14 results on '"Adriana E. Chis"'
Search Results
2. Automatic FAIR Provenance Collection and Visualization for Time Series
- Author
-
Fadoua Rafii, Horacio Gonzalez-Velez, and Adriana E. Chis
- Published
- 2023
- Full Text
- View/download PDF
3. Smardy: Zero-Trust FAIR Marketplace for Research Data
- Author
-
Ion-Dorinel Filip, Cosmin Ionite, Alba Gonzalez-Cebrian, Mihaela Balanescu, Ciprian Dobre, Adriana E. Chis, Dave Feenan, Adrian-Alexandru Buga, Ioan-Mihai Constantin, George Suciu, George V. Iordache, and Horacio Gonzalez-Velez
- Published
- 2022
- Full Text
- View/download PDF
4. Towards a Computational Approach for the Assessment of Compliance of ALCOA+ Principles in Pharma Industry
- Author
-
Marta Durá, Ángel Sánchez-García, Carlos Sáez, Fátima Leal, Adriana E. Chis, Horacio González-Vélez, and Juan M. García-Gómez
- Abstract
The pharmaceutical industry is a data-intensive environment and a heavily-regulated sector, where exhaustive audits and inspections are performed to ensure the safety of drugs. In this context, processing and evaluating the data generated in the manufacturing lines is a relevant challenge since it requires compliance with pharma regulations. This work combines data integrity metrics and blockchain technology to evaluate the compliance-degree of ALCOA+ principles among different levels of drug manufacturing data. We propose the DIALCOA tool, a software to assess the compliance-degree for each ALCOA+ principle, based on the assessment of data from manufacturing batch reports and its different levels of information.
- Published
- 2022
- Full Text
- View/download PDF
5. Towards a Computational Approach for the Assessment of Compliance of ALCOA+ Principles in Pharma Industry
- Author
-
Marta, Durá, Ángel, Sánchez-García, Carlos, Sáez, Fátima, Leal, Adriana E, Chis, Horacio, González-Vélez, and Juan M, García-Gómez
- Subjects
Technology ,Blockchain ,Drug Industry ,Commerce - Abstract
The pharmaceutical industry is a data-intensive environment and a heavily-regulated sector, where exhaustive audits and inspections are performed to ensure the safety of drugs. In this context, processing and evaluating the data generated in the manufacturing lines is a relevant challenge since it requires compliance with pharma regulations. This work combines data integrity metrics and blockchain technology to evaluate the compliance-degree of ALCOA+ principles among different levels of drug manufacturing data. We propose the DIALCOA tool, a software to assess the compliance-degree for each ALCOA+ principle, based on the assessment of data from manufacturing batch reports and its different levels of information.
- Published
- 2022
6. Towards Distributed IoT/Cloud based Fault Detection and Maintenance in Industrial Automation
- Author
-
Horacio González-Vélez, Apostolos Xenakis, Adriana E. Chis, Anthony Karageorgos, and Efthimios N. Lallas
- Subjects
Process (engineering) ,business.industry ,Computer science ,Node (networking) ,Distributed computing ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Automation ,Fault detection and isolation ,Data acquisition ,Asynchronous communication ,0202 electrical engineering, electronic engineering, information engineering ,General Earth and Planetary Sciences ,020201 artificial intelligence & image processing ,business ,General Environmental Science ,Efficient energy use - Abstract
Industrial Internet of Things (IIoT) automation should be based on a framework that guarantees flexible and energy efficient monitoring and control, without the need for frequent human intervention. The ability to analyse and process machine faults in real time is vital, however it poses many technical difficulties and challenges, mainly for industrial application environments. In our paper, we propose a novel, energy efficient, IoT and Cloud based decentralised framework for real time machine condition monitoring (MCM) and fault prediction, where computational demanding tasks are distributed across fog nodes and decision fusion rules are set and controlled by the Cloud. In particular, data acquisition phase is done by sensors distributed across machines, feature extraction and health condition classification is done by fog nodes, after receiving data and instructions as processed by the Cloud node. Our framework is based on collaboration and information flow among IoT, Fog and Cloud layers. To this purpose, we formulate a global consensus cross layer optimisation problem, concerning industrial healthy status monitoring, and we solve it in a distributed manner by applying asynchronous altering direction method of multipliers (ADMM) algorithm.
