25 research outputs found

    Weaving Rules into [email protected] for Embedded Smart Systems

    Get PDF
    Smart systems are characterised by their ability to analyse measured data in live and to react to changes according to expert rules. Therefore, such systems exploit appropriate data models together with actions, triggered by domain-related conditions. The challenge at hand is that smart systems usually need to process thousands of updates to detect which rules need to be triggered, often even on restricted hardware like a Raspberry Pi. Despite various approaches have been investigated to efficiently check conditions on data models, they either assume to fit into main memory or rely on high latency persistence storage systems that severely damage the reactivity of smart systems. To tackle this challenge, we propose a novel composition process, which weaves executable rules into a data model with lazy loading abilities. We quantitatively show, on a smart building case study, that our approach can handle, at low latency, big sets of rules on top of large-scale data models on restricted hardware.Comment: pre-print version, published in the proceedings of MOMO-17 Worksho

    Assisting Forensic Identification through Unsupervised Information Extraction of Free Text Autopsy Reports: The Disappearances Cases during the Brazilian Military Dictatorship

    Get PDF
    Anthropological, archaeological, and forensic studies situate enforced disappearance as a strategy associated with the Brazilian military dictatorship (1964–1985), leaving hundreds of persons without identity or cause of death identified. Their forensic reports are the only existing clue for people identification and detection of possible crimes associated with them. The exchange of information among institutions about the identities of disappeared people was not a common practice. Thus, their analysis requires unsupervised techniques, mainly due to the fact that their contextual annotation is extremely time-consuming, difficult to obtain, and with high dependence on the annotator. The use of these techniques allows researchers to assist in the identification and analysis in four areas: Common causes of death, relevant body locations, personal belongings terminology, and correlations between actors such as doctors and police officers involved in the disappearances. This paper analyzes almost 3000 textual reports of missing persons in São Paulo city during the Brazilian dictatorship through unsupervised algorithms of information extraction in Portuguese, identifying named entities and relevant terminology associated with these four criteria. The analysis allowed us to observe terminological patterns relevant for people identification (e.g., presence of rings or similar personal belongings) and automate the study of correlations between actors. The proposed system acts as a first classificatory and indexing middleware of the reports and represents a feasible system that can assist researchers working in pattern search among autopsy reportsThis research was partially funded by Spanish Ministry of Economy, Industry and 5 Competitiveness under its Competitive Juan de la Cierva Postdoctoral Research Programme, grant FJCI-2016-6 28032 and from the European Union, through the Marie Skłodowska-Curie Innovative Training Network ‘CHEurope: Critical Heritage Studies and the Future of Europe’ H2020 Marie Skłodowska-Curie Actions, grant 722416S

    Extending MoWebA for MobileApps with Functions in the Cloud

    Get PDF
    In this work we propose MoWebA Mobile, an extension of a MDD approach, called MoWebA, for the design and generation of the MobileApps-FC. Specifically, in this work we have focused on a specific aspect of the mentioned applications, which is the network communication between the mobile applications and their functions in the cloud.CONACYT – Consejo Nacional de Ciencia y TecnologíaPROCIENCI

    Exploring Model-to-Model Transformations for RIA Architectures by means of a Systematic Mapping Study

    Get PDF
    This study focuses on model-to-model – M2M – transformations, as part of the Model- Driven Development – MDD – approach, for Rich Internet Applications – RIA. The main aim of this study is to identify fields that require further contributions, and/or research opportunities in the previously mentioned context. We applied mapping studies techniques, since these techniques use the same basic methodology as reviews but are more general and aimed at discovering what the research trends are, allowing to identify gaps in the literature. From an initial set of 132 papers, we selected 30 papers first. Then, thanks to experts’ suggestion, we added 3 additional papers. Therefore, we considered 33 research papers. The performed analysis led to various considerations. Among the important ones, we can mention: there are many newly proposed methods, the scarcity of rigorous and formal validation of such methods, the problem of the portability of Platform Independent Models – PIM, and the low number of tools available for MDD.Laboratorio de Investigación y Formación en Informática Avanzad

