15,939 research outputs found

    Identification and resolution of anomalies in process models using patterns

    Get PDF
    Modeliranje procesa i metodološka istraživanja modeliranja funkcionalnosti (funkcija, procesa, aktivnosti, operacija, itd.) provode se od početaka razvoja i primjene računala. Pritom su predmet interesa metode i tehnike modeliranja, ali i anomalije modela te njihovo otkrivanje i otklanjanje. Suvremene servisno orijentirane arhitekture, razvoj vođen transformacijom modela i općenito težnja prema automatiziranom razvoju, daju novu važnost istraživanjima anomalija modela procesa i drugih modela funkcionalnosti. Rad se bavi istraživanjem anomalija u modelima procesa, njihovim osobinama, zajedničkim obilježjima, podjelom, metodama i metodikama prepoznavanja, te rješavanja uz primjenu uzoraka. Temeljni pristup otkrivanja i rješavanja anomalija u radu je formiranje taksonomije anomalija, te opis njihovih svojstava i uzoraka. Namjera je da se za svaku klasu anomalija odrede metode otkrivanja i rješavanja, s ciljem automatizacije prepoznavanja i rješavanja anomalija.Anomalies in business process models represent situations in which there is a deviation from the rules of modeling and presentation models. Anomalies are departures from the expected or normal structure, behavior, functionality, performance and etc. Since anomalies have certain common properties and characteristics by which they can be grouped and classified, we can say that the anomalies are actually patterns that cause deviations from normal behavior model and need to be cleared. A model in which exists an anomaly is defective and requires additional intervention which corrects this model. Anomalies in the models of business processes can occur during: modeling, modify models and conversion models. Problems with anomalies especially come to the fore in the case of conversion models from one notation to another. In this case, different uses of specific notation usually dictate and emphasis details on individual elements of the model. For this reason, may cause loss of information during this transformation. This paper deals with anomalies in the models of business processes, their properties, characteristics and features, by developing their taxonomy, the ways of their recognition and ways of their solution. This paper presents an overview of anomalies, which are classified according to certain characteristics. For each anomaly is given a description and example. He also suggested a way to identify and solve, in the form of OCL rules or in pseudo-code. Finally worked out a proposal automation to identify and solve anomalies based on pattern recognition, and our model is tested on several examples

    Comprehensive Security Framework for Global Threats Analysis

    Get PDF
    Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Behavioral Analysis are becoming new solutions to normalize the IS information and counter these new threads. This paper presents a framework which details the principal and necessary steps for monitoring an IS. We present the architecture of the framework, i.e. an ontology of activities carried out within an IS to model security information and User Behavioral analysis. The results of the performed experiments on real data show that the modeling is effective to reduce the amount of events by 91%. The User Behavioral Analysis on uniform modeled data is also effective, detecting more than 80% of legitimate actions of attack scenarios

    Analytical Challenges in Modern Tax Administration: A Brief History of Analytics at the IRS

    Get PDF

    Construction of a taxonomy for requirements engineering commercial-off-the-shelf components

    Get PDF
    This article presents a procedure for constructing a taxonomy of COTS products in the field of Requirements Engineering (RE). The taxonomy and the obtained information reach transcendental benefits to the selection of systems and tools that aid to RE-related actors to simplify and facilitate their work. This taxonomy is performed by means of a goal-oriented methodology inspired in GBRAM (Goal-Based Requirements Analysis Method), called GBTCM (Goal-Based Taxonomy Construction Method), that provides a guide to analyze sources of information and modeling requirements and domains, as well as gathering and organizing the knowledge in any segment of the COTS market. GBTCM claims to promote the use of standards and the reuse of requirements in order to support different processes of selection and integration of components.Peer ReviewedPostprint (published version
    corecore