- Published
- 2019
- Full Text
- View/download PDF
7. IMPROVING LEARNING OUTCOME USING THE NEWTON LOOP GAME: A SERIOUS GAME TARGETING ITERATION IN JAVA PROGRAMMING COURSE
- Author
-
Gabriel-Miro Muntean, Adriana E. Chis, Eleni Makri, Neeraj Choudhary, Dan Zhao, and Cristina Hava Muntean
- Subjects
Statement (computer science) ,Java ,business.industry ,4. Education ,Software development ,Subject (documents) ,Virtual reality ,Outcome (game theory) ,Information and Communications Technology ,Mathematics education ,Augmented reality ,business ,Psychology ,computer ,computer.programming_language - Abstract
The rapid growth in the ICT sector worldwide experienced in the past decade brought about huge economic profits and many vacancies in job markets. Despite the overall relative demand, the education of STEM subjects in many countries is facing challenges as traditional teaching approaches often fail to deliver STEM knowledge in an easy-to-understand way. Recently, researchers and educators have begun to introduce various innovative teaching approaches into STEM subject education as part of the effort to address the above challenge. The NEWTON project is an EU Horizon 2020-funded project whose main objectives include building a networked platform to facilitate integration and dissemination of many technology-enhanced learning (TEL) materials and innovative learning approaches. NEWTON also investigates the impact of using various forms TEL materials, such as serious games, virtual labs, fabrication labs, augmented reality, virtual reality, and innovative learning approaches, such as problem-based learning, on students’ learning outcome and affective states. The targeted STEM subjects was deployed in various education stages. In this paper, we present the Loop game, a third-level 2D serious game developed for a Java programming module, as part of the NEWTON project Programming large-scale pilot. This game conveys the key knowledge points related to the iteration concept, including basic for-loops, for-loop with “continue” statement, and for-loop with “break” statement, deployed in an interactive undersea world scenario. To investigate the impact of the game on students’ learning outcome, the game was deployed during the H8SDEV Software Development module in the Dublin-based National College of Ireland, in 2018. In this pilot, we have attracted mostly mature students (i.e., over 25 years old) with various educational backgrounds, including non-engineering/computer science. Before the pilot started, a demographic questionnaire was conducted, based on which students were grouped into different subgroups according to their gender, prior educational ability, initial attitude towards school and initial attitude towards STEM when analyzing the results. During the pilot, pre- and post-knowledge tests were given to students before and after the game, each including questions targeting the major knowledge points covered by the game. In total, we obtained valid results from 31 students for the Loop game. Overall, there is a statistically significant improvement in learning outcomes before (average score 1.29/3) and after (2.12/3) the game. Considering different gender subgroups, the male group achieved statistically improved learning outcome, whereas the female group achieved an improvement which was not statistically significant. For different prior educational ability subgroups, statistically significant improved learning outcomes were observed in the “good mark” group of students while the “average mark” group only obtained improved learning outcome that was not statistically significant. Considering the attitude to school, the “love/like school” group of students achieved a statistically significant improved learning outcome, whereas the “school is OK” group obtained improved learning outcome that was not statistically significant. Regarding the initial attitude towards STEM, statistically significant improved learning outcomes were observed in both the “love/like learning STEM” student group and the “learning STEM is OK” group.
