357 research outputs found
Machine Learning Algorithm for the Scansion of Old Saxon Poetry
Several scholars designed tools to perform the automatic scansion of poetry in many languages, but none of these tools
deal with Old Saxon or Old English. This project aims to be a first attempt to create a tool for these languages. We
implemented a Bidirectional Long Short-Term Memory (BiLSTM) model to perform the automatic scansion of Old Saxon
and Old English poems. Since this model uses supervised learning, we manually annotated the Heliand manuscript, and
we used the resulting corpus as labeled dataset to train the model. The evaluation of the performance of the algorithm
reached a 97% for the accuracy and a 99% of weighted average for precision, recall and F1 Score. In addition, we tested
the model with some verses from the Old Saxon Genesis and some from The Battle of Brunanburh, and we observed that
the model predicted almost all Old Saxon metrical patterns correctly misclassified the majority of the Old English input
verses
Loki : the semantic wiki for collaborative knowledge engineering
We present Loki, a semantic wiki designed to support the collaborative knowledge engineering process with the use of software engineering methods. Designed as a set of DokuWiki plug-ins, it provides a variety of knowledge representation methods, including semantic annotations, Prolog clauses, and business processes and rules oriented to specific tasks. Knowledge stored in Loki can be retrieved via SPARQL queries, in-line Semantic MediaWiki-like queries, or Prolog goals. Loki includes a number of useful features for a group of experts and knowledge engineers developing the wiki, such as knowledge visualization, ontology storage, or code hint and completion mechanism. Reasoning unit tests are also introduced to validate knowledge quality. The paper is complemented by the formulation of the collaborative knowledge engineering process and the description of experiments performed during Loki development to evaluate its functionality. Loki is available as free software at https://loki.re
Recommended from our members
Addressing Resource Variability Through Resource-Driven Adaptation
Software systems execute tasks that depend on different types of resources. However, the variability of resources may interfere with the ability of software systems to execute important tasks. Resource variability can occur due to several reasons including unexpected hardware failures, excess workloads, or lack of materials. For example, in automated warehouses, malfunctioning robots could delay product deliveries causing customer dissatisfaction and, therefore, reducing an enterprise’s sales. Moreover, the unavailability of medical materials hinders the ability of hospitals to perform medically-critical operations causing loss of life. In this thesis, we propose to address the problem of resource variability through resource-driven adaptation, using task models as input for adaptation decisions. The thesis presents the following contributions:
• SPARK: a framework for performing proactive and reactive resource-driven adaptation based on multiple task-related criteria. The framework supports different types of depletable and reusable resources that could face variability. SPARK assists with four types of adaptation, namely: (i) execution of a similar task that requires fewer resources, (ii) substitution of resources by alternative ones, (iii) execution of tasks in a different order, and (iv) cancellation of the execution of tasks.
• SERIES: a task modelling notation and editor tool that enables software practitioners to create task models that serve as input for SPARK. SERIES supports the representation of task priorities, task variants, task execution types, resource types, and properties representing users’ feedback.
SPARK was evaluated in terms of the percentage of executed critical task requests, the average criticality of the executed task requests in comparison to the non-executed ones, overhead, and scalability through two case studies concerned with a medicine consumption system and a manufacturing system. The results of the evaluation showed that SPARK increased the number of executed critical task requests during resource variability. Additionally, the results showed that the time it takes to prepare and apply adaptation plans does not add significant overhead that hinders the ability of software systems to execute tasks in a tolerable waiting time. Furthermore, SPARK was shown to be scalable since the abovementioned time increases polynomially relative to the input size (number of tasks and task variants).
SERIES was evaluated through a user study with twenty software practitioners. The results showed that software practitioners performed very well when explaining and creating task models using SERIES. These results were reflected in the task modelling activities that the participants performed as well as in their positive feedback regarding the usability of SERIES and the clarity of its semantic constructs.
