Acta Informatica Pragensia, 2013 (vol. 2), issue 1
Article
A Transitive Recommendation System for Information Technology Communities
Waleed M. Al-Adrousy, Hesham A. Ali, Taher T. Hamza
Acta Informatica Pragensia 2013, 2(1), 1-17 | DOI: 10.18267/j.aip.95604
Social networks have become a new trend for research among computer scientist around the world. Social network had an impact on users' way of life. One of social network usages is recommendation systems. The need of recommendation systems is arising when users try to know best choice for them in many items types (books, experts, locations, technologies, etc.). The problem is that a single person can't try all alternatives in all possibilities life goals to compare. Thus, a person has to use his friends' expertise to select better option in any item category. This process is the main idea of "Recommendation Systems". Recommendation systems usually depend...
Approaching Retargetable Static, Dynamic, and Hybrid Executable-Code Analysis
Jakub Křoustek, Dušan Kolář
Acta Informatica Pragensia 2013, 2(1), 18-29 | DOI: 10.18267/j.aip.106015
Program comprehension and reverse engineering are two large domains of computer science that have one common goal - analysis of existing programs and understanding their behaviour. In present, methods of source-code analysis are well established and used in practice by software engineers. On the other hand, analysis of executable code is a more challenging task that is not fully covered by existing tools. Furthermore, methods of retargetable executable-code analysis are rare because of their complexity. In this paper, we present a complex platform-independent toolchain for executable-code analysis that supports both static and dynamic analysis. This...
The adolescence of electronic health records: Status and perspectives for large scale implementation
Stefan Sauermann, Matthias Frohner, Philipp Urbauer, Mathias Forjan, Birgit Pohn, Andreas Drauschke, Alexander Mense
Acta Informatica Pragensia 2013, 2(1), 30-38 | DOI: 10.18267/j.aip.118195
Health informatics started to evolve decades ago with the intention to support healthcare using computers. Since then Electronic health records (EHRs) and personal health records (PHRs) have become available but widespread adoption was limited by lack of interoperability and security issues. This paper discusses the feasibility of interoperable standards based EHRs and PHRs drawing on experience from implementation projects. It outlines challenges and goals in education and implementation for the next years.
Vplyv sofistikovaného hybridného Honeypotu na efektivitu architektúry systému detekcie prieniku v distribuovaných počítačových systémoch
Influence of Sophisticated Hybrid Honeypot on Efficiency of Intrusion Detection System Architecture in Distributed Computer Systems
Peter Fanfara, Martin Chovanec
Acta Informatica Pragensia 2013, 2(1), 39-56 | DOI: 10.18267/j.aip.123170
In the current development of technologies, rapid growth of computer networks and distributed systems still exist a very probable risk of attack. There have been developed and implemented a number of solutions to help in detecting and/or preventing attacks and to improve the actual system security. The most common solution is to use Intrusion Detection System (IDS) in cooperation with the firewall. Neither the IDS nor firewall can respond in real time to a specific type of attack. This paper deals with the detection mechanism based on Honeypot technology and its use in the proposed architecture to improve security of computer systems. The essence of...
Vizuální jazyk Archimate pro modelování Enterprise architektury na příkladu integrace ekosystému tabletu
Visual language Archimate for Enterprise Architecture modelling - an example of a tablet ecosystem integration
Hynek Stehlík
Acta Informatica Pragensia 2013, 2(1), 57-69 | DOI: 10.18267/j.aip.134797
The purpose of this article is to demonstrate Enterprise Architecture modelling capabilities of Archimate - a visual language. We analyse problem of an integration of a consumer oriented tablet ecosystem into existing enterprise technology architectures. We discuss forces leading towards an increase of heterogeneous environment during deployment of tablet applications into enterprise systems. The article is primarily targeted at IT architects and managers in the enterprise sector, who are involved in strategic decision processes.
Jak žáci a učitelé českých škol využívají Internet
How Czech Students and Teachers use the Internet
Václav Nádvorník
Acta Informatica Pragensia 2013, 2(1), 70-78 | DOI: 10.18267/j.aip.143952
It is useless to argue about statement that contemporary generation of students of elementary schools is the Internet generation. The aim of the article is to describe how children use the Internet, which parts of the Internet they use more and less. We can compare this finding out with the habits of teachers. The author made a survey among 630 students and 150 teachers from different schools in the Czech Republic. The article should be an inspiration for school web masters and for teachers. It can recommend them appropriate communication channels to students.
Viacjadrová architektúra zameraná na akceleráciu výpočtov
Acceleration based on multicore architecture
Liberios Vokorokos, Eva Chovancová
Acta Informatica Pragensia 2013, 2(1), 79-90 | DOI: 10.18267/j.aip.152762
Multicore processors can be designed also as accelerator of time-consuming calculations. This work is focused on architecture design, which can accelerate computing in computer vision. In this paper are shown design possibilities for multicore architectures, whereby the specialized processor is proposed as representative of Harvard architecture. The proposed architecture based on computing parallelization allows accelerating the time-consuming calculations in computer vision.
Uplatnění systémového myšlení v analytické fázi vývoje aplikací
Applying systems thinking in the analytical stage of application development
Anna Exnarová
Acta Informatica Pragensia 2013, 2(1), 91-100 | DOI: 10.18267/j.aip.163053
This paper presents the proposal for application of systems thinking in the application development process. The models of systems thinking present to the reader the possibility of their use and application in the software application development process. The proposal does not mandate the creation of a specific model at some point, but suggests how the selected models can be used. Authorial intention is to change the mental model of the reader - particularly the part that contains an image of the application of systems thinking in developing applications.
Optimalizácia monitorovania sieťovej prevádzky
Optimization of Network Traffic Monitoring
František Jakab, Adrián Pekár, Peter Feciľak, Miroslav Michalko
Acta Informatica Pragensia 2013, 2(1), 101-121 | DOI: 10.18267/j.aip.173268
This paper deals with problems which occur in passive measurement of network characteristics. It describes the most used approaches of measuring network parameters as well as those properties, which are most frequently monitored. The main aim of this paper is to introduce a conceptual design of a solution for the discussed problems, which should be achieved by automated adapting of flow records export of traffic to the actual state of the network.
Book Review
Sociální inženýrství aneb umění klamu
Social engineering or the art of deception
Tomáš Klíma
Acta Informatica Pragensia 2013, 2(1), 122-124 | DOI: 10.18267/j.aip.183785
Review of the Kevin Mitnick's book Art of deception. This book introduces to us the social engineering as complementary tool to technically-based approaches to penetration of information security of organisations. Unlike these approaches the social engineering doesn't become obsolete so fast which means this book has a value for the IT security guys as well as for the end users who are the main victims of social engineering.
Perspective
Relativita poznání jako východisko uvažování
Relativity of knowledge as basis of thinking
Martin Sova
Acta Informatica Pragensia 2013, 2(1), 125-131 | DOI: 10.18267/j.aip.192593
We're unable to understand the depth of every idea we accept as true. We've to be believed in facts, presented to us as the true from source considered as authoritative. This paper discusses relativity of knowledge, nonexistence of objective truth and indicates danger inherent in the synergistic effect of psychological mechanisms and the system role of human being trying to objectively describe reality.