10,637 research outputs found

    A unified view of data-intensive flows in business intelligence systems : a survey

    Get PDF
    Data-intensive flows are central processes in today’s business intelligence (BI) systems, deploying different technologies to deliver data, from a multitude of data sources, in user-preferred and analysis-ready formats. To meet complex requirements of next generation BI systems, we often need an effective combination of the traditionally batched extract-transform-load (ETL) processes that populate a data warehouse (DW) from integrated data sources, and more real-time and operational data flows that integrate source data at runtime. Both academia and industry thus must have a clear understanding of the foundations of data-intensive flows and the challenges of moving towards next generation BI environments. In this paper we present a survey of today’s research on data-intensive flows and the related fundamental fields of database theory. The study is based on a proposed set of dimensions describing the important challenges of data-intensive flows in the next generation BI setting. As a result of this survey, we envision an architecture of a system for managing the lifecycle of data-intensive flows. The results further provide a comprehensive understanding of data-intensive flows, recognizing challenges that still are to be addressed, and how the current solutions can be applied for addressing these challenges.Peer ReviewedPostprint (author's final draft

    Implementing 5D BIM on construction projects: Contractor perspectives from the UK construction sector

    Get PDF
    This is an accepted manuscript of an article published by Emerald in Journal of Engineering, Design and Technology on 09/05/2020: https://doi.org/10.1108/JEDT-01-2020-0007 The accepted version of the publication may differ from the final published version.Purpose The purpose of this paper is to report on primary research findings that sought to investigate and analyse salient issues on the implementation of 5D building information modelling (BIM) from the UK contractors’ perspective. Previous research and efforts have predominantly focussed on the use of technologies for cost estimation and quantity takeoff within a more traditional-led procurement, with a paucity of research focussing on how 5D BIM could facilitate costing within contractor-led procurement. This study fills this current knowledge gap and enhances the understanding of the specific costing challenges faced by contractors in contractor-led projects, leading to the development of 5D framework for use in future projects. Design/methodology/approach To develop a fully detailed understanding of the challenges and issues being faced in this regard, a phenomenological, qualitative-based study was undertaken through interviews involving 21 participants from UK-wide construction organisations. A thematic data analytical process was applied to the data to derive key issues, and this was then used to inform the development of a 5D-BIM costing framework. Findings Multi-disciplinary findings reveal a range of issues faced by contractors when implementing 5D BIM. These exist at strategic, operational and technological levels which require addressing successful implementation of 5D BIM on contractor-led projects adhering to Level 2 BIM standards. These findings cut across the range of stakeholders on contractor-led projects. Ultimately, the findings suggest strong commitment and leadership from organisational management are required to facilitate cost savings and generate accurate cost information. Practical implications This study highlights key issues for any party seeking to effectively deploy 5D BIM on a contractor-led construction project. A considerable cultural shift towards automating and digitising cost functions virtually, stronger collaborative working relationship relative to costing in design development, construction practice, maintenance and operation is required. Originality/value By analysing findings from primary research data, the work concludes with the development of a 5D BIM costing framework to support contractor-led projects which can be implemented to ensure that 5D BIM is successfully implemented

    A synthesis of logic and biology in the design of dependable systems

    Get PDF
    The technologies of model-based design and dependability analysis in the design of dependable systems, including software intensive systems, have advanced in recent years. Much of this development can be attributed to the application of advances in formal logic and its application to fault forecasting and verification of systems. In parallel, work on bio-inspired technologies has shown potential for the evolutionary design of engineering systems via automated exploration of potentially large design spaces. We have not yet seen the emergence of a design paradigm that combines effectively and throughout the design lifecycle these two techniques which are schematically founded on the two pillars of formal logic and biology. Such a design paradigm would apply these techniques synergistically and systematically from the early stages of design to enable optimal refinement of new designs which can be driven effectively by dependability requirements. The paper sketches such a model-centric paradigm for the design of dependable systems that brings these technologies together to realise their combined potential benefits

    Link Before You Share: Managing Privacy Policies through Blockchain

    Full text link
    With the advent of numerous online content providers, utilities and applications, each with their own specific version of privacy policies and its associated overhead, it is becoming increasingly difficult for concerned users to manage and track the confidential information that they share with the providers. Users consent to providers to gather and share their Personally Identifiable Information (PII). We have developed a novel framework to automatically track details about how a users' PII data is stored, used and shared by the provider. We have integrated our Data Privacy ontology with the properties of blockchain, to develop an automated access control and audit mechanism that enforces users' data privacy policies when sharing their data across third parties. We have also validated this framework by implementing a working system LinkShare. In this paper, we describe our framework on detail along with the LinkShare system. Our approach can be adopted by Big Data users to automatically apply their privacy policy on data operations and track the flow of that data across various stakeholders.Comment: 10 pages, 6 figures, Published in: 4th International Workshop on Privacy and Security of Big Data (PSBD 2017) in conjunction with 2017 IEEE International Conference on Big Data (IEEE BigData 2017) December 14, 2017, Boston, MA, US

    Towards Intelligent Databases

    Get PDF
    This article is a presentation of the objectives and techniques of deductive databases. The deductive approach to databases aims at extending with intensional definitions other database paradigms that describe applications extensionaUy. We first show how constructive specifications can be expressed with deduction rules, and how normative conditions can be defined using integrity constraints. We outline the principles of bottom-up and top-down query answering procedures and present the techniques used for integrity checking. We then argue that it is often desirable to manage with a database system not only database applications, but also specifications of system components. We present such meta-level specifications and discuss their advantages over conventional approaches

    Working Notes from the 1992 AAAI Workshop on Automating Software Design. Theme: Domain Specific Software Design

    Get PDF
    The goal of this workshop is to identify different architectural approaches to building domain-specific software design systems and to explore issues unique to domain-specific (vs. general-purpose) software design. Some general issues that cut across the particular software design domain include: (1) knowledge representation, acquisition, and maintenance; (2) specialized software design techniques; and (3) user interaction and user interface
    • …
    corecore