10 research outputs found

    Factors Affecting Success in Migration of Legacy Systems to Service-Oriented Architecture (SOA) - Shared Experiences from Five Case Companies

    Get PDF
    Background: The term ‘legacy systems’ refers to existing Information Systems that have been deployed in the past and have been running critical business processes within an enterprise in its current IT architecture. Based on their important role, legacy systems are considered the heart of a company’s operating enterprise system and therefore are of significant business value to the company. Therefore IT architects have not neglected the value these existing assets can bring to the adoption of service-oriented architecture and have been studying different methods and factors to migrate the legacy investments into the new architecture and take advantage of their business value. However, not in all cases has the process of migrating legacy systems into SOA been successful. In fact, the level of success in adapting the legacy systems in a company with the new service-oriented architecture is dependant on some factors which vary from one legacy infrastructure and series of business processes to another. There is no quick fix to transforming the existing legacy assets which highlights the fact that considering the right factors to reach legacy system migration success in a specific company is of key value. Therefore, we hereby studied the factors influencing success of migrating these legacy investments into SOA in five different companies which include a Large European Bank, SAS, a Large globally-known Company in Sweden, Sandvik AB and a large UK Bank. Purpose: To identify factors affecting successful migration of legacy systems into SOA in five companies. Method: The main adopted research method in this study has been interviews for different case studies. Through separate interviews, critical success factors of migrating legacy systems into SOA have been collected and identified in each case. Finally collected results are analyzed and presented as the recognized factors affecting successful migration of legacy assets into SOA in five different enterprises with their own Information System infrastructures. Conclusion: The success factors identified include potential of legacy systems for being migrated, strategy of migration, SOA governance, the business process of the company, budgeting and resources, legacy architecture, close monitoring, dependence on commercial products, information architecture, testing and technical skills of the personnel. Out of all these factors, only three factors have been applied and mentioned by all the case companies in this study, which are the potential of legacy systems for being migrated into SOA, strategy of migration and SOA Governance

    Interleaving Command Sequences: a Threat to Secure Smartcard Interoperability

    Full text link
    The increasingly widespread use of smartcards for a variety of sensitive applications, including digital signatures, creates the need to ensure and possibly certify the secure interoperability of these devices. Standard certification criteria, in particular the Common Criteria, define security requirements but do not sufficiently address the problem of interoperability. Here we consider the interoperability problem which arises when various applications interact with different smartcards through a middleware. In such a situation it is possible that a smartcard of type S receives commands that were supposed to be executed on a different smartcard of type S'. Such "external commands" can interleave with the commands that were supposed to be executed on S. We experimentally demonstrate this problem with a Common Criteria certified digital signature process on a commercially available smartcard. Importantly, in some of these cases the digital signature processes terminate without generating an error message or warning to the user.Comment: 6 pages; published in the 10th WSEAS International Conference on Information Security and Privacy (ISP 2011

    Markerless motion capture for 3D human model animation using depth camera

    Get PDF
    3D animation is created using keyframe based system in 3D animation software such as Blender and Maya. Due to the long time interval and the need of high expertise in 3D animation, motion capture devices were used as an alternative and Microsoft Kinect v2 sensor is one of them. This research analyses the capabilities of the Kinect sensor in producing 3D human model animations using motion capture and keyframe based animation system in reference to a live motion performance. The quality, time interval and cost of both animation results were compared. The experimental result shows that motion capture system with Kinect sensor consumed less time (only 2.6%) and cost (30%) in the long run (10 minutes of animation) compare to keyframe-based system, but it produced lower quality animation. This was due to the lack of body detection accuracy when there is obstruction. Moreover, the sensor’s constant assumption that the performer’s body faces forward made it unreliable to be used for a wide variety of movements. Furthermore, standard test defined in this research covers most body parts’ movements to evaluate other motion capture system

    Iris Segmentation using Gradient Magnitude and Fourier Descriptor for Multimodal Biometric Authentication System

    Get PDF
    Perfectly segmenting the area of the iris is one of the most important steps in iris recognition. There are several problematic areas that affect the accuracy of the iris segmentation step, such as eyelids, eyelashes, glasses, pupil (due to less accurate iris segmentation), motion blur, and lighting and specular reflections. To solve these problems, gradient magnitude and Fourier descriptor are employed to do iris segmentation in the proposed Multimodal Biometric Authentication System (MBAS). This approach showed quite promising results, i.e. an accuracy rate of 97%. The result of the iris recognition system was combined with the result of an open-source fingerprint recognition system to develop a multimodal biometrics authentication system. The results of the fusion between iris and fingerprint authentication were 99% accurate. Data from Multimedia Malaysia University (MMUI) and our own prepared database, the SGU-MB-1 dataset, were used to test the accuracy of the proposed system

    Implementation of Multipattern String Matching Accelerated with GPU for Intrusion Detection System

    Get PDF
    Abstract. As Internet-related  security threats continue to increase  in terms of volume and sophistication,  existing  Intrusion Detection System  is also  being challenged to cope with the current Internet  development. Multi Pattern String Matching algorithm accelerated with Graphical  Processing Unit  is  being  utilized  to improve  the packet scanning performance  of the  IDS. This paper implements a Multi Pattern String Matching algorithm, also called Parallel Failureless Aho  Corasick  accelerated with  GPU to  improve the  performance of IDS.  OpenCL library  is  used  to  allow  the  IDS  to  support  various GPU, including  popular GPU such  as NVIDIA and AMD, used  in our research. The  experiment result  shows that the application of Multi  Pattern String Matching using GPU  accelerated platform provides  a speed up,  by up  to 141% in term of throughput compared to the  previous  research

    The Role of a Variety of Research Studies on Problem Management

    Get PDF
    In the process of finding the truth, factual information is needed, starting from simple methods such as good time management in reading, listening and asking questions, until complex ways of research. So, researchers must understand what types of research can be used as references, to facilitate researchers in doing problem management properly, the results of which are able to solve problems and obtain factual information. This paper describes 7 (seven) different types of research, there are research based on approaches, functions, purpose, characteristics, problem characteristics, research process, and measurement techniques and data analysis. The explanation’s purpose of the variety of research is to provide insight into the management of the problems that occur with the planning carried out by the researcher, especially in terms of literature, so that before considering various stages of planning and doing research, researchers can also consider the main features of certain forms of research that are well compiled and reported. So, problem management can be done as well as possible to produce valid steps in solving problems. Keywords : Variety of Research, Literature, Factual Information, Problem Managemen
    corecore