Informatica Economica Vol. 20 No. 3/2016
Issue Topic: Semantic Processing of Text
CONTENTS
Evaluating Knowledge of Business Processes
Andra TURDASAN, Razvan PETRUSEL 5
Any organization relies on processes/procedures in order to organize the
operations. Those processes can be explicit (e.g. textual descriptions of
workflow steps or graphical descriptions) or implicit (e.g. employees have
learned by experience the steps needed to ‘get things done’). A widely
acknowledged fact is that processes change due to internal and/or external
factors. How can managers make sure the employees know the last version of the
process? The current practice is to test employees by multiple-choice
questions. This paper proposes a novel knowledge-testing approach based on
graphical and interactive questions. To validate our approach, we set up a
single-factor controlled experiment with novices and experts in a faculty
admission process. The results show that our approach has better results in
terms of correct answers.
Keywords: Business Process Knowledge Test, Business
Process Management, Evaluate Faculty Admission Process Knowledge
Secure Threat Information Exchange across the Internet of Things for Cyber
Defense in a Fog Computing Environment
Mihai-Gabriel IONITA, Victor-Valeriu PATRICIU 16
Threat information exchange is a critical part of any security system.
Decisions regarding security are taken with more confidence and with more
results when the whole security context is known. The fog computing paradigm
enhances the use cases of the already used cloud computing systems by bringing
all the needed resources to the end-users towards the edge of the network.
While fog decentralizes the cloud, it is very important to correlate security
events which happen in branch offices around the globe for correct and timely
decisions. In this article, we propose an infrastructure based on custom
locally installed OSSEC agents which communicate with a central AlienVault
deployment for event correlation. The agents are based on a neural network
which takes actions based on risk assessment inspired by the human immune
system. All of the threat information is defined by STIX expressions and a
TAXII server can share this information with foreign organizations. The
proposed implementation can successfully be implemented in an IoT scenario,
with added security for the “brownfiled” devices.
Keywords: Cyber Defense, Neural Networks, Intelligent
Threat Exchange, Internet of Things, Fog Computing
Maintenance-Ready Web Application Development
Ion IVAN, Narcis-Cosmin LUCA, Mihai Liviu DESPA, Eduard BUDACU 28
The current paper tackles the subject of developing maintenance-ready web applications. Maintenance is presented as a core stage in a web application’s lifecycle. The concept of maintenance-ready is defined in the context of web application development. Web application maintenance tasks types are enunciated and suitable task types are identified for further analysis. The research hypothesis is formulated based on a direct link between tackling maintenance in the development stage and reducing overall maintenance costs. A live maintenance-ready web application is presented and maintenance related aspects are highlighted. The web application’s features, that render it maintenance-ready, are emphasize. The cost of designing and building the web-application to be maintenance-ready are disclosed. The savings in maintenance development effort facilitated by maintenance ready features are also disclosed. Maintenance data is collected from 40 projects implemented by a web development company. Homogeneity and diversity of collected data is evaluated. A data sample is presented and the size and comprehensive nature of the entire dataset is depicted. Research hypothesis are validated and conclusions are formulated on the topic of developing maintenance-ready web applications. The limits of the research process which represented the basis for the current paper are enunciated. Future research topics are submitted for debate.
