The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional process modeling in contemporary information systems concentrates on the design and configuration phases, while less attention is dedicated to the enactment phase. Instead of starting with a process design, process mining attempts to discover interesting patterns from a set of real time execution namely event logs, which can be handled as a main data source for end-user behavior analysis,...
This paper presents our business process analysis architecture and three effective use scenarios, business process improvement, system usability improvement, and role and organization improvement, which effectiveness has been proved through customer projects. Each use scenario addresses different stakeholders of the enterprise while the underlying analysis architecture is the same. This paper also...
There are many problems that management must address in order to maintain the development of enterprises. Organizations need to accept changes brought about by solutions to problems, such as construction of new production facilities, development of new products, and introduction of computers. Typically, such changes are carried out within each unit of a project. However, adoption of new technologies...
Nonnegative matrix factorization (NMF) is an algorithm for blind source separation. It has been reported that the use of kernel NMF (KNMF) is a particularly feasible way to extract the features of a motor-imagery related EEG spectrum, which is often used in brain-computer interfaces (BCI). A BCI system enables users to control electrical devices without their hands or feet, and often requests to tell...
Process Management software and solutions mainly address structured processes in enterprises, but there are still many business applications that are less structured by their nature, such as human-centric and ad hoc workflows. Existing process mining algorithms often have difficulties in extracting a skeletal structure of a less-structured process model from real-life event logs. We propose a new...
Obstructive sleep apnea syndrome is the most common type of sleep apnea, characterized by repetitive pauses in breathing during sleep. Recent studies have investigated screening methods based only on an electrocardiogram (ECG). Generally, in ECG-based screening, the ECG-derived respiration (EDR) is often used, which is caused by the variance in the cardiac electrical axis due to the chest movement...
The amounts of unstructured data stored in companies are rapidly growing up, and the needs for utilizing those data are coming up. We've been working on research and development of a platform that can ease utilization of unstructured data. In order to make situation aware information system in organizations such as hospitals, utilizing unstructured data such as texts, images, and voices, in combination...
This paper proposes a revised customer behavioral model for Agent-Based In-Store Simulator (ABISS). ABISS is able to carry out a virtual experiment of customers' purchasing and walking behavior in the supermarket. To enhance the performance of ABISS, however, we must observe real customer behaviors and determine their behavioral parameters. In this paper, we describe a new indirect measurement method:...
Efficient store and query of RDF graph database is of increasing importance due to the popularity and widespread acceptance of RDF on various applications including semantic/situation aware computing. In this paper, we have applied an query optimization based on graph contraction that boosts the query processing on relationally-backed RDF store. The query optimization technique based on graph contraction...
We analyze a unique dataset, with funds transfers processed by the Brazilian Payments System, using network theory concepts. The analyses show that there is a subset of financial institutions acting as money centers. The local importance of the financial institutions is moderately concentrated and increased between 2006 and 2011. We also analyze the impact the default of institutions cause on their...
Recent years have seen tremendous growth of many online social networks such as Facebook, Linked In and My Space. People connect to each other through these networks forming large social communities providing researchers rich datasets to understand, model and predict social interactions and behaviors. New contacts in these networks can be formed either due to an individual's demographic profile such...
Finding motifs is important for understanding the structure of a network in terms of its building blocks. A network motif is a sub graph that appears significantly more often in a real network than expected in randomised networks. This paper looks at motif detection for a special class of directed networks: directed a cyclic networks. Normally, randomised networks are obtained using the switching...
Spatially embedded systems of interdependent networks with full dependency (q=1) have been found to have a first-order percolation transition if the dependency link length (the maximum distance in lattice units between a node in one network and the node that it depends on in another network) is longer than a certain critical length r_capprox 8. We find here that a similar result is valid for any finite...
Companies that keep offices in China face many problems that seldom exist in developed countries, i.e., politically motivated restrictions, quality of networks and work ethics of employees. This paper examines examples we have experienced in supporting those companies, and illustrates how we achieve dependable and trustworthy information systems in such an environment. The architecture we apply is...
Many complex systems have functional interdependency between each other and can be modeled as interdependent networks. The failure of a small fraction of nodes in interdependent networks may lead to catastrophic cascading failures across network borders. Starting from a model of static interdependent networks, by introducing lifetime for each component, we study the reliability properties and lifetimes...
We demonstrate how to compare networks using a novel family of measures of an edge's contribution to particular aspects of diffusion dynamics on a network. These centrality measures are based on membership in structural motifs that determine the network's reliability, as introduced by Moore and Shannon in 1956. Moore:56 The measures are analogous to between ness, but are more directly related to specific...
Applications of private matching (PM) are not limited to any specific domain of interest. Social media, e-health and commerce applications can afford to share certain common information without disclosing any extra details. PM ensures to reveal only common information between the communicating parties. In this paper we have presented a light weight protocol named Reflection for PM. Depending upon...
We investigate analytically the robustness of scale-free networks against overload failures in percolation and cascading processes. Modeling fluctuating loads in a network by random walkers, it is found that there exist two kinds of robustness of networks against overload failures in the percolation process. One is measured by the critical total load W_rmc and the other is by the critical node removal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.