Template-Type: ReDIF-Article 1.0 Author-Name: Waleed M. Al-Adrousy Author-Name: Hesham Ali Author-Name: Taher Hamza Title: A Transitive Recommendation System for Information Technology Communities Abstract: Social networks have become a new trend for research among computer scientist around the world. Social network had an impact on users' way of life. One of social network usages is recommendation systems. The need of recommendation systems is arising when users try to know best choice for them in many items types (books, experts, locations, technologies...etc). The problem is that a single person can't try all alternatives in all possibles life goals to compare. Thus, a person has to use his friends' expertise to select better option in any item category. This process is the main idea of “Recommendation Systems”. Recommendation systems usually depend on users-to-items ratings in a network (graph). Two main challenges for recommendation systems are accuracy of recommendation and computation size. The main objective of this paper is to introduce a suggested technique for transitive recommendation system based on users' collaborative ratings, and also to balance loading of computation. All this has to be applied on a special type of social network. Our work studied the transitivity usage in connections to get a relation (path) as a recommendation for nodes not directly connected. The target social network has eight types of nodes. So, there are techniques that are not suitable to this complex type of network. Those we can present a new support for recommending items of several types to users with several types. We believe that this functionality hasn't been fully provided elsewhere. We have suggested using single source shortest path algorithm combined with Map Reduce technique, and mathematically deduced that we have a speeding up of algorithm by 10% approximately. Our testing results shows an accuracy of 89% and false rejection of 99% compared to traditional algorithms with less configuration parameters and more steady count of recommendations. Keywords: Social network, Recommender systems, Collaborative filtering, Parallelism, Web mining, Graph theory Pages: 1-17 Volume: 2013 Issue: 1 Year: 2013 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=9.pdf File-URL: http://aip.vse.cz/index.php/aip/article/view/18 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2013:y:2013:i:1:id:9:p:1-17 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/9 Template-Type: ReDIF-Article 1.0 Author-Name: Jakub Křoustek Author-Name: Dušan Kolář Title: Approaching Retargetable Static, Dynamic, and Hybrid Executable-Code Analysis Abstract: Program comprehension and reverse engineering are two large domains of computer science that have one common goal - analysis of existing programs and understanding their behaviour. In present, methods of source code analysis are well established and used in practice by software engineers. On the other hand, analysis of executable code is a more challenging task that is not fully covered by existing tools. Furthermore, methods of retargetable executable code analysis are rare because of their complexity. In this paper, we present a complex platform independent toolchain for executable-code analysis that supports both static and dynamic analysis. This toolchain, developed within the Lissom project, exploits several previously designed methods and it can be used for debugging user’s applications as well as malware analysis, etc. The main contribution of this paper is to interconnect the existing methods and illustrate their usage on the real world scenarios. Furthermore, we introduce a concept of a new retargetable method - the hybrid analysis. It can eliminate the shortcomings of the static and dynamic analysis in future. Keywords: Debugger, Decompiler, Lissom, Reverse Engineering Pages: 18-29 Volume: 2013 Issue: 1 Year: 2013 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=10.pdf File-URL: http://aip.vse.cz/index.php/aip/article/view/19 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2013:y:2013:i:1:id:10:p:18-29 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/10 Template-Type: ReDIF-Article 1.0 Author-Name: Stefan Sauermann Author-Name: Matthias Frohner Author-Name: Philipp Urbauer Author-Name: Mathias Forjan Author-Name: Birgit Pohn Author-Name: Andreas Drauschke Author-Name: Alexander Mense Title: The adolescence of electronic health records: Status and perspectives for large scale implementation Abstract: Health informatics started to evolve decades ago with the intention to support healthcare using computers. Since then Electronic health records (EHRs) and personal health records (PHRs) have become available but widespread adoption was limited by lack of interoperability and security issues. This paper discusses the feasibility of interoperable standards based EHRs