Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (3)

Search Parameters:
Keywords = primitive business process

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
38 pages, 5064 KB  
Article
BPriS: Disciplined Agile Delivery Planning Method Based on Work Items List Pattern Applied to Prioritized Semantically Coupled Software Functions Derived from Business Process Model and Software Functional Pattern
by Ljubica Kazi and Zoltan Kazi
Appl. Sci. 2025, 15(9), 5091; https://doi.org/10.3390/app15095091 - 3 May 2025
Viewed by 2586
Abstract
Common practice in agile delivery planning is based on user requirements-related artifacts. However, an aspect of business process alignment to software product functions comes into focus in the phase of inception of enterprise-aware disciplined agile software projects. This research proposes a method for [...] Read more.
Common practice in agile delivery planning is based on user requirements-related artifacts. However, an aspect of business process alignment to software product functions comes into focus in the phase of inception of enterprise-aware disciplined agile software projects. This research proposes a method for mapping business process model elements to sets of semantically coupled and prioritized software functions to obtain ordered software product backlog, i.e., work items list. These software functions are derived from primitive business processes and software functional patterns. The mapping table enables assignment of primitive business processes to categorized software functions. Derived and prioritized software functions are related to a work item list pattern according to selected technology implementation. This way, a prioritized work items list is formulated, which enables development iteration planning. This method could be useful in software functional design alternatives comparison, change management, multi-project integration of software modules to support business processes in information systems, etc. Feasibility of the proposed method has been demonstrated with a case study, related to the development of a billing and reporting software utilized in a private hospital. This case study shows usability of the proposed method in the case of two related development projects that enable software functionality enhancement. Full article
(This article belongs to the Special Issue Advances in Digital Information System)
Show Figures

Figure 1

39 pages, 337 KB  
Article
Optimization of Fresh Produce Supply Chain Resilience Capacity: An Extension Strategy Generation Method
by Qianlan Chen, Chaoling Li, Lin Lu, Youan Ke, Kai Kang, Siyi Mao and Zhangzheyi Liao
Symmetry 2025, 17(2), 272; https://doi.org/10.3390/sym17020272 - 10 Feb 2025
Cited by 2 | Viewed by 4036
Abstract
Fresh produce, as a primary source of nutrition, plays a pivotal role in daily life. However, the unique characteristics of fresh produce—such as perishability, widespread production, short shelf life, long distribution cycles, and high volatility in both supply and demand—render the fresh produce [...] Read more.
Fresh produce, as a primary source of nutrition, plays a pivotal role in daily life. However, the unique characteristics of fresh produce—such as perishability, widespread production, short shelf life, long distribution cycles, and high volatility in both supply and demand—render the fresh produce supply chain particularly vulnerable to disruptions. These vulnerabilities not only impact daily consumption but also pose significant challenges to the operational efficiency of enterprises. Enhancing the fresh produce supply chain resilience is crucial for businesses to effectively mitigate risks, ensure consistent product quality, and maintain overall supply chain stability. Nevertheless, there remains a lack of clear, process-oriented guidance for developing resilience improvement strategies within the fresh agricultural product sector. Specifically, there is insufficient clarity regarding which elements should be prioritized for investment in resilience strategies, how these strategies should be formulated, and the absence of a theoretically sound framework to guide the strategic development of supply chain resilience improvements. To address the lack of scientific, quantitative, efficient, and specific processes for generating supply chain resilience improvement strategies in fresh agricultural product enterprises, this study adopts the framework of extensible primitive theory. Initially, an evaluation index system for the fresh produce supply chain is constructed, and the extendable evaluation method is employed to assess the resilience level of fresh agricultural product enterprises. This approach facilitates the identification of the key challenges that must be addressed to enhance supply chain resilience and helps generate strategies that reconcile previously incompatible issues. Next, the core objectives and conditions underlying the resilience incompatibilities in fresh agricultural product enterprises are quantitatively analyzed. Finally, the expansion transformation of both target and condition primitives is carried out to derive the optimal strategy for improving supply chain resilience. The study uses company M as a case example, where the evaluation results indicate that the company’s supply chain resilience is rated as “good”. However, several issues were identified, including inefficiencies in product supply, limited financing capacity, low enterprise visibility, and inadequate production and processing equipment. Based on these findings, the paper proposes a series of optimization strategies aimed at improving the fresh produce supply chain resilience through extension transformation. Full article
(This article belongs to the Section Mathematics)
18 pages, 949 KB  
Article
Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication
by Chuang Gan, Weichun Wang, Yuchong Hu, Xin Zhao, Shi Dun, Qixiang Xiao, Wei Wang and Huadong Huang
Appl. Sci. 2025, 15(3), 1245; https://doi.org/10.3390/app15031245 - 26 Jan 2025
Cited by 1 | Viewed by 1389
Abstract
Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality. Encrypted deduplication can achieve both goals via performing deduplication to eliminate the duplicate data within encrypted data. [...] Read more.
Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality. Encrypted deduplication can achieve both goals via performing deduplication to eliminate the duplicate data within encrypted data. Traditional encrypted deduplication generates the encryption key on the client side, which poses a risk of offline brute-force cracking of the outsourced data. Server-aided encryption schemes have been proposed to strengthen the confidentiality of encrypted deduplication by distributing the encryption process to dedicated servers. Existing schemes rely on expensive cryptographic primitives to provide a decentralized setting on the dedicated servers for scalability. However, this incurs substantial performance slowdown and can not be applied in practical encrypted deduplication storage systems. In this paper, we propose a new decentralized server-aided encrypted deduplication approach for outsourced storage, called ECDedup, which leverages secret sharing to achieve secure and efficient key management. We are the first to use the coding matrix as the encryption key to couple the encryption and encoding processes in encrypted deduplication. We also propose a acceleration scheme to speed up the encryption process of our ECDedup. We prototype ECDedup in cloud environments, and our experimental results based on the real-world backup datasets show that ECDedup can improve the client throughput by up to 51.9% compared to the state-of-the-art encrypted deduplication schemes. Full article
(This article belongs to the Special Issue Application of Deep Learning and Big Data Processing)
Show Figures

Figure 1

Back to TopTop