    Analyzing of Gender Behaviors from Paths Using Process Mining: A Shopping Mall Application

    Full text link
    [EN] The study presents some results of customer paths¿ analysis in a shopping mall. Bluetooth-based technology is used to collect data. The event log containing spatiotemporal information is analyzed with process mining. Process mining is a technique that enables one to see the whole process contrary to data-centric methods. The use of process mining can provide a readily-understandable view of the customer paths. We installed iBeacon devices, a Bluetooth-based positioning system, in the shopping mall. During December 2017 and January and February 2018, close to 8000 customer data were captured. We aim to investigate customer behaviors regarding gender by using their paths. We can determine the gender of customers if they go to the men¿s bathroom or women¿s bathroom. Since the study has a comprehensive scope, we focused on male and female customers¿ behaviors. This study shows that male and female customers have different behaviors. Their duration and paths, in general, are not similar. In addition, the study shows that the process mining technique is a viable way to analyze customer behavior using Bluetooth-based technology.Dogan, O.; Bayo-Monton, JL.; Fernández Llatas, C.; Oztaysi, B. (2019). Analyzing of Gender Behaviors from Paths Using Process Mining: A Shopping Mall Application. Sensors. 19(3):1-20. https://doi.org/10.3390/s19030557S120193Oosterlinck, D., Benoit, D. F., Baecke, P., & Van de Weghe, N. (2017). Bluetooth tracking of humans in an indoor environment: An application to shopping mall visits. Applied Geography, 78, 55-65. doi:10.1016/j.apgeog.2016.11.005Merad, D., Aziz, K.-E., Iguernaissi, R., Fertil, B., & Drap, P. (2016). Tracking multiple persons under partial and global occlusions: Application to customers’ behavior analysis. Pattern Recognition Letters, 81, 11-20. doi:10.1016/j.patrec.2016.04.011Wu, Y., Wang, H.-C., Chang, L.-C., & Chou, S.-C. (2015). Customer’s Flow Analysis in Physical Retail Store. Procedia Manufacturing, 3, 3506-3513. doi:10.1016/j.promfg.2015.07.672Dogan, O., & Öztaysi, B. (2018). In-store behavioral analytics technology selection using fuzzy decision making. Journal of Enterprise Information Management, 31(4), 612-630. doi:10.1108/jeim-02-2018-0035Hwang, I., & Jang, Y. J. (2017). Process Mining to Discover Shoppers’ Pathways at a Fashion Retail Store Using a WiFi-Base Indoor Positioning System. IEEE Transactions on Automation Science and Engineering, 14(4), 1786-1792. doi:10.1109/tase.2017.2692961Abedi, N., Bhaskar, A., Chung, E., & Miska, M. (2015). Assessment of antenna characteristic effects on pedestrian and cyclists travel-time estimation based on Bluetooth and WiFi MAC addresses. Transportation Research Part C: Emerging Technologies, 60, 124-141. doi:10.1016/j.trc.2015.08.010Mou, S., Robb, D. J., & DeHoratius, N. (2018). Retail store operations: Literature review and research directions. European Journal of Operational Research, 265(2), 399-422. doi:10.1016/j.ejor.2017.07.003Fernandez-Llatas, C., Lizondo, A., Monton, E., Benedi, J.