This document presents a concept for developing a smart web portal as part of an intelligence information system based on a service-oriented architecture (SOA) approach. The proposed smart web portal would automate the intelligence cycle through three modules: a collection module to gather information from various sources, a processing module to analyze and enrich the knowledge database, and a dissemination module to distribute information to the appropriate end users. The smart web portal aims to integrate intelligence information from different sources and ensure the right users receive the necessary information. The document discusses models for an SOA-based intelligence information system and the proposed smart web portal system.
This document summarizes a proposed multi-tenant healthcare system called Mi-HealthCare that uses a containerized microservices architecture. Key points include:
- Mi-HealthCare uses a multi-tenant architecture to allow multiple healthcare providers (tenants) to access the system using a single codebase and shared infrastructure.
- Containers are used instead of virtual machines for their higher performance and scalability. Docker Swarm is used for container orchestration.
- The system provides features like patient management, clinical documentation, and prescription management. It is designed to meet regulations like HIPAA and GDPR.
trends of information systems and artificial technologymilkesa13
This document provides an overview of emerging technologies transforming the information technology industry, as discussed in recent literature. It examines technologies like cloud computing, the internet of things, artificial intelligence, blockchain, big data analytics, and more. For each technology, the document summarizes key points from 5-8 research papers on their characteristics, advantages, and challenges. The goal is to help researchers and practitioners understand these important trends by synthesizing information from multiple sources, rather than reading numerous individual papers. Artificial intelligence is discussed in more depth as an example, outlining how it is used through machine learning and deep learning, and its impact on enhancing security and automating processes within information systems.
Open Source Platforms Integration for the Development of an Architecture of C...Eswar Publications
The goal of the Internet of Things (IoT) is to achieve the interconnection and interaction of all kind of everyday
objects. IoT architecture can be implemented in various ways. This paper presents a way to mount an IoT architecture using open source hardware and software platforms and shows that this is a viable option to collect information through various sensors and present it through a web page.
Agent-SSSN: a strategic scanning system network based on multiagent intellige...IJERA Editor
The document describes an Agent-SSSN system that uses a multi-agent approach and ontology to develop a strategic scanning system for business intelligence. The system aims to integrate expert knowledge through cooperative information gathering from the web. It uses various agent roles like information retrieval agents, mediator agents, and notification agents. Ontologies are used to represent shared domain concepts and expert knowledge to enable knowledge sharing between agents. The system is modeled using the O-MaSE methodology, with goals, roles, and capabilities defined for each agent.
This document provides a preface for a book on Internet of Things (IoT) concepts and applications. It introduces the book's editors and gives an overview of what each part of the book will cover. The preface discusses how IoT is expected to revolutionize daily life through connecting devices to share data over the internet. It notes some key challenges to implementing IoT like scalability, security, and privacy. The book aims to explore IoT concepts, solutions, applications and next-generation smart applications to address existing challenges and identify future research directions.
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources.
Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources.
Data Management for Internet of things : A Survey and DiscussionIRJET Journal
This document discusses data management for the Internet of Things (IoT). It begins with an abstract that outlines the need for improved data management techniques to handle the massive volumes of data produced by IoT devices. The document then provides background on IoT data characteristics that make traditional database solutions inadequate. It surveys current research in IoT data management and proposes a framework that considers the full data lifecycle from collection to deletion. Finally, it performs a gap analysis of existing solutions based on factors like data format, storage architecture, processing speed, and server response time.
This document summarizes a proposed multi-tenant healthcare system called Mi-HealthCare that uses a containerized microservices architecture. Key points include:
- Mi-HealthCare uses a multi-tenant architecture to allow multiple healthcare providers (tenants) to access the system using a single codebase and shared infrastructure.
- Containers are used instead of virtual machines for their higher performance and scalability. Docker Swarm is used for container orchestration.
- The system provides features like patient management, clinical documentation, and prescription management. It is designed to meet regulations like HIPAA and GDPR.
trends of information systems and artificial technologymilkesa13
This document provides an overview of emerging technologies transforming the information technology industry, as discussed in recent literature. It examines technologies like cloud computing, the internet of things, artificial intelligence, blockchain, big data analytics, and more. For each technology, the document summarizes key points from 5-8 research papers on their characteristics, advantages, and challenges. The goal is to help researchers and practitioners understand these important trends by synthesizing information from multiple sources, rather than reading numerous individual papers. Artificial intelligence is discussed in more depth as an example, outlining how it is used through machine learning and deep learning, and its impact on enhancing security and automating processes within information systems.
Open Source Platforms Integration for the Development of an Architecture of C...Eswar Publications
The goal of the Internet of Things (IoT) is to achieve the interconnection and interaction of all kind of everyday
objects. IoT architecture can be implemented in various ways. This paper presents a way to mount an IoT architecture using open source hardware and software platforms and shows that this is a viable option to collect information through various sensors and present it through a web page.
Agent-SSSN: a strategic scanning system network based on multiagent intellige...IJERA Editor
The document describes an Agent-SSSN system that uses a multi-agent approach and ontology to develop a strategic scanning system for business intelligence. The system aims to integrate expert knowledge through cooperative information gathering from the web. It uses various agent roles like information retrieval agents, mediator agents, and notification agents. Ontologies are used to represent shared domain concepts and expert knowledge to enable knowledge sharing between agents. The system is modeled using the O-MaSE methodology, with goals, roles, and capabilities defined for each agent.
This document provides a preface for a book on Internet of Things (IoT) concepts and applications. It introduces the book's editors and gives an overview of what each part of the book will cover. The preface discusses how IoT is expected to revolutionize daily life through connecting devices to share data over the internet. It notes some key challenges to implementing IoT like scalability, security, and privacy. The book aims to explore IoT concepts, solutions, applications and next-generation smart applications to address existing challenges and identify future research directions.
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources.
Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources.