- Published
- 2019
- Full Text
- View/download PDF
8. Smart Pharmaceutical Manufacturing: Ensuring End-to-End Traceability and Data Integrity in Medicine Production
- Author
-
Simon Caton, Adriana E. Chis, Georgios Mountzouris, Penelope Pucci, Eleni Vasileiou, Apostolos Xenakis, Mariola Mier, Fátima Leal, David Cerrai, Theodoros Ntounas, Carlos Sáez, Vassilis C. Gerogiannis, Juan M. García–Gómez, Efthymios N. Lallas, Anthony Karageorgos, Horacio González–Vélez, Rossano Papini, Barbara Otti, Marta Durá, and Angel Sánchez–García
- Subjects
Information Systems and Management ,Traceability ,Computer science ,business.industry ,media_common.quotation_subject ,Big data ,02 engineering and technology ,computer.software_genre ,Computer Science Applications ,Management Information Systems ,Product (business) ,Intelligent agent ,Risk analysis (engineering) ,020204 information systems ,Data integrity ,Data quality ,0202 electrical engineering, electronic engineering, information engineering ,Pharmaceutical manufacturing ,020201 artificial intelligence & image processing ,Quality (business) ,business ,computer ,Information Systems ,media_common - Abstract
Production lines in pharmaceutical manufacturing generate numerous heterogeneous data sets from various embedded systems which control the multiple processes of medicine production. Such data sets should arguably ensure end-to-end traceability and data integrity in order to release a medicine batch, which is uniquely identified and tracked by its batch number/code. Consequently, auditable computerised systems are crucial on pharmaceutical production lines, since the industry is becoming increasingly regulated for product quality and patient health purposes. This paper describes the EU-funded SPuMoNI project, which aims to ensure the quality of large amounts of data produced by computerised production systems in representative pharmaceutical environments. Our initial results include significant progress in: (i) end-to-end verification taking advantage of blockchain properties and smart contracts to ensure data authenticity, transparency, and immutability; (ii) data quality assessment models to identify data behavioural patterns that can violate industry practices and/or international regulations; and (iii) intelligent agents to collect and manipulate data as well as perform smart decisions. By analysing multiple sensors in medicine production lines, manufacturing work centres, and quality control laboratories, our approach has been initially evaluated using representative industry-grade pharmaceutical manufacturing data sets generated at an IT environment with regulated processes inspected by regulatory and government agencies.
- Published
- 2021
- Full Text
- View/download PDF
9. A LARGE-SCALE PILOT STUDY ON GAME-BASED LEARNING AND BLENDED LEARNING METHODOLOGIES IN UNDERGRADUATE PROGRAMMING COURSES
- Author
-
Dan Zhao, Cristina Hava Muntean, Adriana E. Chis, and Gabriel-Miro Muntean
- Subjects
Blended learning ,Multimedia ,Scale (ratio) ,Computer science ,05 social sciences ,0202 electrical engineering, electronic engineering, information engineering ,050301 education ,Game based learning ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,0503 education ,computer - Published
- 2018
- Full Text
- View/download PDF
10. Design Patterns and Algorithmic Skeletons: A Brief Concordance
- Author
-
Adriana E. Chis and Horacio González-Vélez
- Subjects
Theoretical computer science ,Computer science ,Design pattern ,Visitor pattern ,Software design pattern ,Degree of parallelism ,Structural pattern ,Code generation ,Algorithmic skeleton ,Task (project management) - Abstract
Having been designed as abstractions of common themes in object-oriented programming, patterns have been incorporated into parallel programming to allow an application programmer the freedom to generate parallel codes by parameterising a framework and adding the sequential parts. On the one hand, parallel programming patterns and their derived languages have maintained, arguably, the best adoption rate; however, they have become conglomerates of generic attributes for specific purposes, oriented towards code generation rather than the abstraction of structural attributes. On the other hand, algorithmic skeletons systematically abstract commonly-used structures of parallel computation, communication, and interaction. Although there are significant examples of relevant applications—mostly in academia—where they have been successfully deployed in an elegant manner, algorithmic skeletons have not been widely adopted as patterns have. However, the ICT industry expects graduates to be able to easily adapt to its best practices. Arguably, this entails the use of pattern-based programming, as it has been the case in sequential programming where the use of design patterns is widely considered the norm, as demonstrated by a myriad of citations to the seminal work of Gamma et al. [6] widely known as the Gang-of-Four. We contend that an algorithmic skeleton can be treated as a structural design pattern where the degree of parallelism and computational infrastructure are only defined at runtime. The purpose of this chapter is to explain how design patterns can be mapped into algorithmic skeletons. We illustrate our approach using a simple example using the visitor design pattern and the task farm algorithmic skeleton.