-M., & Traver, V. (2015). Process Mining Methodology for Health Process Tracking Using Real-Time Indoor Location Systems. Sensors, 15(12), 29821-29840. doi:10.3390/s151229769Van der Aalst, W. M. P., van Dongen, B. F., Herbst, J., Maruster, L., Schimm, G., & Weijters, A. J. M. M. (2003). Workflow mining: A survey of issues and approaches. Data & Knowledge Engineering, 47(2), 237-267. doi:10.1016/s0169-023x(03)00066-1Ou-Yang, C., & Winarjo, H. (2011). Petri-net integration – An approach to support multi-agent process mining. Expert Systems with Applications, 38(4), 4039-4051. doi:10.1016/j.eswa.2010.09.066Partington, A., Wynn, M., Suriadi, S., Ouyang, C., & Karnon, J. (2015). Process Mining for Clinical Processes. ACM Transactions on Management Information Systems, 5(4), 1-18. doi:10.1145/2629446Yoo, S., Cho, M., Kim, E., Kim, S., Sim, Y., Yoo, D., … Song, M. (2016). Assessment of hospital processes using a process mining technique: Outpatient process analysis at a tertiary hospital. International Journal of Medical Informatics, 88, 34-43. doi:10.1016/j.ijmedinf.2015.12.018Funkner, A. A., Yakovlev, A. N., & Kovalchuk, S. V. (2017). Towards evolutionary discovery of typical clinical pathways in electronic health records. Procedia Computer Science, 119, 234-244. doi:10.1016/j.procs.2017.11.181Jans, M., Alles, M., & Vasarhelyi, M. (2013). The case for process mining in auditing: Sources of value added and areas of application. International Journal of Accounting Information Systems, 14(1), 1-20. doi:10.1016/j.accinf.2012.06.015Yoshimura, Y., Sobolevsky, S., Ratti, C., Girardin, F., Carrascal, J. P., Blat, J., & Sinatra, R. (2014). An Analysis of Visitors’ Behavior in the Louvre Museum: A Study Using Bluetooth Data. Environment and Planning B: Planning and Design, 41(6), 1113-1131. doi:10.1068/b130047pDe Leoni, M., van der Aalst, W. M. P., & Dees, M. (2016). A general process mining framework for correlating, predicting and clustering dynamic behavior based on event logs. Information Systems, 56, 235-257. doi:10.1016/j.is.2015.07.003Rebuge, Á., & Ferreira, D. R. (2012). Business process analysis in healthcare environments: A methodology based on process mining. Information Systems, 37(2), 99-116. doi:10.1016/j.is.2011.01.003Arroyo, R., Yebes, J. J., Bergasa, L. M., Daza, I. G., & Almazán, J. (2015). Expert video-surveillance system for real-time detection of suspicious behaviors in shopping malls. Expert Systems with Applications, 42(21), 7991-8005. doi:10.1016/j.eswa.2015.06.016Popa, M. C., Rothkrantz, L. J. M., Shan, C., Gritti, T., & Wiggers, P. (2013). Semantic assessment of shopping behavior using trajectories, shopping related actions, and context information. Pattern Recognition Letters, 34(7), 809-819. doi:10.1016/j.patrec.2012.04.015Kang, L., & Hansen, M. (2017). Behavioral analysis of airline scheduled block time adjustment. Transportation Research Part E: Logistics and Transportation Review, 103, 56-68. doi:10.1016/j.tre.2017.04.004Rovani, M., Maggi, F. M., de Leoni, M., & van der Aalst, W. M. P. (2015). Declarative process mining in healthcare. Expert Systems with Applications, 42(23), 9236-9251. doi:10.1016/j.eswa.2015.07.040Fernández-Llatas, C., Benedi, J.-M., García-Gómez, J., & Traver, V. (2013). Process Mining for Individualized Behavior Modeling Using Wireless Tracking in Nursing Homes. Sensors, 13(11), 15434-15451. doi:10.3390/s131115434Van der Aalst, W. M. P., Reijers, H. A., Weijters, A. J. M. M., van Dongen, B. F., Alves de Medeiros, A. K., Song, M., & Verbeek, H. M. W. (2007). Business process mining: An industrial application. Information Systems, 32(5), 713-732. doi:10.1016/j.is.2006.05.003M. Valle, A., A.P. Santos, E., & R. Loures, E. (2017). Applying process mining techniques in software process appraisals. Information and Software Technology, 87, 19-31. doi:10.1016/j.infsof.2017.01.004Juhaňák, L., Zounek, J., & Rohlíková, L. (2019). Using process mining to analyze students’ quiz-taking behavior patterns in a learning management system. Computers