Data Management for Internet of things : A Survey and DiscussionIRJET Journal
This document discusses data management for the Internet of Things (IoT). It begins with an abstract that outlines the need for improved data management techniques to handle the massive volumes of data produced by IoT devices. The document then provides background on IoT data characteristics that make traditional database solutions inadequate. It surveys current research in IoT data management and proposes a framework that considers the full data lifecycle from collection to deletion. Finally, it performs a gap analysis of existing solutions based on factors like data format, storage architecture, processing speed, and server response time.
This document discusses big data and its challenges related to the Internet of Things (IoT). It first defines big data and explains how the aggregation of data from many IoT systems can lead to big data. It then discusses some key challenges of big data, including issues with data volume, velocity, variety, and veracity. Specific challenges for big data from IoT systems are also reviewed, such as authentication, security, and uncertainty of data. Finally, the document outlines some potential solutions to big data challenges, such as using MapReduce for heterogeneous data, data cleaning techniques for inconsistencies, and cloud-based security platforms for IoT devices.
A Smart ITS based Sensor Network for Transport System with Integration of Io...IRJET Journal
This document discusses a proposed smart transportation system that integrates Internet of Things (IoT), big data approaches, and cloud computing. The system would use sensors to capture transportation data from vehicles and infrastructure in real-time. This IoT data would generate large volumes of diverse data (the "4Vs" of big data) that could be stored and analyzed in the cloud to provide insights for transportation planning and management. The proposed system aims to combine these technologies to develop intelligent transportation system cloud services to help optimize traffic flow and infrastructure usage.
Dynamic Data Analytics for the Internet of Things: Challenges and OpportunitiesPayamBarnaghi
Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities
IoT data analytics faces unique challenges compared to traditional big data analytics. IoT data is multi-modal, heterogeneous, noisy, incomplete, time and location dependent, and dynamic. It requires near real-time analysis while ensuring privacy and security. Analyzing IoT data requires an ecosystem approach that can integrate data from multiple sources and platforms semantically. Discovery engines are needed to locate IoT data streams and resources that are often mobile and transient. Context-aware and opportunistic techniques are required to access and route IoT data. The goal is to extract insights and actionable knowledge from physical, cyber, and social data sources.
This document outlines the syllabus for the course "Information System Year/Part: IV/II" taught by Keshav Raj Joshi. The syllabus covers 8 chapters related to information systems, including information system classification and evolution, control and security of information systems, enterprise management systems, decision support and intelligent systems, and emerging information system techniques. It also includes details of practical exercises and evaluation criteria. The document provides an overview of the topics that will be covered in the course.
New approaches of Data Mining for the Internet of things with systems: Litera...IRJET Journal
This document provides a literature review of new approaches to data mining for the Internet of Things (IoT). It discusses data mining from three perspectives: data view, method view, and application view. In the data view, it examines data mining functions like classification, clustering, association analysis, time series analysis, and anomaly detection. In the method view, it reviews machine learning, statistical, and deep learning techniques used for data mining. In the application view, it discusses data mining applications in industries like business, healthcare, and government. It also discusses challenges of big data mining for IoT and proposes a framework for large-scale IoT data mining using open source tools.
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...Dustin Pytko
The document proposes exploiting a Social Internet of Things (SIoT) paradigm to assign sensing tasks to IoT devices in a mobile crowdsensing (MCS) scenario. A new algorithm is presented to fairly allocate resources and sensing tasks among devices while extending device lifetime. The algorithm creates an energy consumption profile for each device and task that is shared over the SIoT network. Emulations showed the proposed approach extended the time for the first device's battery to deplete by over 40% compared to alternative approaches.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
This document summarizes a research paper on privacy-preserving techniques for IoT data in cloud environments. It introduces two differential privacy algorithms: 1) Generic differential privacy (GenDP) which provides generalized privacy protection for homogeneous and heterogeneous IoT metadata through data portioning. 2) Cluster-based differential privacy which groups similar data into clusters before defining classifiers to validate privacy. The paper evaluates these techniques and finds the cluster-based approach offers better security than customized interactive algorithms while maintaining data utility. Overall, the study presents new differential privacy methods for anonymizing IoT metadata stored in the cloud.
WEB BASED INFORMATION SYSTEMS OF E-COMMERCE USER SATISFACTION USING ZACHMAN ...AM Publications
The progress in information and communication technologies and the birth of the internet has changed the end user computing experience and environment. This advancement has changed the way of delivering information and services. Information systems can now be web-enabled, unlike the traditional stationary information systems. Web based means the information system includes in the website. Web portals are a part of this advancement. A Web portal is a gateway to information and services from multiple sources in a unified way, using a single, unique user interface. This study will make design of web base online information systems of e-commerce user satisfaction using Zachman framework. The major objectives of this study was to investigate how information system IS measures that influence user satisfaction of the Diponegoro university students, also to design and analysis the implementation of Zachman Framework. Based on the data analysis collected by e-mail, the conclusion were: Design of the website in online store is good implementation because there is majority of respondents agree for customer satisfaction. The analysis of zachman framework for shopme design online store reflected the best solution because describe the more comprehensive coverage for all enterprise architecture stakeholders. The information system is measures the influence user satisfaction of the Diponegoro University students, and the design and analysis the implementation of zachman framework in this study presented a method that provides guidance in the development of an organization’s enterprise architecture.
