10 research outputs found
Factors Affecting Success in Migration of Legacy Systems to Service-Oriented Architecture (SOA) - Shared Experiences from Five Case Companies
Background: The term ‘legacy systems’ refers to existing Information Systems that have been deployed in the past and have been running critical business processes within an enterprise in its current IT architecture. Based on their important role, legacy systems are considered the heart of a company’s operating enterprise system and therefore are of significant business value to the company. Therefore IT architects have not neglected the value these existing assets can bring to the adoption of service-oriented architecture and have been studying different methods and factors to migrate the legacy investments into the new architecture and take advantage of their business value. However, not in all cases has the process of migrating legacy systems into SOA been successful. In fact, the level of success in adapting the legacy systems in a company with the new service-oriented architecture is dependant on some factors which vary from one legacy infrastructure and series of business processes to another. There is no quick fix to transforming the existing legacy assets which highlights the fact that considering the right factors to reach legacy system migration success in a specific company is of key value. Therefore, we hereby studied the factors influencing success of migrating these legacy investments into SOA in five different companies which include a Large European Bank, SAS, a Large globally-known Company in Sweden, Sandvik AB and a large UK Bank. Purpose: To identify factors affecting successful migration of legacy systems into SOA in five companies. Method: The main adopted research method in this study has been interviews for different case studies. Through separate interviews, critical success factors of migrating legacy systems into SOA have been collected and identified in each case. Finally collected results are analyzed and presented as the recognized factors affecting successful migration of legacy assets into SOA in five different enterprises with their own Information System infrastructures. Conclusion: The success factors identified include potential of legacy systems for being migrated, strategy of migration, SOA governance, the business process of the company, budgeting and resources, legacy architecture, close monitoring, dependence on commercial products, information architecture, testing and technical skills of the personnel. Out of all these factors, only three factors have been applied and mentioned by all the case companies in this study, which are the potential of legacy systems for being migrated into SOA, strategy of migration and SOA Governance
Interleaving Command Sequences: a Threat to Secure Smartcard Interoperability
The increasingly widespread use of smartcards for a variety of sensitive
applications, including digital signatures, creates the need to ensure and
possibly certify the secure interoperability of these devices. Standard
certification criteria, in particular the Common Criteria, define security
requirements but do not sufficiently address the problem of interoperability.
Here we consider the interoperability problem which arises when various
applications interact with different smartcards through a middleware. In such a
situation it is possible that a smartcard of type S receives commands that were
supposed to be executed on a different smartcard of type S'. Such "external
commands" can interleave with the commands that were supposed to be executed on
S. We experimentally demonstrate this problem with a Common Criteria certified
digital signature process on a commercially available smartcard. Importantly,
in some of these cases the digital signature processes terminate without
generating an error message or warning to the user.Comment: 6 pages; published in the 10th WSEAS International Conference on
Information Security and Privacy (ISP 2011
Markerless motion capture for 3D human model animation using depth camera
3D animation is created using keyframe based system in 3D animation software such as Blender and Maya. Due to the long time interval and the need of high expertise in 3D animation, motion capture devices were used as an alternative and Microsoft Kinect v2 sensor is one of them. This research analyses the capabilities of the Kinect sensor in producing 3D human model animations using motion capture and keyframe based animation system in reference to a live motion performance. The quality, time interval and cost of both animation results were compared. The experimental result shows that motion capture system with Kinect sensor consumed less time (only 2.6%) and cost (30%) in the long run (10 minutes of animation) compare to keyframe-based system, but it produced lower quality animation. This was due to the lack of body detection accuracy when there is obstruction. Moreover, the sensor’s constant assumption that the performer’s body faces forward made it unreliable to be used for a wide variety of movements. Furthermore, standard test defined in this research covers most body parts’ movements to evaluate other motion capture system
Iris Segmentation using Gradient Magnitude and Fourier Descriptor for Multimodal Biometric Authentication System
Perfectly segmenting the area of the iris is one of the most important steps in iris recognition. There are several problematic areas that affect the accuracy of the iris segmentation step, such as eyelids, eyelashes, glasses, pupil (due to less accurate iris segmentation), motion blur, and lighting and specular reflections. To solve these problems, gradient magnitude and Fourier descriptor are employed to do iris segmentation in the proposed Multimodal Biometric Authentication System (MBAS). This approach showed quite promising results, i.e. an accuracy rate of 97%. The result of the iris recognition system was combined with the result of an open-source fingerprint recognition system to develop a multimodal biometrics authentication system. The results of the fusion between iris and fingerprint authentication were 99% accurate. Data from Multimedia Malaysia University (MMUI) and our own prepared database, the SGU-MB-1 dataset, were used to test the accuracy of the proposed system
Implementation of Multipattern String Matching Accelerated with GPU for Intrusion Detection System
Abstract. As Internet-related security threats continue to increase in terms of volume and sophistication, existing Intrusion Detection System is also being challenged to cope with the current Internet development. Multi Pattern String Matching algorithm accelerated with Graphical Processing Unit is being utilized to improve the packet scanning performance of the IDS. This paper implements a Multi Pattern String Matching algorithm, also called Parallel Failureless Aho Corasick accelerated with GPU to improve the performance of IDS. OpenCL library is used to allow the IDS to support various GPU, including popular GPU such as NVIDIA and AMD, used in our research. The experiment result shows that the application of Multi Pattern String Matching using GPU accelerated platform provides a speed up, by up to 141% in term of throughput compared to the previous research
The Role of a Variety of Research Studies on Problem Management
In the process of finding the truth, factual information is needed, starting from simple methods such as good time management in reading, listening and asking questions, until complex ways of research. So, researchers must understand what types of research can be used as references, to facilitate researchers in doing problem management properly, the results of which are able to solve problems and obtain factual information. This paper describes 7 (seven) different types of research, there are research based on approaches, functions, purpose, characteristics, problem characteristics, research process, and measurement techniques and data analysis. The explanation’s purpose of the variety of research is to provide insight into the management of the problems that occur with the planning carried out by the researcher, especially in terms of literature, so that before considering various stages of planning and doing research, researchers can also consider the main features of certain forms of research that are well compiled and reported. So, problem management can be done as well as possible to produce valid steps in solving problems.
Keywords : Variety of Research, Literature, Factual Information, Problem Managemen