114 research outputs found

    The CUBIST Project: Combining and Uniting Business Intelligence with Semantic Technologies

    Get PDF
    As a preface to this Special 'CUBIST' Edition of the International Journal of Intelligent Information Technologies IJIIT, this article describes the European Framework Seven Combining and Unifying Business Intelligence with Semantic Technologies CUBIST project, which ran from October 2010 to September 2013. The project aimed to combine the best elements of traditional BI with the newer, semantic, technologies of the Sematic Web, in the form of the Resource Description Framework RDF, and Formal Concept Analysis FCA. CUBIST's purpose was to provide end-users with "conceptually relevant and user friendly visual analytics" to allow them to explore their data in new ways, discovering hidden meaning and solving hitherto difficult problems. To this end, three of the partners in CUBIST were use-cases: recruitment consultancy, computational biology and the space industry. Each use-case provided their own requirements and problems that were finally addressed by the prototype CUBIST visual-analytics developed in the project

    eHR Cloud Transformation: Implementation Approach and Success Factors

    Full text link
    [EN] The article covers process models for HR IT projects and in particular for HR transformation projects. Based on the authors' experience, an applied process model for HR transformation projects in a cloud-based environment is derived. The article identifies findings applicable to the fields of organisation, business, and IT as well as decisions and critical success factors in the specific context of cloud-based HR solutions.Ziebell, R.; Albors Garrigós, J.; M.Schultz; Schoeneberg, KP.; Perelló Marín, MR. (2019). eHR Cloud Transformation: Implementation Approach and Success Factors. International Journal of Intelligent Information Technologies. 15(1):1-21. https://doi.org/10.4018/IJIIT.2019010101S12115

    A Transaction-oriented architecture for enterprise systems

    Get PDF
    Many enterprises risk business transactions based on information systems that are incomplete or misleading, given that 80-85% of all corporate information remains outside of their processing scope. It highlights that the bulk of information is too unstructured for these systems to process, but must be taken into account if those systems are to provide effective support. Computer technology nonetheless continues to become more and more predominant, illustrated by SAP A.G. recognising that 65-70% of the world's transactions are run using their technology. Using SAP as an illustrative case study, and by bringing in the benefits of technologies such as Service-Oriented Architecture (SOA), Business Process Management (BPM), Enterprise Architecture Frameworks (EA) and Conceptual Structures, a practical roadmap is identified to a Transaction-Oriented Architecture (TOA) that is predicated on the Transaction Concept. This concept builds upon the Resources-Events-Agents (REA) modelling pattern that is close to business reality. Enterprise systems can thus better incorporate that missing 80-85% of hitherto too-unstructured information thereby allowing enterprise systems vendors such as SAP, their competitors, customers, suppliers and partners to do an ever better job with the world's transactions

    Arabic Query Expansion Using WordNet and Association Rules

    Get PDF
    Query expansion is the process of adding additional relevant terms to the original queries to improve the performance of information retrieval systems. However, previous studies showed that automatic query expansion using WordNet do not lead to an improvement in the performance. One of the main challenges of query expansion is the selection of appropriate terms. In this paper, we review this problem using Arabic WordNet and Association Rules within the context of Arabic Language. The results obtained confirmed that with an appropriate selection method, we are able to exploit Arabic WordNet to improve the retrieval performance. Our empirical results on a sub-corpus from the Xinhua collection showed that our automatic selection method has achieved a significant performance improvement in terms of MAP and recall and a better precision with the first top retrieved documents

    An Approach to Transform Public Administration into SOA-based Organizations

    Get PDF
    Nowadays, Service-Oriented Architectures (SOA) is widely spread in private organizations. However, when transferring this knowledge to Public Administration, it is realized that it has not been transformed in terms of its legal nature into organizations capable to operate under the SOA paradigm. This fact prevents public administration bodies from offering the efficient services they have been provided by different boards of governments. A high-level framework to perform this transformation is proposed. Taking it as starting point, an instance of a SOA Target Meta-Model can be obtained by means of an iterative and incremental process based on the analysis of imperatives and focused on the particular business context of each local public administration. This paper briefly presents a practical experience consisting in applying this process to a Spanish regional public administration.Junta de Andalucía TIC-578

    A transactions pattern for structuring unstructured corporate information in enterprise applications

    Get PDF
    It is known that 80-85% of all corporate information remains unstructured. As such, many enterprises rely on information systems that cause them to risk transactions that are based on lack of information (errors of omission) or misleading information (errors of commission). To address this concern, the fundamental business concept of monetary transactions is extended to include qualitative business concepts. A Transaction Model (TM) is accordingly identified that provides a structure for these unstructured but vital aspects of business transactions. By highlighting how unstructured information can be integrated into transactions, the TM provides businesses with a much more balanced view of the transactions they engage in or to discover novel transactions that they might have otherwise missed. A simple example is provided that illustrates this integration and reveals a key missing element. This discovery points to a transactions pattern that can be used to ensure that all the parties (or agents) in a transaction are identified, as well as capturing unstructured and structured information into a coherent framework. In support of the TM as a pattern, more examples of its use in a variety of domains are given. A number of enterprise applications are suggested such as in multi-agent systems, document text capture, and knowledge management.</p

    Automation of Information Security Risk Assessment

    Get PDF
    An information security audit method (ISA) for a distributed computer network (DCN) of an informatization object (OBI) has been developed. Proposed method is based on the ISA procedures automation by using Bayesian networks (BN) and artificial neural networks (ANN) to assess the risks. It was shown that such a combination of BN and ANN makes it possible to quickly determine the actual risks for OBI information security (IS). At the same time, data from sensors of various hardware and software information security means (ISM) in the OBI DCS segments are used as the initial information. It was shown that the automation of ISA procedures based on the use of BN and ANN allows the DCN IS administrator to respond dynamically to threats in a real time manner, to promptly select effective countermeasures to protect the DC

    Automation of Information Security Risk Assessment

    Get PDF
    An information security audit method (ISA) for a distributed computer network (DCN) of an informatization object (OBI) has been developed. Proposed method is based on the ISA procedures automation by using Bayesian networks (BN) and artificial neural networks (ANN) to assess the risks. It was shown that such a combination of BN and ANN makes it possible to quickly determine the actual risks for OBI information security (IS). At the same time, data from sensors of various hardware and software information security means (ISM) in the OBI DCS segments are used as the initial information. It was shown that the automation of ISA procedures based on the use of BN and ANN allows the DCN IS administrator to respond dynamically to threats in a real time manner, to promptly select effective countermeasures to protect the DC
    corecore