Using of Cloud Technologies in the Process of Preparing Future Specialists fo...ijtsrd
As part of the study, the specifics of the functioning of modern high tech enterprises related to the organization and automation of production processes through the use of various types of information systems are analyzed, and the growing importance of cloud technologies as the optimal means of implementing these processes is determined. Usanov Mehriddin Mustafayevich "Using of Cloud Technologies in the Process of Preparing Future Specialists for Professional Activity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31715.pdf Paper Url :https://www.ijtsrd.com/humanities-and-the-arts/education/31715/using-of-cloud-technologies-in-the-process-of-preparing-future-specialists-for-professional-activity/usanov-mehriddin-mustafayevich
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...ijseajournal
There has been tremendous growth in the field of AI and machine learning. The developments across these
fields have resulted in a considerable increase in other FinTech fields. Cyber security has been described
as an essential part of the developments associated with technology. Increased cyber security ensures that
people remain protected, and that data remains safe. New methods have been integrated into developing AI
that achieves cyber security. The data analysis capabilities of AI and its cyber security functions have
ensured that privacy has increased significantly. The ethical concept associated with data privacy has also
been advocated across most FinTech regulations. These concepts and considerations have all been
engaged with the need to achieve the required ethical requirements. The concept of federated learning is a
recently developed measure that achieves the abovementioned concept. It ensured the development of AI
and machine learning while keeping privacy in data analysis. The research paper effectively describes the
issue of federated learning for confidentiality. It describes the overall process associated with its
development and some of the contributions it has achieved. The widespread application of federated
learning in FinTech is showcased, and why federated learning is essential for overall growth in FinTech.
IRJET-Computational model for the processing of documents and support to the ...IRJET Journal
This document proposes a computational model for processing documents and supporting decision making in information retrieval systems. The model includes five main components: 1) a tracking and indexing component to crawl the web and store document metadata, 2) an information processing component to categorize documents and define user profiles, 3) a decision support component to analyze stored information and generate statistical reports, 4) a display component to provide search interfaces and visualization tools, and 5) specialized roles to administer the system. The goal of the model is to provide a framework for developing large-scale search engines.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
1. The document discusses various categories and technologies for knowledge management (KM) as identified by Liao in a 2003 literature review, including KM frameworks, knowledge-based systems, data mining, information and communication technologies, expert systems, database technologies, and modeling.
2. It also discusses main functions of KM aided by information technology, including knowledge creation, accumulation, and sharing.
3. Key challenges discussed for adoption of KM technologies include the need for organizational culture and mindset changes, as well as ensuring meaningful knowledge sharing and distribution within appropriate contexts.
Internet of Things, cognitive systems, and blockchain technology are three fields which have created numerous revolutions in software development. It seems that a combination among these fields may results in emerging a high potential and interesting field. Therefore, in this paper, we propose a framework for Internet of Things based on cognitive systems and blockchain technology. To the best of our knowledge, there is no framework for Internet of Things based on cognitive systems and blockchain. In order to study the applicability of the proposed framework, a recommender system based on the proposed framework is suggested. Since the proposed framework is novel, the suggested recommender system is novel. The suggested recommender system is compared with the existing recommender systems. The results show that the suggested recommender system has several benefits which are not available in the existing recommender systems.
The document discusses the Internet of Things (IoT) and some of the key challenges. It notes that IoT data is multi-modal, distributed, heterogeneous, noisy and incomplete. It raises issues around data management, actuation and feedback, service descriptions, real-time analysis, and privacy and security. The document outlines research challenges around transforming raw data to actionable information, machine learning for large datasets, making data accessible and discoverable, and energy efficient data collection and communication. It emphasizes that IoT data integration requires solutions across physical, cyber and social domains.
The Next Generation Internet (NGI) is a European initiative that aims to shape the future development of the Internet to be more human-centric. The NGI funds several projects related to intrusion detection systems, computer vision databases, web development frameworks, opportunistic social networking routing, and trust/security in online social networks. Each project coordinates with others to build technologies that meet the NGI's objectives of responding to fundamental human needs like trust, security, values and ethics.
Analysing Transportation Data with Open Source Big Data Analytic Toolsijeei-iaes
This document discusses analyzing transportation data using open source big data analytic tools. It provides an overview of H2O and SparkR, two popular tools. It then demonstrates applying these tools to a transportation dataset, using a generalized linear model. Specifically, it shows importing and splitting the data, building a GLM model with H2O and SparkR, making predictions on test data, and comparing predicted versus actual values. The document provides examples of the coding and outputs at each step of the analysis process.
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
This document proposes and evaluates a solution to securely disseminate sensitive IoT data using FIWARE and Intel SGX. The solution uses FIWARE components for authentication and authorization, and introduces a new Key Vault component that uses Intel SGX to securely store and manage encryption keys. Sensitive IoT data from smart meters is encrypted before being sent to the FIWARE Orion Context Broker for processing. Consumers that are SGX applications can decrypt and process the data securely within the SGX enclave. The evaluation shows the solution provides privacy and security guarantees without harming scalability or availability.
Artificial intelligence has been a buzz word that is impacting every industry in the world. With the rise of
such advanced technology, there will be always a question regarding its impact on our social life,
environment and economy thus impacting all efforts exerted towards sustainable development. In the
information era, enormous amounts of data have become available on hand to decision makers. Big data
refers to datasets that are not only big, but also high in variety and velocity, which makes them difficult to
handle using traditional tools and techniques. Due to the rapid growth of such data, solutions need to be
studied and provided in order to handle and extract value and knowledge from these datasets for different
industries and business operations. Numerous use cases have shown that AI can ensure an effective supply
of information to citizens, users and customers in times of crisis. This paper aims to analyse some of the
different methods and scenario which can be applied to AI and big data, as well as the opportunities
provided by the application in various business operations and crisis management domains.
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Tastemy Pandit
Know what your zodiac sign says about your taste in food! Explore how the 12 zodiac signs influence your culinary preferences with insights from MyPandit. Dive into astrology and flavors!
This document discusses big data and its challenges related to the Internet of Things (IoT). It first defines big data and explains how the aggregation of data from many IoT systems can lead to big data. It then discusses some key challenges of big data, including issues with data volume, velocity, variety, and veracity. Specific challenges for big data from IoT systems are also reviewed, such as authentication, security, and uncertainty of data. Finally, the document outlines some potential solutions to big data challenges, such as using MapReduce for heterogeneous data, data cleaning techniques for inconsistencies, and cloud-based security platforms for IoT devices.
A Smart ITS based Sensor Network for Transport System with Integration of Io...IRJET Journal
This document discusses a proposed smart transportation system that integrates Internet of Things (IoT), big data approaches, and cloud computing. The system would use sensors to capture transportation data from vehicles and infrastructure in real-time. This IoT data would generate large volumes of diverse data (the "4Vs" of big data) that could be stored and analyzed in the cloud to provide insights for transportation planning and management. The proposed system aims to combine these technologies to develop intelligent transportation system cloud services to help optimize traffic flow and infrastructure usage.