Keywords: Software maintenance, Web Development,
Maintenance-ready Applications, Maintenance Cost
Vocabulary Richness Metric for Extracting Author’s Semantic Mark in English
Written Literary Works
Madalina ZURINI, Alin ZAMFIROIU 37
The present paper starts from a short introduction of the major aspects debated
regarding the stylometric measures used for extracting the personal signature
added by a particular author to its English written works. Those measures are
used in the context of indicating an author from a limited cardinality set of
authors being given a set of documents or a defined indicators values which
characterizes the semantic way that an author is writing its works. The paper
addresses the problems of the semantic level of a work depending on the tokens
that he uses in the paper, tokens that are extracted in a preprocessing step of
analysis. The tokens are defined using a lexical ontology, for the English
words referring to WordNet, and the automatic extracting of those tokens from
the words found in the particular processed papers. The main vocabulary
richness evaluation metrics are presented taking into account the major
literature review and extracting the main steps into a new proposed metric that
is combining the vocabulary richness with the semantic layer of a paper. The
concept of author mark is described. The objective of this research paper is
highlighted into the new proposed metric that is non-dependent on the main
subject discussed in the analyzed paper. This objective leads to a general
metric that combines documents from different subjects into a metric that can
describe the vocabulary richness of a specific author depending on the works
that he had written. Furthermore, the analysis is conducting into a time
evolution of this metric, using the extraction of the trend of the author’s
vocabulary richness indicator. Using a set of 13 years values of this
indicator upon a specific author, the results are presented in this research
paper. Future work refers to inserting this metric into a general description
of the author mark into his specific English written works.
Keywords: Stylometry Analysis, Metrics, Author Mark,
Lexical Ontology, Time-Trend Analysis, Intrinsic Plagiarism Detection
Data Content Protection for Virtual Libraries Heritage
Mihai DOINEA, Lorena BATAGAN 46
This paper presents aspects of digital content protection in virtual library
systems. The legislation aspects are presented to better emphasize the need of
new security mechanisms. Integrated library systems architecture is presented
with focus on their main purpose, manipulating and rendering digital content to
end-users. The cultural heritage stored in such systems is an important asset
that needs to be protected against malicious manipulation. The characteristics
of a smart virtual library, supported by an integrated library system, are
analyzed and a security model is proposed for implementation, based on its
particularities. The model aims to be an interface between the interactions of
anonymous users with the Online Public Access Catalog of a virtual library that
assures the protection of digital content. Conclusions are drawn to better
support the idea of cultural persistence by the use of Information Systems.
Keywords: Security, Virtual Libraries, Smart Society,
Digital Rights Management, Content Interaction
E-Voting Solutions for Digital Democracy in Knowledge Society
Marian STOICA, Bogdan GHILIC-MICU 55
Emergent technologies specific to current information and knowledge society,
and social networks influence every aspect of our existence, from lucrative
activities to recreational ones. There is no part of our life that is not
influenced by the explosive development of general information and
communication technologies. We witness a spectacular and until recently
unimagined metamorphoses of work nature, business process reengineering,
controversial evolution of social networks and new directions of electronic
government. Over this background of changes, we take on the tasks of deepening
the understanding of field that is largely unexplored, namely the electronic
vote in digital democracy, without taking any side, pro or against this type of
casting our electoral options. The current context encompasses technological,
legislative, political, economic and social aspects. Even more, the context of
electronic voting in digital democracy involves aspects regarding
globalization, technical challenges concerning interoperability, data
standardization and security.
Keywords: Digital Democracy, Knowledge Society,
E-Voting, Cryptographic Schemes, ICT
A Novel Noise Removal Method Using Neural Networks
Catalina COCIANU, Alexandru STAN 66
In this paper is presented a new technique consisting in applying some
pre-whitening and shrinkage methods followed by a neural network-based
supervised approach for correlated noise removal purposed. In our work the type
of noise and the covariance matrix of noise are known or can be estimated using
the “white wall” method. Due to data dimensionality, a PCA-based compression
technique is used to obtain a tractable solution. The local memories of the
neurons are determined using a supervised learning process based on the
compressed pre-processed inputs and the compressed version of the original
images. The proposed method is evaluated using some of the most commonly used
indicators and the results are reported in the third section of the paper. The
conclusive remarks together with suggestions for further work are supplied in
the final part of the paper.
Keywords: Digital Image Processing, Correlated Noise
Removal, Supervised Learning, Neural Networks, Shrinkage Techniques
PhD Thesis Review: The Usage of Ontologies for the Discovery and Coupling of
Learning Active Components
Ion SMEUREANU 76
Publishing Guide for Authors 78
INFOREC Association 80
|