Overall, we conclude that the research presented in the thesis contributes to addressing resource variability through resource-driven adaptation. We also provide suggestions for future work that can extend this research
Recommended from our members
Examining university student satisfaction and barriers to taking online remote exams
Recent years have seen a surge in the popularity of online exams at universities, due to the greater convenience and flexibility they offer both students and institutions. Driven by the dearth of empirical data on distance learning students' satisfaction levels and the difficulties they face when taking online exams, a survey with 562 students at The Open University (UK) was conducted to gain insights into their experiences with this type of exam. Satisfaction was reported with the environment and exams, while work commitments and technical difficulties presented the greatest barriers. Gender, race and disability were also associated with different levels of satisfaction and barriers. This study adds to the increasing number of studies into online exams, demonstrating how this type of exam can still have a substantial effect on students experienced in online learning systems and
technologies
An information privacy compliance model based on configurable software objects
South Africa’s Protection of Personal Information Act (POPIA), Act 4 of 2013 requires that organisations enforce information privacy rules in technology systems handling personally identifiable information (PII). This is in line with other national and regional information privacy legislations across the world. However, the absence of a coherent way to implement this legislation, in the form of software objects in technology systems, has created a gap in organisations around the world. To bridge this gap, this thesis proposes a compliance model based on a conceptual framework, a design framework, and a software-based prototype. The objective of this model is to test how best to enforce information privacy regulations in technology systems handling personally identifiable information. The proposed conceptual framework views information privacy compliance as a context-driven reality enforced by configurable software objects. To refine the conceptual framework, a design framework and a software-based prototype was developed using the design science research methodology as the theoretical construct and the UML ontology language and object-oriented programming paradigms as the underpinning practical construct. This prototype will assist organisational stakeholders in understanding and visualising the theoretical and practical constructs of handling personally identifiable information as software objects in technology systems. The design and implementation of this prototype resulted in some practical and theoretical recommendations. These include the adoption of a decision model notation (DMN) as a formal standard to manage privacy rules and the creation of a context-aware privacy compliance zone (CAP). However, the main contribution of this thesis is a reusable conceptual and contextual design framework and a prototype through which POPIA rules, or those of any similar information privacy law, such as the European General Data Protection Regulation (GDPR), can be encapsulated into software objects used in technology systems to ease compliance with information privacy regulations.Thesis (PhD) -- Faculty of Engineering, the Built Environment, and Technology, 202
Evaluating Resilience of Cyber-Physical-Social Systems
Nowadays, protecting the network is not the only security concern. Still, in cyber security,
websites and servers are becoming more popular as targets due to the ease with which
they can be accessed when compared to communication networks. Another threat in
cyber physical social systems with human interactions is that they can be attacked and
manipulated not only by technical hacking through networks, but also by manipulating
people and stealing users’ credentials. Therefore, systems should be evaluated beyond cy-
ber security, which means measuring their resilience as a piece of evidence that a system
works properly under cyber-attacks or incidents. In that way, cyber resilience is increas-
ingly discussed and described as the capacity of a system to maintain state awareness for
detecting cyber-attacks. All the tasks for making a system resilient should proactively
maintain a safe level of operational normalcy through rapid system reconfiguration to
detect attacks that would impact system performance. In this work, we broadly studied
a new paradigm of cyber physical social systems and defined a uniform definition of it.
To overcome the complexity of evaluating cyber resilience, especially in these inhomo-
geneous systems, we proposed a framework including applying Attack Tree refinements
and Hierarchical Timed Coloured Petri Nets to model intruder and defender behaviors
and evaluate the impact of each action on the behavior and performance of the system.Hoje em dia, proteger a rede não é a única preocupação de segurança. Ainda assim, na
segurança cibernética, sites e servidores estão se tornando mais populares como alvos
devido à facilidade com que podem ser acessados quando comparados às redes de comu-
nicação. Outra ameaça em sistemas sociais ciberfisicos com interações humanas é que eles
podem ser atacados e manipulados não apenas por hackers técnicos através de redes, mas
também pela manipulação de pessoas e roubo de credenciais de utilizadores. Portanto, os
sistemas devem ser avaliados para além da segurança cibernética, o que significa medir
sua resiliência como uma evidência de que um sistema funciona adequadamente sob
ataques ou incidentes cibernéticos. Dessa forma, a resiliência cibernética é cada vez mais
discutida e descrita como a capacidade de um sistema manter a consciência do estado para
detectar ataques cibernéticos. Todas as tarefas para tornar um sistema resiliente devem
manter proativamente um nível seguro de normalidade operacional por meio da reconfi-
guração rápida do sistema para detectar ataques que afetariam o desempenho do sistema.
Neste trabalho, um novo paradigma de sistemas sociais ciberfisicos é amplamente estu-
dado e uma definição uniforme é proposta. Para superar a complexidade de avaliar a
resiliência cibernética, especialmente nesses sistemas não homogéneos, é proposta uma
estrutura que inclui a aplicação de refinamentos de Árvores de Ataque e Redes de Petri
Coloridas Temporizadas Hierárquicas para modelar comportamentos de invasores e de-
fensores e avaliar o impacto de cada ação no comportamento e desempenho do sistema
Web-IDE for Low-Code Development in OutSystems
Due to the growing popularity of cloud computing and its numerous benefits, many
desktop applications have been, and will continue to be, migrated into the cloud and
made available through the web. These applications can then be accessed through any
device that has access to a browser and internet connection, eliminating the need for
installation or managing dependencies. Moreover, the process of introduction to the
product is much simpler, faster and collaboration aspects are facilitated.
OutSystems is a company that provides software that enables, through an Integrated
Development Environment (IDE) and a specific Low-Code language, users to securely
and rapidly build robust applications. However, there are only available desktop versions
of this IDE. For this reason, the objective of the proposed thesis is to understand what
would be the best path for developing a Web-based version of the IDE.
To achieve this, it is important not only to understand the OutSystems Platform and,
more specifically, the architecture of the Service Studio IDE, which is the component IDE
provided by the product, but also to explore the state-of-the-art technologies that could
prove to be beneficial for the development of the project.
The goal of this work is to debate different architectural possibilities to implement
the project in question and present a conclusion as to what the adequate course of action,
given the context of the problem. After distinguishing what are the biggest uncertainties
and relevant points, a proof of concept is to be presented accompanied with the respective
implementation details.