Dynamic Data Analytics for the Internet of Things: Challenges and OpportunitiesPayamBarnaghi
Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities
IoT data analytics faces unique challenges compared to traditional big data analytics. IoT data is multi-modal, heterogeneous, noisy, incomplete, time and location dependent, and dynamic. It requires near real-time analysis while ensuring privacy and security. Analyzing IoT data requires an ecosystem approach that can integrate data from multiple sources and platforms semantically. Discovery engines are needed to locate IoT data streams and resources that are often mobile and transient. Context-aware and opportunistic techniques are required to access and route IoT data. The goal is to extract insights and actionable knowledge from physical, cyber, and social data sources.
This document outlines the syllabus for the course "Information System Year/Part: IV/II" taught by Keshav Raj Joshi. The syllabus covers 8 chapters related to information systems, including information system classification and evolution, control and security of information systems, enterprise management systems, decision support and intelligent systems, and emerging information system techniques. It also includes details of practical exercises and evaluation criteria. The document provides an overview of the topics that will be covered in the course.
New approaches of Data Mining for the Internet of things with systems: Litera...IRJET Journal
This document provides a literature review of new approaches to data mining for the Internet of Things (IoT). It discusses data mining from three perspectives: data view, method view, and application view. In the data view, it examines data mining functions like classification, clustering, association analysis, time series analysis, and anomaly detection. In the method view, it reviews machine learning, statistical, and deep learning techniques used for data mining. In the application view, it discusses data mining applications in industries like business, healthcare, and government. It also discusses challenges of big data mining for IoT and proposes a framework for large-scale IoT data mining using open source tools.
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...Dustin Pytko
The document proposes exploiting a Social Internet of Things (SIoT) paradigm to assign sensing tasks to IoT devices in a mobile crowdsensing (MCS) scenario. A new algorithm is presented to fairly allocate resources and sensing tasks among devices while extending device lifetime. The algorithm creates an energy consumption profile for each device and task that is shared over the SIoT network. Emulations showed the proposed approach extended the time for the first device's battery to deplete by over 40% compared to alternative approaches.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
This document summarizes a research paper on privacy-preserving techniques for IoT data in cloud environments. It introduces two differential privacy algorithms: 1) Generic differential privacy (GenDP) which provides generalized privacy protection for homogeneous and heterogeneous IoT metadata through data portioning. 2) Cluster-based differential privacy which groups similar data into clusters before defining classifiers to validate privacy. The paper evaluates these techniques and finds the cluster-based approach offers better security than customized interactive algorithms while maintaining data utility. Overall, the study presents new differential privacy methods for anonymizing IoT metadata stored in the cloud.
WEB BASED INFORMATION SYSTEMS OF E-COMMERCE USER SATISFACTION USING ZACHMAN ...AM Publications
The progress in information and communication technologies and the birth of the internet has changed the end user computing experience and environment. This advancement has changed the way of delivering information and services. Information systems can now be web-enabled, unlike the traditional stationary information systems. Web based means the information system includes in the website. Web portals are a part of this advancement. A Web portal is a gateway to information and services from multiple sources in a unified way, using a single, unique user interface. This study will make design of web base online information systems of e-commerce user satisfaction using Zachman framework. The major objectives of this study was to investigate how information system IS measures that influence user satisfaction of the Diponegoro university students, also to design and analysis the implementation of Zachman Framework. Based on the data analysis collected by e-mail, the conclusion were: Design of the website in online store is good implementation because there is majority of respondents agree for customer satisfaction. The analysis of zachman framework for shopme design online store reflected the best solution because describe the more comprehensive coverage for all enterprise architecture stakeholders. The information system is measures the influence user satisfaction of the Diponegoro University students, and the design and analysis the implementation of zachman framework in this study presented a method that provides guidance in the development of an organization’s enterprise architecture.
Using of Cloud Technologies in the Process of Preparing Future Specialists fo...ijtsrd
As part of the study, the specifics of the functioning of modern high tech enterprises related to the organization and automation of production processes through the use of various types of information systems are analyzed, and the growing importance of cloud technologies as the optimal means of implementing these processes is determined. Usanov Mehriddin Mustafayevich "Using of Cloud Technologies in the Process of Preparing Future Specialists for Professional Activity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31715.pdf Paper Url :https://www.ijtsrd.com/humanities-and-the-arts/education/31715/using-of-cloud-technologies-in-the-process-of-preparing-future-specialists-for-professional-activity/usanov-mehriddin-mustafayevich
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...ijseajournal
There has been tremendous growth in the field of AI and machine learning. The developments across these
fields have resulted in a considerable increase in other FinTech fields. Cyber security has been described
as an essential part of the developments associated with technology. Increased cyber security ensures that
people remain protected, and that data remains safe. New methods have been integrated into developing AI
that achieves cyber security. The data analysis capabilities of AI and its cyber security functions have
ensured that privacy has increased significantly. The ethical concept associated with data privacy has also
been advocated across most FinTech regulations. These concepts and considerations have all been
engaged with the need to achieve the required ethical requirements. The concept of federated learning is a
recently developed measure that achieves the abovementioned concept. It ensured the development of AI
and machine learning while keeping privacy in data analysis. The research paper effectively describes the
issue of federated learning for confidentiality. It describes the overall process associated with its
development and some of the contributions it has achieved. The widespread application of federated
learning in FinTech is showcased, and why federated learning is essential for overall growth in FinTech.