in Human Behavior, 92, 496-506. doi:10.1016/j.chb.2017.12.015Sedrakyan, G., De Weerdt, J., & Snoeck, M. (2016). Process-mining enabled feedback: «Tell me what I did wrong» vs. «tell me how to do it right». Computers in Human Behavior, 57, 352-376. doi:10.1016/j.chb.2015.12.040Schoor, C., & Bannert, M. (2012). Exploring regulatory processes during a computer-supported collaborative learning task using process mining. Computers in Human Behavior, 28(4), 1321-1331. doi:10.1016/j.chb.2012.02.016Werner, M., & Gehrke, N. (2015). Multilevel Process Mining for Financial Audits. IEEE Transactions on Services Computing, 8(6), 820-832. doi:10.1109/tsc.2015.2457907De Weerdt, J., Schupp, A., Vanderloock, A., & Baesens, B. (2013). Process Mining for the multi-faceted analysis of business processes—A case study in a financial services organization. Computers in Industry, 64(1), 57-67. doi:10.1016/j.compind.2012.09.010Herbert, L., Hansen, Z. N. L., Jacobsen, P., & Cunha, P. (2014). Evolutionary Optimization of Production Materials Workflow Processes. Procedia CIRP, 25, 53-60. doi:10.1016/j.procir.2014.10.010Yim, J., Jeong, S., Gwon, K., & Joo, J. (2010). Improvement of Kalman filters for WLAN based indoor tracking. Expert Systems with Applications, 37(1), 426-433. doi:10.1016/j.eswa.2009.05.047Delafontaine, M., Versichele, M., Neutens, T., & Van de Weghe, N. (2012). Analysing spatiotemporal sequences in Bluetooth tracking data. Applied Geography, 34, 659-668. doi:10.1016/j.apgeog.2012.04.003Frisby, J., Smith, V., Traub, S., & Patel, V. L. (2017). Contextual Computing : A Bluetooth based approach for tracking healthcare providers in the emergency room. Journal of Biomedical Informatics, 65, 97-104. doi:10.1016/j.jbi.2016.11.008Yoshimura, Y., Krebs, A., & Ratti, C. (2017). Noninvasive Bluetooth Monitoring of Visitors’ Length of Stay at the Louvre. IEEE Pervasive Computing, 16(2), 26-34. doi:10.1109/mprv.2017.33Cao, Q., Jones, D. R., & Sheng, H. (2014). Contained nomadic information environments: Technology, organization, and environment influences on adoption of hospital RFID patient tracking. Information & Management, 51(2), 225-239. doi:10.1016/j.im.2013.11.007Larson, J. S., Bradlow, E. T., & Fader, P. S. (2005). An exploratory look at supermarket shopping paths. International Journal of Research in Marketing, 22(4), 395-414. doi:10.1016/j.ijresmar.2005.09.005Fernandez-Llatas, C., Martinez-Millana, A., Martinez-Romero, A., Benedi, J. M., & Traver, V. (2015). Diabetes care related process modelling using Process Mining techniques. Lessons learned in the application of Interactive Pattern Recognition: coping with the Spaghetti Effect. 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). doi:10.1109/embc.2015.7318809Conca, T., Saint-Pierre, C., Herskovic, V., Sepúlveda, M., Capurro, D., Prieto, F., & Fernandez-Llatas, C. (2018). Multidisciplinary Collaboration in the Treatment of Patients With Type 2 Diabetes in Primary Care: Analysis Using Process Mining. Journal of Medical Internet Research, 20(4), e127. doi:10.2196/jmir.8884De Medeiros, A. K. A., Weijters, A. J. M. M., & van der Aalst, W. M. P. (2007). Genetic process mining: an experimental evaluation. Data Mining and Knowledge Discovery, 14(2), 245-304. doi:10.1007/s10618-006-0061-7Heyer, L. J. (1999). Exploring Expression Data: Identification and Analysis of Coexpressed Genes. Genome Research, 9(11), 1106-1115. doi:10.1101/gr.9.11.1106Yang, W.-S., & Hwang, S.-Y. (2006). A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with Applications, 31(1), 56-68. doi:10.1016/j.eswa.2005.09.00

