Taieri 19,1 / 17 / 27,1 / 24,5 De redus interior 95% 8 , 201 , 2018 . 2 December December
2 . No 2 . 12 ol. ol. 12 No
2018 ol. 12 No
ISOM – V ISOM - V
December nal of . 2 ISOM - V nal of our No J
our 12 J 8 nal of ol. our J
ISOM – V
December 201 ISSN: 1843-4711 nal of
our J JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
Vol. 12 No. 2 December 2018
EDITURA UNIVERSITARĂ Bucureşti
Foreword Welcome to the Journal of Information Systems & Operations Management (ISSN 1843-4711; IDB indexation: ProQuest, REPEC, QBE, EBSCO, COPERNICUS). This journal is an open access journal published two times a year by the Romanian-American University. The published articles focus on IT&C and belong to national and international researchers, professors who want to share their results of research, to share ideas, to speak about their expertise and Ph.D. students who want to improve their knowledge, to present their emerging doctoral research. Being a challenging and a favorable medium for scientific discussions, all the issues of the journal contain articles dealing with current issues from computer science, economics, management, IT&C, etc. Furthermore, JISOM encourages the cross-disciplinary research of national and international researchers and welcomes the contributions which give a special “touch and flavor” to the mentioned fields. Each article undergoes a double-blind review from an internationally and nationally recognized pool of reviewers. JISOM thanks all the authors who contributed to this journal by submitting their work to be published, and also thanks to all reviewers who helped and spared their valuable time in reviewing and evaluating the manuscripts. Last but not least, JISOM aims at being one of the distinguished journals in the mentioned fields. Looking forward to receiving your contributions, Best Wishes Virgil Chichernea, Ph.D. Editor-in-Chief JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
GENERAL MANAGER Professor Ovidiu Folcuţ
EDITOR IN CHIEF Professor Virgil Chichernea
MANAGING EDITORS Professor George Căruţaşu Lecturer Gabriel Eugen Garais
EDITORIAL BOARD
Academician Gheorghe Păun Romanian Academy Academician Mircea Stelian Petrescu Romanian Academy Professor Eduard Radaceanu Romanian Technical Academy Professor Pauline Cushman James Madison University, U.S.A. Professor Ramon Mata-Toledo James Madison University, U.S.A. Professor Allan Berg University of Dallas, U.S.A. Professor Kent Zimmerman James Madison University, U.S.A. Professor Traian Muntean Universite Aix –Marseille II , FRANCE Associate. Professor Susan Kruc James Madison University, U.S.A. Associate Professor Mihaela Paun Louisiana Tech University, U.S.A. Professor Cornelia Botezatu Romanian-American University Professor Ion Ivan Academy of Economic Studies Professor Radu Şerban Academy of Economic Studies Professor Ion Smeureanu Academy of Economic Studies Professor Floarea Năstase Academy of Economic Studies Professor Sergiu Iliescu University “Politehnica” Bucharest Professor Victor Patriciu National Technical Defence University Professor Lucia Rusu University “Babes-Bolyai” Cluj Napoca Associate Professor Sanda Micula University “Babes-Bolyai” Cluj Napoca Associate Professor Ion Bucur University “Politehnica” Bucharest Professor Costin Boiangiu University “Politehnica” Bucharest Associate Professor Irina Fagarasanu University “Politehnica” Bucharest Professor Viorel Marinescu Technical University of Civil Engineering Bucharest
Associate Professor Cristina Coculescu Romanian-American University Associate Professor Daniela Crisan Romanian-American University Associate Professor Alexandru Tabusca Romanian-American University Associate Professor Alexandru Pirjan Romanian-American University
Senior Staff Text Processing: Lecturer Justina Lavinia Stănică Romanian-American University Lecturer Mariana Coancă Romanian-American University PhD. student Dragos-Paul Pop Academy of Economic Studies
JISOM journal details 2018
No. Item Value 1 Category 2010 (by CNCSIS) B+ 2 CNCSIS Code 844 JOURNAL OF INFORMATION 3 Complete title / IDB title SYSTEMS & OPERATIONS MANAGEMENT 4 ISSN (print and/or electronic) 1843-4711 5 Frequency SEMESTRIAL Journal website (direct link to journal 6 http://JISOM.RAU.RO section) ProQuest
EBSCO
REPEC IDB indexation (direct link to journal http://ideas.repec.org/s/rau/jisomg.html 7 section / search interface) COPERNICUS http://journals.indexcopernicus.com/kar ta.php?action=masterlist&id=5147
QBE
Contact
First name and last name Virgil CHICHERNEA, PhD Professor