IRJET-Computational model for the processing of documents and support to the ...IRJET Journal
This document proposes a computational model for processing documents and supporting decision making in information retrieval systems. The model includes five main components: 1) a tracking and indexing component to crawl the web and store document metadata, 2) an information processing component to categorize documents and define user profiles, 3) a decision support component to analyze stored information and generate statistical reports, 4) a display component to provide search interfaces and visualization tools, and 5) specialized roles to administer the system. The goal of the model is to provide a framework for developing large-scale search engines.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
1. The document discusses various categories and technologies for knowledge management (KM) as identified by Liao in a 2003 literature review, including KM frameworks, knowledge-based systems, data mining, information and communication technologies, expert systems, database technologies, and modeling.
2. It also discusses main functions of KM aided by information technology, including knowledge creation, accumulation, and sharing.
3. Key challenges discussed for adoption of KM technologies include the need for organizational culture and mindset changes, as well as ensuring meaningful knowledge sharing and distribution within appropriate contexts.
Internet of Things, cognitive systems, and blockchain technology are three fields which have created numerous revolutions in software development. It seems that a combination among these fields may results in emerging a high potential and interesting field. Therefore, in this paper, we propose a framework for Internet of Things based on cognitive systems and blockchain technology. To the best of our knowledge, there is no framework for Internet of Things based on cognitive systems and blockchain. In order to study the applicability of the proposed framework, a recommender system based on the proposed framework is suggested. Since the proposed framework is novel, the suggested recommender system is novel. The suggested recommender system is compared with the existing recommender systems. The results show that the suggested recommender system has several benefits which are not available in the existing recommender systems.
The document discusses the Internet of Things (IoT) and some of the key challenges. It notes that IoT data is multi-modal, distributed, heterogeneous, noisy and incomplete. It raises issues around data management, actuation and feedback, service descriptions, real-time analysis, and privacy and security. The document outlines research challenges around transforming raw data to actionable information, machine learning for large datasets, making data accessible and discoverable, and energy efficient data collection and communication. It emphasizes that IoT data integration requires solutions across physical, cyber and social domains.
The Next Generation Internet (NGI) is a European initiative that aims to shape the future development of the Internet to be more human-centric. The NGI funds several projects related to intrusion detection systems, computer vision databases, web development frameworks, opportunistic social networking routing, and trust/security in online social networks. Each project coordinates with others to build technologies that meet the NGI's objectives of responding to fundamental human needs like trust, security, values and ethics.
Analysing Transportation Data with Open Source Big Data Analytic Toolsijeei-iaes
This document discusses analyzing transportation data using open source big data analytic tools. It provides an overview of H2O and SparkR, two popular tools. It then demonstrates applying these tools to a transportation dataset, using a generalized linear model. Specifically, it shows importing and splitting the data, building a GLM model with H2O and SparkR, making predictions on test data, and comparing predicted versus actual values. The document provides examples of the coding and outputs at each step of the analysis process.
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
This document proposes and evaluates a solution to securely disseminate sensitive IoT data using FIWARE and Intel SGX. The solution uses FIWARE components for authentication and authorization, and introduces a new Key Vault component that uses Intel SGX to securely store and manage encryption keys. Sensitive IoT data from smart meters is encrypted before being sent to the FIWARE Orion Context Broker for processing. Consumers that are SGX applications can decrypt and process the data securely within the SGX enclave. The evaluation shows the solution provides privacy and security guarantees without harming scalability or availability.
Artificial intelligence has been a buzz word that is impacting every industry in the world. With the rise of
such advanced technology, there will be always a question regarding its impact on our social life,
environment and economy thus impacting all efforts exerted towards sustainable development. In the
information era, enormous amounts of data have become available on hand to decision makers. Big data
refers to datasets that are not only big, but also high in variety and velocity, which makes them difficult to
handle using traditional tools and techniques. Due to the rapid growth of such data, solutions need to be
studied and provided in order to handle and extract value and knowledge from these datasets for different
industries and business operations. Numerous use cases have shown that AI can ensure an effective supply
of information to citizens, users and customers in times of crisis. This paper aims to analyse some of the
different methods and scenario which can be applied to AI and big data, as well as the opportunities
provided by the application in various business operations and crisis management domains.
Similar to Concept for a Smart Web Portal.pdf (20)
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Tastemy Pandit
Know what your zodiac sign says about your taste in food! Explore how the 12 zodiac signs influence your culinary preferences with insights from MyPandit. Dive into astrology and flavors!
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...my Pandit
Explore the fascinating world of the Gemini Zodiac Sign. Discover the unique personality traits, key dates, and horoscope insights of Gemini individuals. Learn how their sociable, communicative nature and boundless curiosity make them the dynamic explorers of the zodiac. Dive into the duality of the Gemini sign and understand their intellectual and adventurous spirit.
The Genesis of BriansClub.cm Famous Dark WEb PlatformSabaaSudozai
BriansClub.cm, a famous platform on the dark web, has become one of the most infamous carding marketplaces, specializing in the sale of stolen credit card data.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.AnnySerafinaLove
This letter, written by Kellen Harkins, Course Director at Full Sail University, commends Anny Love's exemplary performance in the Video Sharing Platforms class. It highlights her dedication, willingness to challenge herself, and exceptional skills in production, editing, and marketing across various video platforms like YouTube, TikTok, and Instagram.
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...Aleksey Savkin
The Strategy Implementation System offers a structured approach to translating stakeholder needs into actionable strategies using high-level and low-level scorecards. It involves stakeholder analysis, strategy decomposition, adoption of strategic frameworks like Balanced Scorecard or OKR, and alignment of goals, initiatives, and KPIs.
Key Components:
- Stakeholder Analysis
- Strategy Decomposition
- Adoption of Business Frameworks
- Goal Setting
- Initiatives and Action Plans
- KPIs and Performance Metrics
- Learning and Adaptation
- Alignment and Cascading of Scorecards
Benefits:
- Systematic strategy formulation and execution.
- Framework flexibility and automation.
- Enhanced alignment and strategic focus across the organization.
Understanding User Needs and Satisfying ThemAggregage
https://www.productmanagementtoday.com/frs/26903918/understanding-user-needs-and-satisfying-them
We know we want to create products which our customers find to be valuable. Whether we label it as customer-centric or product-led depends on how long we've been doing product management. There are three challenges we face when doing this. The obvious challenge is figuring out what our users need; the non-obvious challenges are in creating a shared understanding of those needs and in sensing if what we're doing is meeting those needs.