    Process Mining for Smart Product Design

    Get PDF

    A Navigational Role-Centric Model Oriented Web Approach MoWebA

    Full text link
    [ES] Entre los grandes desafíos actuales de las aplicaciones Web podemos citar la portabilidad, adaptabilidad y evolución. Estos desafíos se dan tanto en el ambiente en que operan así como en su desarrollo, ya que a menudo requieren de diferentes lenguajes, frameworks, herramientas, entornos, plataformas, etc. El Desarrollo Dirigido por Modelos (MDD) y en particular, la Arquitectura Dirigida por Modelos (MDA) contemplan estos desafíos proponiendo distintos niveles de abstracción para las diferentes fases de modelado, partiendo de modelos más orientados al problema, que no deberían contemplar aspectos de implementación (CIM, PIM), hasta llegar a los modelos más orientados a la solución planteada (PSM, ISM). Sin embargo, encarar adecuadamente este tema puede depender del grado de independencia que adquieren los modelos. Este trabajo de Tesis presenta un método que considera el problema de la evolución y portabilidad hacia diferentes entornos o arquitecturas en el diseño y desarrollo de aplicaciones Web. La propuesta se denomina MoWebA (del inglés, Model Oriented Web Approach). Durante el desarrollo de la tesis, hemos identificado una serie de aspectos que podrían tener un impacto positivo sobre los problemas de portabilidad y adaptabilidad que son: i) incorporación de un modelo específico de la arquitectura ASM (del inglés, Architecture Specific Model), que permita la portabilidad de los PIMs con respecto a la arquitectura (por ejemplo, RIA, SOA, Mobile); ii) clara separación de la capa de presentación con respecto a las capas navegacionales y de comportamiento; iii) definición de la estructura navegacional de acuerdo a un mecanismo orientado al comportamiento, que prevenga la modificación del diseño navegacional causada por cambios en la implementación; iv) uso de estándares para facilitar la independencia de las herramientas. Se ha llevado a cabo una revisión del estado de la literatura teniendo en cuenta los fundamentos de la Ingeniería Dirigida por Modelos MDE (Model Driven Engineering), las propuestas metodológicas para el desarrollo de Aplicaciones Web, las tendencias actuales, analizando en forma especial de qué manera las propuestas Web las contemplan, y las evidencias empíricas tanto en la academia como en la Industria. Presentamos así la propuesta MoWebA a partir de una serie de consideraciones sobre las aplicaciones Web que han sido identificadas durante el proceso de revisión del estado del arte. Posteriormente, detallamos cada una de las etapas del proceso de modelado, incluyendo los diagramas y notaciones propuestos, sus definiciones a través de sus metamodelos y ejemplos de uso. Seguidamente, presentamos el proceso de transformación adoptado por MoWebA, con los mecanismos de transformación Modelo-A-Modelo y Modelo-A-Código. Hemos dedicado un importante esfuerzo en la validación de la propuesta. Se realizó una primera validación, adoptando los modelos de MoWebA y en algunos casos generando aplicaciones para diferentes dominios. Con estas primeras experiencias de validación hemos podido identificar fortalezas y debilidades de la propuesta PIM de MoWebA, además de determinar en qué grado la misma cubre las necesidades de diferentes dominios. Como segunda experiencia, hemos realizado una validación preliminar con un grupo de estudiantes de último año de la carrera de Ingeniería Informática de la Universidad Católica "Nuestra Señora de la Asunción" (Paraguay), que consistió en la definición de ASM para tres arquitecturas diferentes. Finalmente, como tercera experiencia de validación, hemos llevado a cabo un Caso de Estudio que consistió en la definición de tres extensiones para MoWebA. Dicha validación fue desarrollada como parte de un proyecto de investigación liderado por la Universidad Católica "Nuestra Señora de la Asunción". La experiencia ha permitido analizar el grado de adaptabilidad de MoWebA y automatización en las transformacinoes PIM-ASM, así como el grado de independiencia del PIM.