The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a compilation tool SBVR2Alloy which is used to automatically generate as well as validate service choreographies specified in structured natural language. The proposed approach builds on a model transformation between Semantics of Business Vocabulary and Rules (SBVR), an OMG standard for specifying business models in structured English, and the Alloy Analyzer which is a SAT based constraint...
Socio-economic characteristics of the systems crisis which was brought about to Russia during the reforms period and was caused by implementing “shock therapy” are examined. Its main negative and positive consequences for the country are noted and the most important reasons for it are systematized. They include both conducting reforms on the basis of “Washington Consensus” provisions and ignoring...
The methodological aspects of building standardized profiles describing the development of a security system that is an integral part of a distributed information system are considered. Functional standardization instruments and the theory of open systems are used.
Based on the analysis of current conditions and shortages of the configuration files management in smart substation, the problems existing in current conditions are proposed, such as: ICD test technology, SCD test technology, SCD difference comparison technology. In order to meet the demand of the large scale smart substation construction, a solution of building the smart substation configuration...
Despite the great benefits of cloud computing on businesses, some organizations have had to withdraw from its service due to incomplete compliance to conditions from standards, bodies, or Service Level Agreements which have led to their being penalized. A structured and efficient model is helpful to aid small and medium scale enterprises (SMSEs) utilize cloud services safely and ascertain their fitting...
The identification of online robot is important for managing the internet order, such as forbidding spam, fictitious information, and inductive words published by online robot to mislead the public. We studied the behaviors of the WeChat users to identify online robot, including turning pages, scanning the web, and forwarding posts. In fact, the amount and time interval of information forwarding were...
With economic and industrial restructuring, the number and size of commercial parks are increasing. The most basic function of energy storage system in commercial parks is to carry out the load side, Which also brings economic benefits and ensures the reliability of power grid. Therefore, it is of practical significance to study the control strategy of energy storage system in business parks. In this...
A significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines...
This paper provides a timely study report of FDT and AutomationML Collaboration. AutomationML is on the shortlist of several IIoT standards. It contains several parts related to describe different aspects for in the design process of a plant. The information related to FDT are the description of the system topology and the communication relations within such a topology. The output of a CAE tool is...
This paper presents differential pressure based flow configuration software implemented using FDT2 technology. FDT2 is a latest version of FDT standard (IEC62453) which is useful for configuration, monitoring, diagnosis and asset management of field device. Using FDT2 technology, client server system for flow configuration will be achieved keeping the interoperability of host system. The original...
Trace checking is a procedure for evaluating requirements over a log of events produced by a system. This paper deals with the problem of performing trace checking of temporal properties expressed in TemPsy, a pattern-based specification language. The goal of the paper is to present a scalable and practical solution for trace checking, which can be used in contexts where relying on model-driven engineering...
This paper describes the design of a DC grid as a utility grid of a business park. The center of the DC grid is a DC substation. The DC substation is supplied from the MV AC grid. With a transformer and an Active Front-End, the AC voltage of 10 kV is transformed into 750 VDC. At customer side, the 750 VDC is converted to the required DC voltage for his application.
Digital Business or D-Business is an environment where nearly all physical and virtual assets in the value chain are digital. Intelligent objects, are a part of end-to-end processes. Business is conducted by intelligent agents making decisions based on context provided by the IoT — Internet of Things. In order to improve productivity in the value chain, a Steel Mill decided to automate one of its...
Effective presentation skills can help to succeed in business, career and academy. This paper presents the design of speech assessment during the oral presentation and the algorithm for speech evaluation based on criteria of optimal intonation. As the pace of the speech and its optimal intonation varies from language to language, developing an automatic identification of language during the presentation...
As the Internet of Things implies building systems of interconnected everyday objects, programming such complex devices can be a struggle. There are multiple possible programming approaches when building a smart system, each with its pros and cons. This paper presents a comparison between several existing approaches, but also our proposal of a BPMN based approach that we applied to the Internet of...
In order to enhance the security protection level of power information system, this paper has analyzed the logic structure of power information system, further studied the DL/T 1527-2016 technology specification of electric power utilization information security protection. On the basis of interpretation standards, it has researched the overall security strategy for the power information system, developed...
Graphical models for business processes are very large and cumbersome to build. Reusable process patterns can make this modeling task much easier. While using reusable components is a well-explored subject in software engineering, not much has been done in the context of business process modeling. In this paper, we will present an extension to Business Process Model and Notation (BPMN), the standard...
In the recent times, software security has gained a great deal of attention in the Software Development Life Cycle due to increased cases of reported cyber threats and incidents. A considerable number of cyber-attacks targeting financial systems has made security be the most critical feature in banking systems. However, establishing security requirements for these applications can be a challenging...
Business processes, as the instruments used by organisations to produce value, need to comply with a number of internally and externally imposed standards and restrictions. Since the majority of such processes involve the exchange of sensitive third party information, their compliance to security constraints needs to be verified before they can be implemented. Current attempts for the verification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.