In this webinar, we won't focus on the research methods for discovering user-needs. We will focus on synthesis of the needs we discover, communication and alignment tools, and how we operationalize addressing those needs.
Industry expert Scott Sehlhorst will:
• Introduce a taxonomy for user goals with real world examples
• Present the Onion Diagram, a tool for contextualizing task-level goals
• Illustrate how customer journey maps capture activity-level and task-level goals
• Demonstrate the best approach to selection and prioritization of user-goals to address
• Highlight the crucial benchmarks, observable changes, in ensuring fulfillment of customer needs
Storytelling is an incredibly valuable tool to share data and information. To get the most impact from stories there are a number of key ingredients. These are based on science and human nature. Using these elements in a story you can deliver information impactfully, ensure action and drive change.
Discover timeless style with the 2022 Vintage Roman Numerals Men's Ring. Crafted from premium stainless steel, this 6mm wide ring embodies elegance and durability. Perfect as a gift, it seamlessly blends classic Roman numeral detailing with modern sophistication, making it an ideal accessory for any occasion.
https://rb.gy/usj1a2
Digital Marketing with a Focus on Sustainabilitysssourabhsharma
Digital Marketing best practices including influencer marketing, content creators, and omnichannel marketing for Sustainable Brands at the Sustainable Cosmetics Summit 2024 in New York
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
[To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
This presentation is a curated compilation of PowerPoint diagrams and templates designed to illustrate 20 different digital transformation frameworks and models. These frameworks are based on recent industry trends and best practices, ensuring that the content remains relevant and up-to-date.
Key highlights include Microsoft's Digital Transformation Framework, which focuses on driving innovation and efficiency, and McKinsey's Ten Guiding Principles, which provide strategic insights for successful digital transformation. Additionally, Forrester's framework emphasizes enhancing customer experiences and modernizing IT infrastructure, while IDC's MaturityScape helps assess and develop organizational digital maturity. MIT's framework explores cutting-edge strategies for achieving digital success.
These materials are perfect for enhancing your business or classroom presentations, offering visual aids to supplement your insights. Please note that while comprehensive, these slides are intended as supplementary resources and may not be complete for standalone instructional purposes.
Frameworks/Models included:
Microsoft’s Digital Transformation Framework
McKinsey’s Ten Guiding Principles of Digital Transformation
Forrester’s Digital Transformation Framework
IDC’s Digital Transformation MaturityScape
MIT’s Digital Transformation Framework
Gartner’s Digital Transformation Framework
Accenture’s Digital Strategy & Enterprise Frameworks
Deloitte’s Digital Industrial Transformation Framework
Capgemini’s Digital Transformation Framework
PwC’s Digital Transformation Framework
Cisco’s Digital Transformation Framework
Cognizant’s Digital Transformation Framework
DXC Technology’s Digital Transformation Framework
The BCG Strategy Palette
McKinsey’s Digital Transformation Framework
Digital Transformation Compass
Four Levels of Digital Maturity
Design Thinking Framework
Business Model Canvas
Customer Journey Map
How MJ Global Leads the Packaging Industry.pdfMJ Global
MJ Global's success in staying ahead of the curve in the packaging industry is a testament to its dedication to innovation, sustainability, and customer-centricity. By embracing technological advancements, leading in eco-friendly solutions, collaborating with industry leaders, and adapting to evolving consumer preferences, MJ Global continues to set new standards in the packaging sector.
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Final ank Satta Matka Dpbos Final ank Satta Matta Matka 143 Kalyan Matka Guessing Final Matka Final ank Today Matka 420 Satta Batta Satta 143 Kalyan Chart Main Bazar Chart vip Matka Guessing Dpboss 143 Guessing Kalyan night
Part 2 Deep Dive: Navigating the 2024 Slowdownjeffkluth1
Introduction
The global retail industry has weathered numerous storms, with the financial crisis of 2008 serving as a poignant reminder of the sector's resilience and adaptability. However, as we navigate the complex landscape of 2024, retailers face a unique set of challenges that demand innovative strategies and a fundamental shift in mindset. This white paper contrasts the impact of the 2008 recession on the retail sector with the current headwinds retailers are grappling with, while offering a comprehensive roadmap for success in this new paradigm.
1. See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/236886399
A Concept for a Smart Web Portal Development in Intelligence Information
System Based on SOA
Conference Paper · March 2013
CITATIONS
0
READS
1,754
3 authors:
Some of the authors of this publication are also working on these related projects:
Development, test and integration of advanced systems for prevention and early detection of forest fires (Short version: Advanced systems for prev. & early detection of
forest fires) (ASPires) View project
SIARS (Smart I (eye) Advisory Rescue System) View project
Jugoslav Achkoski
Goce Delcev University of Štip
68 PUBLICATIONS 66 CITATIONS
SEE PROFILE
Vladimir Trajkovik
Ss. Cyril and Methodius University in Skopje
287 PUBLICATIONS 1,813 CITATIONS
SEE PROFILE
Nevena Serafimova
Goce Delcev University of Štip
7 PUBLICATIONS 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Jugoslav Achkoski on 22 May 2014.
The user has requested enhancement of the downloaded file.
3. The 9th
Conference for Informatics and Information Technology (CIIT 2012)
farming, and emerging Web-based applications. A need is
acknowledged for a deeper understanding of computational,
logical, cognitive, physical, and social foundations as well as
for technologies that will enable development and
application of web-based intelligence and autonomous
agents systems.
In the work of Buhler and Vidal [5], a composition language is
used for the purpose of creating an agent wrapper which
allows services to collaborate.
The Semantic Web Services as presented for example in [6],
extend Web technology by enabling interactions between
machine and human as well as machine to machine
interactions, with well-defined semantics of Web resources
and services.