[CA] Entre els grans desafiaments actuals de les aplicacions Web podem citar la portabilitat, adaptabilitat i evolució. El Desenvolupament Dirigit per Models (MDD) contemple aquests desafiaments proposant diferents nivells d'abstracció per a les diferents fases de modelatge. No obstant això, encarar adequadament aquest tema pot dependre del grau d'independència que adquireixen els models. Aquest treball de Tesi presenta un mètode que considera el problema de l'evolució i la portabilitat, en diferents entorns o arquitectures, per al disseny i desenvolupament d'aplicacions Web. La proposta s'anomena MoWebA (Model Oriented Web Approach). Durant el desenvolupament de la tesi hem identificat una sèrie d'aspectes que podrien tenir un impacte positiu sobre els problemes de portabilitat i adaptabilitat. Aquestos són: i) la incorporació d'un model específic d'arquitectura ASM (Architecture Specific Model), que permet la portabilitat dels models PIM respecte a l'arquitectura (per exemple, RIA, SOA, Mobile); ii) la clara separació de la capa de presentació respecte a les capes navegacionals i de comportament; iii) la definició de l'estructura navegacional d'acord amb un mecanisme orientat al comportament, que restringisca la modificació del disseny navegacional causada per canvis en la implementació; i per últim, iv) l'ús d'estàndards per tal de facilitar la independència de les eines. S'ha realitzat una revisió de l'estat de la literatura considerant els fonaments de l'Enginyeria Dirigida per Models MDE (Model Driven Engineering), les propostes metodològiques per al desenvolupament d'Aplicacions Web, les tendències actuals (analitzant de forma especial la manera en que les propostes Web les consideren), i les evidències empíriques tant en l'acadèmia com en la Indústria. Presentem així la proposta MoWebA a partir d'una sèrie de consideracions sobre les aplicacions Web que són identificades durant el procés de revisió de l'estat de l'art. Posteriorment, detallem cadascuna de les etapes del procés de modelatge, incloent els diagrames i les notacions proposades, les seues definicions (a través dels seus metamodels), i alguns exemples d'ús. Seguidament, presentem el procés de transformació adoptat per MoWebA, emprant mecanismes de transformació Model-a-Model i Model-a-Codi. Hem dedicat un esforç considerable en la validació de la proposta. Es realitzà una primera validació adoptant els models de MoWebA, i en alguns casos es generaren aplicacions per a diferents dominis. Aquestes experiències van ser realitzades per modeladors amb poca experiència, així com també per modeladors i desenvolupadors experimentats. Les experiències van ser desenvolupades en ambients tant acadèmics com industrials. Amb aquestes primeres experiències de validació s'identificaren fortaleses i febleses de la proposta PIM de MoWebA. També permeteren determinar fins quin grau la proposta respon a les necessitats dels diferents dominis. Com a segona experiència es realitzà una validació preliminar amb un grup d'estudiants d'últim curs de la carrera d'Enginyeria Informàtica de la Universitat Catòlica "Nuestra Señora de la Asunción" (Paraguai), que va consistir en la definició del model d'arquitectura ASM per a tres arquitectures diferents. Amb aquesta segona experiència de validació s'aconseguí valorar com de factible és d'adaptar la proposta a altres arquitectures. Finalment, com a tercera experiència de validació, es dugué a terme un Cas d'Estudi que va consistir en la definició de tres extensions per a MoWebA. L'experiència permeté analitzar el grau d'adaptabilitat i d'automatització en les transformacions PIM-ASM que s'obté amb MoWebA, així com el grau de independència del PIM amb respecte als altres models. Durant aquesta validació, s'han realitzat a més experiències de satisfacció d'usuaris amb un grup de modeladors i desenvolupadors.