Finally, this work intends to determine what would be a viable technological architecture
to build a Web-based IDE that is capable of maintaining an acceptable performance,
similarly to Service Studio IDE, while also insuring that the this system is scalable, in
order to be able to provide the service to a large amount of users. That is to say, to present
a conclusion regarding the feasibility of the project proposed.Devido ao aumento de popularidade de tecnologias de computação cloud e as suas inúmeras
vantagens, aplicações desktop estão e vão continuar a ser migradas para a cloud para
que possam ser acedidas através da web. Estas aplicações podem ser acedidas através de
qualquer dispositivo que tenha acesso à internet, eliminando a necessidade de instalação e
gestão de dependências. Além disso, o processo de introdução ao produto é simplificado,
mais rápido e a colaboração é facilitada.
A OutSystems é uma empresa que disponibiliza um software que faz com que utilizadores,
através de um IDE e uma linguagem de baixo nível, possam criar aplicações
robustas de forma rápida e segura. No entanto, atualmente só existem versões deste IDE
para desktop. Como tal, o objetivo da tese proposta é perceber qual será a melhor forma
de desenvolver uma versão do IDE sobre a Web.
Para alcançar isto, é importante não só compreender a Plataforma OutSystems e, mais
especificamente, a arquitetura do Service Studio IDE, que é o principal componente disponibilizado
pelo produto, mas também explorar as tecnologias estado de arte que podem
ser benéficas para o desenvolvimento do projeto.
O objetivo deste trabalho é debater diferentes arquiteturas possíveis para a implementação
do projeto e concluir qual será o curso de ação adequado, dado o contexto
do problema. Após distinguir quais são os maiores pontos de incerteza, uma prova de
conceito é apresentada juntamente com os respetivos detalhes de implementação.
Finalmente, este trabalho tem como intenção detalhar uma arquitetura tecnológica
viável para construir um IDE na web capaz de manter uma performance aceitável, semelhante
à do Service Studio IDE, e garantir a escalabilidade do sistema, de forma a
conseguir oferecer o serviço a um número elevado de utilizadores. Por outras palavras,
apresentar uma conclusão em relação à viabilidade do projeto proposto
Transformation From CIM to PIM: A Systematic Mapping
Model Driven Architecture (MDA) is the most prominent and accepted methodology based
on the Model Driven Development (MDD) principles. MDA includes three abstraction levels: Computer
Independent Models (CIM), Platform Independent models (PIM) and Platform speci c models (PSM).
MDA encourages the automatic transformation of models as a means to increase the speed of the software
development process and to prevent human errors. There are plenty of solutions to transform PIMs to PSMs,
however the CIM to PIM transformation does not receive a similar attention. In that sense, this paper aims to
describe a systematic mapping to analyze the main characteristics of the approaches that deal with the CIM
to PIM transformation as well as to discuss research directions stemming out from our analysis. The results
of this mapping study could be a valuable information source for the scienti c community in order to know
the real advances in this topic and to avoid unnecessary effort dealing with problems that have already been
addressed. For example, this study yielded the models at the CIM level that have already been transformed
into models at the PIM level. Hence, with this information, the researchers could focus their attention on
nding solutions to transform those models at CIM level that have not been transformed into models at PIM
level. Likewise, this mapping study provides information regarding the technological support of this type of
transformation. This information could be useful for those software projects interested to adopt MDA.Postdoctoral Fellowship through the Institute of Computer Technologies and Information Security, Southern Federal University PD/20-02-K
An information privacy compliance model based on configurable software objects
South Africa’s Protection of Personal Information Act (POPIA), Act 4 of 2013 requires that organisations enforce information privacy rules in technology systems handling personally identifiable information (PII). This is in line with other national and regional information privacy legislations across the world. However, the absence of a coherent way to implement this legislation, in the form of software objects in technology systems, has created a gap in organisations around the world. To bridge this gap, this thesis proposes a compliance model based on a conceptual framework, a design framework, and a software-based prototype. The objective of this model is to test how best to enforce information privacy regulations in technology systems handling personally identifiable information. The proposed conceptual framework views information privacy compliance as a context-driven reality enforced by configurable software objects. To refine the conceptual framework, a design framework and a software-based prototype was developed using the design science research methodology as the theoretical construct and the UML ontology language and object-oriented programming paradigms as the underpinning practical construct. This prototype will assist organisational stakeholders in understanding and visualising the theoretical and practical constructs of handling personally identifiable information as software objects in technology systems. The design and implementation of this prototype resulted in some practical and theoretical recommendations. These include the adoption of a decision model notation (DMN) as a formal standard to manage privacy rules and the creation of a context-aware privacy compliance zone (CAP). However, the main contribution of this thesis is a reusable conceptual and contextual design framework and a prototype through which POPIA rules, or those of any similar information privacy law, such as the European General Data Protection Regulation (GDPR), can be encapsulated into software objects used in technology systems to ease compliance with information privacy regulations.Thesis (PhD) -- Faculty of Engineering, the Built Environment, and Technology, 202
- …