III. MODEL OF INTELLIGENCE INFORMATION SYSTEM BASED
ON SOA
The Model of SOA-based Intelligence Information System
shown on Figure 1 should completely fulfil the intelligence
role and assignments and its connection to the information
systems of similar institutions [12].
The presented IIS model encompasses three types of users:
service providers, service consumers and Intelligence.
Service consumers are institutions (Crisis Management
Center, MOI, Intelligence Agency or others) which need
information from IIS or can give information as a notification
[13].
The intelligence is based on several disciplines: IMINT,
SIGINT, MASINT, OSINT, etc. In order to fulfil their
requirements, several tasks should be completed; gathering
information (assessments, analyses, generating reports,
etc.), verification and notification (e.g., political and security
situation in foreign countries related to security of
investments), etc.
All services are getting information from appropriate service
providers through Information systems of the government
institutions or the agencies which are included in Intelligence
cycle. In addition, it is possible for other Information systems
to act as service providers for inter-institutional governance.
Service providers which support for the workflow processes,
define which web services can be exploited by the users with
appropriate service registers’ security level.
Our methodology of developing SOA-based Intelligence
Information System consists of several postulates.
Experiences from recent researches which refers to SOA
show that agencies, departments, institutions and other
stakeholders can push and pull data on a standardized and
flexible manner through communication interfaces using
XML schema and web services.
Figure 1: Model of SOA-based Intelligence Information System.
The first postulate defines data exchanging methodology
within SOA. It should be compatible with publicly described
solutions for information systems which are supporting
intelligence functions.
The second postulate focuses on the usage of SOA for
information systems design, with the intention of finding
relevance for developing Intelligence IIS.
4. The 9th
Conference for Informatics and Information Technology (CIIT 2012)
The third postulate describes end users’ functionalities for
the IIS. Depending on a particular type of user, the
functionalities of IIS can be explored from different aspects.
Intelligence, being a system end user of IIS, is based upon
intelligence disciplines which are further divided to sub-
intelligence disciplines.
The fourth postulate provides means that enable the future
development of the IIS. In order to meet its future
requirements, information infrastructure should be
adoptable and flexible, and thus it needs to fully support
information sharing process.
The fifth postulate suggests a need for implementation of
security standards for achieving adequate security level.
These five postulates promote the SOA system as a most
appropriate IT infrastructure for the IIS purposes. Here we
have minimum requirements for designing services which
are needed in the intelligence process, with internal
functions available for processing from external IIS peer [11].
IV. SMART WEB PORTAL DEVELOPMENT
The functioning of a comprehensive integrated Intelligence
Web Portal should be organized around (but not limited to)
collecting, classifying, search of data together with planning,
scheduling and finding solutions to specific problems. Each of
these operations imposes numerous system requirements
and on the other hand, is subjected to substantial
constraints. While general data searching and analysis
techniques do exist, they are not customized for this
particular domain.
The process of the Intelligence Cycle is characterized by
separate tasks, which are being carried out by different parts
of the intelligence community. Traditional intelligence cycle
separates collectors, processors, and analysts which often
results in losing valuable information [14]. This approach can
be inefficient in circumstances involving complex, dynamic
events and highly non-linear situation developments. In real-
time problems, this can trigger serious obstacles, thus
impeding efficient collaboration and appropriate actions. In
addition, one of the biggest challenges for the intelligence
analysis is responding to the time constraint.
The architecture of the Intelligence Information System is
based upon the Intelligence Cycle, consisted itself of four
phases: information planning phase, information collecting
phase, analyzing (information processing) phase and
information disseminating phase. Hereinafter, we would like
to discuss the automation of the second, the third and the
fourth phase in the context of the Intelligence Cycle
framework.
The purpose of the Smart Web Portal (Figure 2) as a
component of the Intelligence Information System, is to
manage information that are collected, processed and
disseminated [7],[8]. Therefore, it should be capable of
executing three main functions: gathering (collecting)
information from different sources, analyzing (processing)
collected information and disseminating analyzed
information. Thus, the Smart Web Portal system will be
comprised of the following modules:
1. Collection Module – generates relation between
intelligence information and stores data from different
sources;
2. Processing Module – updates and enriches knowledge
database;
3. Dissemination Module – creates and stores users, and
updates existed user profiles
The Knowledge database communicates information to the
Collection Module, since the functionality of the Processing
Module depends on data that are stored in this database [9],
[10]. The enrichment of the Knowledge Database is based on
the process of semiautomatic annotation which starts with
the search engine, whose responsibility is to update data in
the system. The Search engine will search through databases
of web services that are components of the Intelligence
Information System. Each of these web services is an
interface for a different type of sensors which collect
Intelligence information. Collected information can be
converted in a machine readable format and sent for an
annotation process, which is based upon concepts and
relations applied in Collection Module ontology. When the
process of annotation is finished, a message i.e., an e-mail is
sent to the administrator as a notification of annotated
information, upon which the administrator starts a
verification function. The result of this process is a final set of
annotated information.
Intelligence information that is collected and stored in the
database of the Collection module is in a form of raw data of
various types: text, audio, video, image etc., which can be
enriched with metadata. A notification is sent to the user
(here, the intelligence officer) that information is collected
5. The 9th
Conference for Informatics and Information Technology (CIIT 2012)
from a certain service. Next, the user manually fills out a
form that is related to metadata about this information.
Metadata are important for the analysis in the Processing
and the Dissemination Module, since they allow introducing
analysis techniques such as text classification and clustering.
Another feature of this module is information indexing (with
common, widely used techniques being stop-word removal
and stemming).
From this point on, information is processed and
disseminated automatically to the end-user of the system. In
the Processing Module, data are subjected to clustering and
text classification functions. The first function performs
information grouping based on their similarity, while the
second function provides classification of information into
predefined categories. Applying text classification and
clustering for grouping documents into categories will
contribute for a dynamic, similarities based data
organization. Furthermore, visualization techniques can be
applied to the vast data set in order to discover patterns,
trends and meaningful links that may reflect past and current
situation developments. Techniques for data mining could
also be incorporated while by considering probability
assignments, uncertain information could appropriately be
taken into account when needed.
