely (i) identifying an e-Template; (ii) building a SMeA; (iii) mapping the data; (iv) processing the e-Application; and (v) approving the e-Application. The first step involves requirements analysis and the last four involve data analysis for building a SMeA. To demonstrate its usefulness, we applied SMeA to a case study of an application for a licence to set up a new business in Vietnam.

HTML

XML

PDF

]]>
Research Article Tue, 28 Oct 2014 00:00:00 +0200
Key Person Analysis in Social Communities within the Blogosphere https://lib.jucs.org/article/23086/ JUCS - Journal of Universal Computer Science 18(4): 577-597

DOI: 10.3217/jucs-018-04-0577

Authors: Anna Zygmunt, Piotr Bródka, Przemysław Kazienko, Jarosław Koźlak

Abstract: Identifying key persons active in social groups in the blogosphere is performed by means of social network analysis. Two main independent approaches are considered in the paper: (i) discovery of the most important individuals in persistent social communities and (ii) regular centrality measures applied either to social groups or the entire network. A new method for separating of groups stable over time, fulfilling given conditions of activity level of their members is proposed. Furthermore, a new concept for extracting user roles and key persons in such groups is also presented. This new approach was compared to the typical clustering method and the structural node position measure applied to rank users. The experimental studies have been carried out on real two-year blogosphere data.

HTML

XML

PDF

]]>
Research Article Tue, 28 Feb 2012 00:00:00 +0200
Cloud Warehousing https://lib.jucs.org/article/29977/ JUCS - Journal of Universal Computer Science 17(8): 1183-1201

DOI: 10.3217/jucs-017-08-1183

Authors: Hui Ma, Klaus-Dieter Schewe, Bernhard Thalheim, Qing Wang

Abstract: Data warehouses integrate and aggregate data from various sources to support decision making within an enterprise. Usually, it is assumed that data are extracted from operational databases used by the enterprise. Cloud warehousing relaxes this view permitting data sources to be located anywhere on the world-wide web in a so-called "cloud", which is understood as a registry of services. Thus, we need a model of dataintensive web services, for which we adopt the view of the recently introduced model of abstract state services (AS2s). An AS2 combines a hidden database layer with an operation-equipped view layer, and thus provides an abstraction of web services that can be made available for use by other systems. In this paper we extend this model to an abstract model of clouds by means of an ontology for service description. The ontology can be specified using description logics, where the ABox contains the set of services, and the TBox can be queried to find suitable services. Consequently, AS2 composition can be used for cloud warehousing.

HTML

XML

PDF

]]>
Research Article Thu, 28 Apr 2011 00:00:00 +0300
On Compound Purposes and Compound Reasons for Enabling Privacy https://lib.jucs.org/article/29903/ JUCS - Journal of Universal Computer Science 17(3): 426-450

DOI: 10.3217/jucs-017-03-0426

Authors: Wynand Van Staden, Martin Olivier

Abstract: This paper puts forward a verification method for compound purposes and compound reasons to be used during purpose limitation. When it is absolutely necessary to collect privacy related information, it is essential that privacy enhancing technologies (PETs) protect access to data - in general accomplished by using the concept of purposes bound to data. Compound purposes and reasons are an enhancement of purposes used during purpose limitation and binding and are more expressive than purposes in their general form. Data users specify their access needs by making use of compound reasons which are defined in terms of (compound) purposes. Purposes are organised in a lattice with purposes near the greatest lower bound (GLB) considered weak (less specific) and purposes near the least upper bound (LUB) considered strong (most specific). Access is granted based on the verification of the statement of intent (from the data user) against the compound purpose bound to the data; however, because purposes are in a lattice, the data user is not limited to a statement of intent that matches the purposes bound to the data exactly - the statement can be a true reflection of their intent with the data. Hence, the verification of compound reasons against compound purposes cannot be accomplished by current published verification algorithms. Before presenting the verification method, compound purposes and reasons, as well as the structures used to represent them, and the operators that are used to define compounds is presented. Finally, some thoughts on implementation are provided.

HTML

XML

PDF

]]>
Research Article Tue, 1 Feb 2011 00:00:00 +0200
A Geometrically Enhanced Conceptual Model and Query Language https://lib.jucs.org/article/29840/ JUCS - Journal of Universal Computer Science 16(20): 2986-3015

DOI: 10.3217/jucs-016-20-2986

Authors: Hui Ma

Abstract: Motivated by our experiences with spatial modelling for the sustainable land use initiative we present a geometrically enhanced ER model (GERM), which preserves the key principles of entity-relationship modelling and at the same time introduces bulk constructors and geometric features. The model distinguishes between a syntactic level of types and an explicit internal level, in which types give rise to polyhedra that are defined by algebraic varieties. It further emphasises the stability of algebraic operations by means of a natural modelling algebra that extends the usual Boolean operations on point sets.

HTML

XML

PDF

]]>
Research Article Mon, 1 Nov 2010 00:00:00 +0200
Updates, Schema Updates and Validation of XML Documents - Using Abstract State Machines with Automata-Defined States https://lib.jucs.org/article/29466/ JUCS - Journal of Universal Computer Science 15(10): 2028-2057

DOI: 10.3217/jucs-015-10-2028

Authors: Klaus-Dieter Schewe, Bernhard Thalheim, Qing Wang

Abstract: The exact validation of streaming XML documents can be realised by using visibly push-down automata (VPA) that are defined by Extended Document Type Definitions (EDTD). It is straightforward to represent such an automaton as an Abstract State Machine (ASM). In doing so we enable computations on abstract states that are defined by a certain class of automata, in this case VPAs. In this paper we elaborate on this approach by taking also updates of XML documents into account. In this way the ASM-approach combines vertical refinements, which first make states explicit and then instantiate by a specific EDTD, with horizontal refinements, which replace streaming XML documents by stored ones and then add updates. Furthermore, as the EDTD appears as part of the abstract state, updating it is another natural extension by horizontal refinement. In this way we obtain consistently integrated updates and schema updates for XML documents, which can even be extended to become fault-tolerant by taking at most k errors in the document into consideration. It further provides an example of ASM-based computation with automata-defined states.

HTML

XML

PDF

]]>
Research Article Thu, 28 May 2009 00:00:00 +0300