[EN] Some of the major challenges facing Web applications today are those of portability, adaptability and evolution, not only in the environment in which they run, but also in the way in which they must be developed, often requiring different languages, frameworks, tools, environments, platforms, etc. MDD and MDA take into account these issues. However, to achieve portability, adaptability and evolution depends to some extent on the degree of independence that the models adopt. This Thesis presents a method that take into account the problem of evolution and portability towards different environments. The approach is called MoWebA (Model Oriented Web Approach). Some key aspects of MoWebA that could have a positive impact in the portability and adaptability are:i) incorporation of an Architecture Specific Model (ASM) as a new modeling layer, in order to keep the portability of the Platform Independent Model (PIM) regarding the different architectures (e.g., RIA, SOA, Mobile); ii) clear separation of the presentation layer with regard to the navigation and behavior layers; iii) definition of the navigational structure according to a function-oriented approach, which prevents the modification of the navigation design caused by implementation changes; iv) and use of standards in order to facilitate the independence from the tools. We justify MoWebA by highlighting a series of concerns for Web applications development. We present an overview of the method including the dimensions and the diagrams that we propose. Subsequently, we present each step in the modeling process, including the diagrams and notation, its definition (metamodels) and examples of use. Afterwards, we present the transformation process adopted by MoWebA, which includes model-to-model and model-to-code transformations. We have devoted special attention to the validation of the approach. As a first validation, MoWebA has been used for modelling and generating different types of applications by both novice and experienced modellers and developers. These experiences were done in academic and industrial contexts. The experiences have allowed to identify strengths and weaknesses of the PIM proposal, and to verify that the proposed notation covers the needs of different domains. Next, we present a preliminary validation of the ASM proposal, considering an experience of different ASM definitions made by a group of computer science students at the Catholic University "Nuestra Señora de la Asunción" (Paraguay). This preliminary validation has allowed us to determine how feasible is to adapt the proposal to other architectures. The analysis of the validation sought to answer the following questions: Can the same PIM model be used for different architectures?; Is it possible to specify clear limits between platform independent models (PIM) and architectural specific models (ASM)?; How does an architectural specific model facilitate the transformation rules definition?. Finally, we present a Case Study to validate the extensions of MoWebA to three different architectures. The experience was structured taking into account the framework of Runeson et al. This experience have allowed to carry out three complete extensions. In such extensions we could analysed the grade of adaptability of MoWebA and of automation PIM-ASM, as well as the grade of independence of the PIM metamodel. We have also conducted some user's satisfaction experiences with modelers and developers.González Toñánez, M. (2022). A Navigational Role-Centric Model Oriented Web Approach MoWebA [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/181470TESI