and PHRs drawing on experience from implementation projects. It outlines challenges and goals in education and implementation for the next years. Keywords: Electronic health record, Personal health record, Feasibility, Standards, Interoperability Pages: 30-38 Volume: 2013 Issue: 1 Year: 2013 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=11.pdf File-URL: http://aip.vse.cz/index.php/aip/article/view/27 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2013:y:2013:i:1:id:11:p:30-38 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/11 Template-Type: ReDIF-Article 1.0 Author-Name: Peter Fanfara Author-Name: Martin Chovanec Title: Influence of Sophisticated Hybrid Honeypot on Efficiency of Intrusion Detection System Architecture in Distributed Computer Systems Abstract: In the current development of technologies, rapid growth of computer networks and distributed systems still exist a very probable risk of attack. There have been developed and implemented a number of solutions to help in detecting and/or preventing attacks and to improve the actual system security. The most common solution is to use Intrusion Detection System (IDS) in cooperation with the firewall. Neither the IDS nor firewall can respond in real time to a specific type of attack. This paper deals with the detection mechanism based on Honeypot technology and its use in the proposed architecture to improve security of computer systems. The essence of the work is to show how can sophisticated hybrid Honeypot influence the design of IDS architecture and thus increase its efficiency. Keywords: IDS, Intrusion Detection System, Honeypot, Malicious code, Security, bezpečnosť počítačových systémov, systém detekcie prienikov, škodlivý kód, honeypot Pages: 39-56 Volume: 2013 Issue: 1 Year: 2013 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=12.pdf File-URL: http://aip.vse.cz/index.php/aip/article/view/33 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2013:y:2013:i:1:id:12:p:39-56 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/12 Template-Type: ReDIF-Article 1.0 Author-Name: Hynek Stehlík Title: Visual language Archimate for Enterprise Architecture modelling - an example of a tablet ecosystem integration Abstract: The purpose of this article is to demonstrate Enterprise Architecture modelling capabilities of Archimate - a visual language. We analyse problem of an integration of a consumer oriented tablet ecosystem into existing enterprise technology architectures. We discuss forces leading towards an increase of heterogeneous environment during deployment of tablet applications into enterprise systems. The article is primarily targeted at IT architects and managers in the enterprise sector, who are involved in strategic decision processes. Keywords: Archimate, Tablet, Architecture, Enterprise Information Systems, Ecosystem, Archimate, ekosystém, podnikové informační systémy, architektura, tablet Pages: 57-69 Volume: 2013 Issue: 1 Year: 2013 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=13.pdf File-URL: http://aip.vse.cz/index.php/aip/article/view/29 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2013:y:2013:i:1:id:13:p:57-69 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/13 Template-Type: ReDIF-Article 1.0 Author-Name: Václav Nádvorník Title: How Czech Students and Teachers use the Internet Abstract: It is useless to argue about statement that contemporary generation of students of elementary schools is the Internet generation. The aim of the article is to describe how children use the Internet, which parts of the Internet they use more and less. We can compare this finding out with the habits of teachers. The author made a survey among 630 students and 150 teachers from different schools in the Czech Republic. The article should be an inspiration for school web masters and for teachers. It can recommend them appropriate communication channels to students. Keywords: Internet and students, School web site, Internet, Facebook, internet a žáci, Facebook, školní webová stránka, internet Pages: 70-78 Volume: 2013 Issue: 1 Year: 2013 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=14.pdf File-URL: http://aip.vse.cz/index.php/aip/article/view/22 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2013:y:2013:i:1:id:14:p:70-78 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/14 Template-Type: ReDIF-Article 1.0 Author-Name: Liberios Vokorokos Author-Name: Eva Chovancová Title: Acceleration based on multicore architecture Abstract: Multicore processors can be designed also as accelerator of time-consuming calculations. This work is focused on architecture design, which can accelerate computing in computer vision. In this paper are shown design possibilities for multicore architectures, whereby the specialized processor is proposed as representative of Harvard architecture. The proposed architecture based