Figure 2: Framework of the Smart Web Portal
All of these functionalities can significantly improve the
process of the intelligence analysis of retrieved information.
The organization and techniques that are applied during the
phase of data processing are crucial for successful
introduction of the Dissemination Module. Information is
sent to the user responsible for managing the specific type of
intelligence information. Additional features that can be
used in information dissemination are users’ logs and
profiles, assuring that information are sent to the right user.
We should be aware of the fact that an intelligence-oriented
Web Portal requires appropriate ontology, well developed to
express complicated and possibly contradictory information.
The classes should be organized in reference to people,
objects/places, events and data related to them, being at the
6. The 9th
Conference for Informatics and Information Technology (CIIT 2012)
same time sufficiently comprehensive but not overly specific
[15]The properties and classes that reflect specified activities
can be complicated and the linking between classes would
not necessarily be evident. Furthermore, teams that work on
specific issues could create subclasses in response to needs,
with properties and rules according to monitored issues.
When organized around mutual ontology, separate
databases could be merged for the purpose of serving a
more complex matter. It is also essential that the ontology
remains on a manageable scale and not expand to a
multitude of classes, so that the prospective user is able to
understand and manipulate it.
V. CONCLUSION
Implementing intelligent information system into the
Intelligence domain contributes for an appropriate and
flexible use of information, promoting its search ability and
exploitation attributes for the purpose of raising National
Security. Intelligent systems can improve current protocol of
working in Intelligence, which can further generate new
intelligence protocols.
When producing new data from the already given, the time
that is required to do this will directly affect if and how these
information can be used further on, especially when a time-
critical decision making takes place. If promptly available,
processed data will not significantly lengthen the Intelligence
Cycle time. However, failing to provide crucial information
when needed may yield these data to be obsolete or useless.
With this in mind, the central contribution of this paper
refers to an upgrade of an Intelligence Information System
with a Smart Web Portal feature, composed of three
modules combined together to automate the Intelligence
cycle. The overall purpose of this feature is to store and
organize specific information in a rapid and efficient manner,
and ensure their delivery to the right end-user.
We single out the information overload issue and the lack of
adequate analysis tools, which remain key issues that should
be resolved in future. Having in mind the specifics of the
intelligence domain, some strong multi-source integration
strategies are needed. A possible approach in overcoming
this hurdle is by using Target-centric Analysis which has
already been discussed in the context of Intelligence Analysis
(see [15]), where small teams work in developing specific
issue databases. The Semantic Web is a powerful tool for
giving information an adequate meaning, by defining
concepts in a way understandable for a computer which can
further be related to other, already existing concepts. Its
flexibility will facilitate the implementation of useful data
analysis applications and enable inclusion of rules for
inferring possible relationships from data.
Finally, being one of the key requirements, our intention is to
search for appropriate solutions for data annotation.
REFERENCES
[1] P. Baglietto , M. Maresca, et al."Stepwise deployment methodology of
a service oriented architecture for business communities." Journal:
Information and Software Technology 47(6), pp. 427-436. 2005
[2] M. H. Burstein "Dynamic Invocation of Semantic Web Services That Use
Unfamiliar Ontologies." IEEE INTELLIGENT SYSTEMS (JULY/AUGUST).
(vol. 19 no. 4) pp. 67-73. 2004
[3] M. Castellano “An e-Government Cooperative Framework for
Government Agencies“. 38th Hawaii International Conference on
System Sciences. Hawaii, IEEE. pp. 121c-121c. 2005
[4] T. Erl, Service-Oriented Architecture: A Field Guide to Integrating XML
and Web Services, Published by Prentice Hall. 2004
[5] Buhler, P. A. and Vidal, J. M. Semantic Web Services as Agent
Behaviors, Agentcities: Challenges in Open Agent Environments, pages
25-31. Springer-Verlag, 2003
[6] Smith, C. F., Alesso, H. P. (2005). Developing Semantic Web Services. A
K Peters, Ltd.
[7] Chun-Wei Tsai, Jiun-Huei Ho, Ting-Wen Liang and Chu-Sing Yang,
"IWPS: An Intelligent Web Portal System for Web Information Region
Integration," IEEE International Conference on Systems, Man and
Cybernetics (SMC), pp.3884-3889, 2005
[8] T. Erl, “Service-Oriented Architecture”, A Field Guide to Integrating
XML and Web Services, Prentice-Hall, 2004
[9] Liu, J., Zhong, N., Yao, Y., & Ras, Z. W. (2003). The Wisdom Web: New
Challenges for Web Intelligence (WI). Journal of Intelligent Information
Systems, 20 (1), 5-9.
[10] McIlraith, S. A., Son, T. C., & Zeng, H. (2001). Semantic Web Services.
IEEE Intelligent Systems, 16 (2), 46-53.
[11] N. Brehm , J.M. Gómez,: Secure Web Service-based resource sharing in
ERP networks. International Journal on Information Privacy and
Security (JIPS) 1 pp. 29-48, 2005
[12] Jugoslav Ackoski, Vladimir Trajkovik, “Intelligence Information System
Integration,” The 8th International Conference for Informatics and
Information Technology (CIIT 2011), Bitola, Macedonia, March 2011
[13] Jugoslav Ackoski, Vladimir Trajkovik and Danco Davcev, “Service-
Oriented Architecture Concept for Intelligence Information System
Development,” The Third International Conferences on Advanced
Service Computing SERVICE COMPUTATION 2011 (IARIA), Rome, Italy,
September 25 - 30, 2011
[14] E. Jardines, 'Testimony of Eliot A. Jardines', in 'Using Open Source
Effectively: Hearings before the Subcommittee on Intelligence,
Information and Terrorism Risk Assessment, Committee on Homeland
Security' (21 June 2005)
[15] Clark, Robert M. (2003), Intelligence Analysis: A Target-Centric
Approach, CQ Press, ISBN 1-56802-830-X
View publication stats