    Métodos para melhora da análise visual de redes em fluxo contínuo de dados

    Get PDF
    Temporal networks (also known as dynamic networks) are often used to model connections that occur over time between parts of a system by using nodes and edges. In temporal networks, all nodes, edges, and times, are known and available to be used in the analysis. However, in several real-world applications, data are produced in a massive and continuous way, which is known as data stream. In this case, the volume of data may be so large that the storage may be impossible and mining tasks become more challenging. In streaming temporal networks, edges are continuously arriving in non-stationary distribution. In both temporal and streaming temporal networks, patterns related to node and edge activity are typically irregular in time, which makes the visualization of such networks helpful to gain insights about network structure and dynamics. Nevertheless, the non-stationary distribution of incoming data increases complexity and turns the streaming temporal network visualization even more challenging. Several visualization layouts have been proposed, but they all have limitations. The main challenge in this context is the amount of visual information, that increases depending on the network size and density, and causes visual clutter due to edge overlap, fine temporal resolution, and node proximity. In this thesis, we propose methods to enhance the visualization of streaming temporal networks through the manipulation of the three network dimensions, namely node, edge, and time. Specifically, we propose: (i) CNO, a visual scalable node ordering method; (ii) SEVis, a streaming edge sampling method; and (iii) a streaming method that adapts the temporal resolution according to local levels of node activity. We also present a comparative study considering the combination of these methods. We show through case studies with real-world networks that each of these methods greatly improves layout readability, thus leading to a fast and reliable decision making.CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível SuperiorTese (Doutorado)Redes temporais (ou dinâmicas) são frequentemente usadas para modelar conexões que ocorrem ao longo do tempo entre partes de um sistema por meio de nós e arestas. Nessas redes, todos os nós, arestas e instantes de tempo são conhecidos e estão disponíveis para serem utilizados na análise. Entretanto, em várias situações reais, dados são produzidos de forma massiva e contínua, o que é conhecido como fluxo contínuo de dados (FCD). Nesse tipo de aplicação, o volume de dados pode ser tão grande que o armazenamento deles pode ser impossível e as tarefas de mineração se tornam ainda mais desafiadoras. Em redes provenientes de FCD, arestas são continuamente adicionadas em distribuição não-estacionária. Tanto em redes temporais quanto em redes em FCD, padrões relacionados à atividade de nós e arestas são tipicamente irregulares ao longo do tempo, o que torna a visualização dessas redes útil para obter insights sobre a estrutura e dinâmica delas. Por outro lado, a distribuição não-estacionária aumenta a complexidade e torna a visualização de redes em FCD ainda mais desafiadora. Vários layouts visuais foram propostos até hoje, mas todos possuem limitações. O principal desafio é a quantidade de informação visual, que aumenta dependendo do tamanho e densidade da rede e causa poluição visual devido à sobreposição de arestas, resolução temporal e proximidade dos nós. Nesta tese, nós propomos métodos para melhorar a visualização de redes em FCD por meio da manipulação das três dimensões da rede: nó, aresta e tempo. Mais especificamente, nós propomos: (i) CNO, um método de ordenação de nós visualmente escalável; (ii) SEVis, um método de amostragem de arestas em FCD; (iii) um método para FCD que adapta a resolução temporal de acordo com níveis locais de atividade de nós. Também apresentamos um estudo comparativo considerando a combinação destes métodos. Por meio de estudos de caso com redes reais, mostramos que cada um dos métodos melhora bastante a legibilidade do layout, levando a uma tomada de decisão rápida e confiável

    Problematic Attachment to Social Media: Five Behavioural Archetypes

    Get PDF
    Today, social media play an important role in people’s daily lives. Many people use social media to satisfy their personal and social needs, such as enhancing self-image, acquiring self-esteem, and gaining popularity. However, when social media are used obsessively and excessively, behavioural addiction symptoms can occur, leading to negative impacts on one’s life, which is defined as a problematic attachment to social media. Research suggests that tools can be provided to assist the change of problematic attachment behaviour, but it remains unclear how such tools should be designed and personalised to meet individual needs and profiles. This study makes the first attempt to tackle this problem by developing five behavioural archetypes, characterising how social media users differ in their problematic attachments to them. The archetypes are meant to facilitate effective ideation, creativity, and communication during the design process and helping the elicitation and customisation of the variability in the requirements and design of behaviour change tools for combatting problematic usage of social media. This was achieved by using a four-phase qualitative study where the diary study method was considered at the initial stage, and also the refinement and confirmation stage, to enhance ecological validity
    corecore