- Published
- 2018
- Full Text
- View/download PDF
11. CloudMapper: A Model-Based Framework for Portability of Cloud Applications Consuming PaaS Services
- Author
-
Riccardo Munisso and Adriana E. Chis
- Subjects
Business requirements ,Cloud computing security ,Vendor ,Computer science ,business.industry ,computer.internet_protocol ,Distributed computing ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Service-oriented architecture ,Software portability ,020204 information systems ,Cloud testing ,0202 electrical engineering, electronic engineering, information engineering ,Intermediation ,business ,computer ,Computer network - Abstract
More and more companies rely on cloud services to provide their online software solutions. Cloud services are offered by a multitude of providers, each of them offering services through proprietary, mostly incompatible interfaces. Developing applications employing these vendor specific interfaces can create the "vendor lock-in" problem (i.e the application is tightly coupled to the underlying cloud provider). Consequently, such applications cannot be ported without incurring significant costs and time delay. A cloud services consumer can decide to switch to a different cloud provider based on different criteria such as changes in business requirements, continuously evolving offerings from cloud providers and costs control. Maintaining the flexibility to change cloud providers in an efficient way can be a challenging task. We propose an efficient model-driven framework for cloud application portability. Our approach enables applications consuming REST resources in the cloud to be transferred to different cloud providers without the need to refactor the applications. The framework supports a wide range of cloud resources. The framework produces an intermediation layer which translates the calls between the format of the initial cloud platform and the new target cloud platform. The intermediation layer can be consumed by any programming language. We demonstrate that cloud application portability can be achieved. Our solution successfully maps cloud-based services with an overall median of 100% for requests, and 74.8% for responses. Furthermore, we show that the intermediation layer introduces minimal additional latency.
- Published
- 2017
- Full Text
- View/download PDF
12. Cloud-Based NoSQL Data Migration
- Author
-
Horacio González-Vélez, Adriana E. Chis, and Aryan Bansel
- Subjects
Graph database ,Database ,Distributed database ,Computer science ,05 social sciences ,010501 environmental sciences ,computer.software_genre ,NoSQL ,01 natural sciences ,Data modeling ,XML database ,0502 economics and business ,Scalability ,computer ,050203 business & management ,Data migration ,0105 earth and related environmental sciences ,Database model - Abstract
Cloud computing has enabled the Database-as-a-Service (DBaaS) model to manage large volumes of user-generated data using NoSQL data repositories. There are several NoSQL implementations such as document, columnar, and key-value which ensure high availability, fault tolerance and scalability to serve distinct client requirements. Nonetheless, different NoSQL data models may also introduce unnecessary heterogeneity in DBaaS, which further restricts the user to migrate the application services according to business or technology changes. In this paper, we propose a NoSQL data migration framework to foster data portability across cloud-based heterogeneous NoSQL data repositories. The proposed approach involves data standardisation and classification stages to render an efficient mapping, and translation between cloud-based different NoSQL data stores. The current implementation of the framework supports three different data models: document, columnar and graph. Moreover, the framework is meta-model driven, and therefore allows developers to extend the support for new database models. Our approach includes an online compression algorithm for data migration (document to graph) whereby a graph database requires up to 46% less space. There is also a significant reduction (37% to 55%) in the number of nodes in the compressed graph database.
- Published
- 2016
- Full Text
- View/download PDF
13. Patterns of Memory Inefficiency
- Author
-
Adriana E. Chis, Nick Mitchell, Edith Schonberg, Gary Sevitsky, Patrick O’Sullivan, Trevor Parsons, and John Murphy
- Published
- 2011
- Full Text
- View/download PDF
14. Automatic detection of memory anti-patterns
- Author
-
Adriana E. Chis
- Subjects
Hardware_MEMORYSTRUCTURES ,Flat memory model ,business.industry ,Computer science ,Cache-only memory architecture ,Uniform memory access ,Parallel computing ,Memory map ,Extended memory ,Memory management ,Shared memory ,Embedded system ,Distributed memory ,business - Abstract
In large distributed enterprise systems detection of memory problems can be a burdensome task. For understanding the memory related problems a catalog which documents memory anti-pattens is proposed. This paper also introduces our proposed prototype tool for the automatic detection of memory anti-patterns.
- Published
- 2008
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.