on computing parallelization allows accelerating the time-consuming calculations in computer vision. Keywords: multicore architecture, processor, chip, mapping, parallelization, image, thresholding, viacjadrová architektúra, mapovanie, čip, paralelizácia, procesor, obraz, prahovanie Pages: 79-90 Volume: 2013 Issue: 1 Year: 2013 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=15.pdf File-URL: http://aip.vse.cz/index.php/aip/article/view/26 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2013:y:2013:i:1:id:15:p:79-90 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/15 Template-Type: ReDIF-Article 1.0 Author-Name: Anna Exnarová Title: Applying systems thinking in the analytical stage of application development Abstract: This paper presents the proposal for application of systems thinking in the application development process. The models of systems thinking present to the reader the possibility of their use and application in the software application development process. The proposal does not mandate the creation of a specific model at some point, but suggests how the selected models can be used. Authorial intention is to change the mental model of the reader - particularly the part that contains an image of the application of systems thinking in developing applications. Keywords: Modelling, Mental models, Systems thinking, Development of the information system, Software application, modelování, mentální modely, systémové myšlení, vývoj informačních systémů, softwarová aplikace Pages: 91-100 Volume: 2013 Issue: 1 Year: 2013 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=16.pdf File-URL: http://aip.vse.cz/index.php/aip/article/view/36 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2013:y:2013:i:1:id:16:p:91-100 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/16 Template-Type: ReDIF-Article 1.0 Author-Name: František Jakab Author-Name: Adrián Pekár Author-Name: Peter Feciľak Author-Name: Miroslav Michalko Title: Optimization of Network Traffic Monitoring Abstract: This paper deals with problems which occur in passive measurement of network characteristics. It describes the most used approaches of measuring network parameters as well as those properties, which are most frequently monitored. The main aim of this paper is to introduce a conceptual design of a solution for the discussed problems, which should be achieved by automated adapting of flow records export of traffic to the actual state of the network. Keywords: passive measurement, active measurement, network traffic monitoring, flow, IPFIX, pasívne meranie, aktívne meranie, monitorovanie sieťovej prevádzky, tok, IPFIX Pages: 101-121 Volume: 2013 Issue: 1 Year: 2013 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=17.pdf File-URL: http://aip.vse.cz/index.php/aip/article/view/30 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2013:y:2013:i:1:id:17:p:101-121 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/17 Template-Type: ReDIF-Article 1.0 Author-Name: Tomáš Klíma Title: Social engineering or the art of deception Abstract: Review of the Kevin Mitnick´s book Art of deception. This book introduces to us the social engineering as complementary tool to technically-based approaches to penetration of information security of organisations. Unlike these approaches the social engineering doesn´t become obsolete so fast which means this book has a value for the IT security guys as well as for the end users who are the main victims of social engineering. Keywords: review, recenze, Social engineering, Information security, sociální inženýrství, sociotechnika, informační bezpečnost Pages: 122-124 Volume: 2013 Issue: 1 Year: 2013 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=18.pdf File-URL: http://aip.vse.cz/index.php/aip/article/view/23 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2013:y:2013:i:1:id:18:p:122-124 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/18 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Sova Title: Relativity of knowledge as basis of thinking Abstract: We’re unable to understand the depth of every idea we accept as true. We’ve to be believed in facts, presented to us as the true from source considered as authoritative. This paper discusses relativity of knowledge, nonexistence of objective truth and indicates danger inherent in the synergistic effect of psychological mechanisms and the system role of human being trying to objectively describe reality. Keywords: Reality, Knowledge, Dogma, Paradigm, Belief, System, realita, znalost, dogma, paradigma, víra, systém Pages: 125-131 Volume: 2013 Issue: 1 Year: 2013 File-URL: http://www.vse.cz/aip/download.php?jnl=aip&pdf=19.pdf File-URL: http://aip.vse.cz/index.php/aip/article/view/32 File-Format: text/html Handle: RePEc:prg:jnlaip:v:2013:y:2013:i:1:id:19:p:125-131 X-File-Ref: http://www.vse.cz/RePEc/prg/jnlaip/references/19