Phone +4-0729-140815 | +4-021-2029513
E-mail [email protected] [email protected]
ISSN: 1843-4711 The Proceedings of Journal ISOM Vol. 12 No. 2
CONTENTS
Editorial
Costin-Anton BOIANGIU AN OPTICAL APPROACH FOR DECODING THE 235 Ana-Karina NAZARE MYSTERIOUS VOYNICH MANUSCRIPT Andreea Dorina RACOVIŢĂ Iulia-Cristina STĂNICĂ Lucia RUSU EXTENDED ERP USING RESTFUL WEB 249 Ervin GERŐCS-SZÁSZ SERVICES CASE STUDY: WINMENTOR ENTERPRISE®
255 Adrian ATANASIU THE FACTORIZATION OF X – 1 IN Z2[X] 257 Bogdan GHIMIŞ Valentin Gabriel MITREA A VOTING-BASED IMAGE SEGMENTATION 265 Mihai-Cristian PÎRVU SYSTEM Mihai-Lucian VONCILĂ Costin-Anton BOIANGIU Ana-Maria Mihaela IORDACHE ECONOMIC INDICATORS AND HUMAN 281 Ionela-Cătălina ZAMFIR DEVELOPMENT INDEX
Andrei Alexandru ALDEA DOCUMENT LAYOUT ANALYSIS SYSTEM 292 Radu Gabriel CORIU Ştefan-Vlad PRAJICĂ Răzvan-Ştefan BRÎNZEA Costin-Anton BOIANGIU Andreea BARBU CUSTOMER LIFETIME VALUE AND 303 Bogdan TIGANOAIA CUSTOMER LOYALTY Răzvan-Costin DRAGOMIR VOTING-BASED HDR COMPRESSION 312 Costin-Anton BOIANGIU Oana CĂPLESCU APPLYING PHOTOGRAPHS FILTERS TO 326 Costin-Anton BOIANGIU IMPROVE PEOPLE AND OBJECTS RECOGNITION USING AN API Alin ZAMFIROIU UNIT TESTING FOR INTERNET OF THINGS 335 Daniel SAVU Andrei LEONTE Diana-Elena BELMEGA A SURVEY ON SOUND-BASED GAMES 349 Costin-Anton BOIANGIU Roxana Ştefania BÎRSANU THE USE OF ELECTRONIC RESOURCES IN 360 THE PROCESS OF FOREIGN LANGUAGE TEACHING/LEARNING
Andreea BARBU ROMANIA’S ENERGETIC SYSTEM 372 Bogdan TIGANOAIA Elena BANTAŞ IMAGE RECOLORING FOR COLOR-DEFICIENT 383 Costin-Anton BOIANGIU VIEWERS Ana-Maria Mihaela IORDACHE TAKING DECISION BASED ON THE 391 REGRESSION MODEL USING EXCEL 2016 Andrei LEICA FULLY CONVOLUTIONAL NEURAL NETWORKS 400 Mihai Bogdan VOICESCU FOR IMAGE SEGMENTATION Răzvan-Ştefan BRÎNZEA Costin-Anton BOIANGIU Georgiana-Rodica CHELU MULTI-ALGORITHM IMAGE DENOISING 411 Marius-Adrian GHIDEL Denisa-Gabriela OLTEANU Costin-Anton BOIANGIU Ion BUCUR Alexandru PRUNCU MAJORITY VOTING IMAGE BINARIZATION 422 Cezar GHIMBAS Radu BOERU Vlad NECULAE Costin-Anton BOIANGIU Laura SAVU DEVELOPING VIRTUAL REALITY AND 431 AUGMENTED REALITY PROJECTS WITH UNITY3D
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
AN OPTICAL APPROACH FOR DECODING THE MYSTERIOUS VOYNICH MANUSCRIPT
Costin-Anton BOIANGIU 1* Ana-Karina NAZARE 2 Andreea Dorina RACOVIŢĂ 3 Iulia-Cristina STĂNICĂ 4
ABSTRACT
The current paper presents several optical approaches used for investigating the decoding of the Voynich Manuscript. Over the past century, there have been numerous decipherment claims, but none of them can be accepted as the true solution. Most of them focus on the syntax analysis of the text, trying to correlate the Voynich text with well- known languages. In the current paper, we present a short history and description of the manuscript, as well as an innovative technique used for attempting its decoding. Our paper presents the use of several optical approaches, such as various distortions, words and character scrambling, in the attempt of correctly identifying voynichese words with the help of OCR.
KEYWORDS: Voynich Manuscript; optical devices; OCR; decipherment.
1. INTRODUCTION
The Voynich manuscript is a mysterious document, allegedly dated from the 15th century (based on radiocarbon dating) [1]. The book is written in an unknown language and contains many illustrations which can be used to divide the manuscript into six sections: herbal, astronomical, biological, cosmological, pharmaceutical and recipes [2]. There are approximately 240 pages left of the manuscript, as some others might have been lost over time. The author, date and origin of the book are not known; the name is based on that of the Polish book dealer Wilfrid Voynich, who got in the possession of the manuscript in 1912. Over time, before being bought by Voynich, the manuscript had numerous owners, such as Czech scientists, Emperor Rudolf II or members of the Jesuit order. Currently, it is kept in the Beinecke Rare Book & Manuscript Library of Yale University [3]. In order to study the text of the Voynich Manuscript, a transcription was made using the EVA (Extensible Voynich Alphabet), further influencing the numerical analysis, ‘word’
1* corresponding author, Professor PhD Eng., “Politehnica” University of Bucharest, Bucharest, Romania, [email protected] 2 Engineer, “Politehnica” University of Bucharest, Bucharest, Romania, [email protected] 3 Engineer, “Politehnica” University of Bucharest, Bucharest, Romania, [email protected] 4 Engineer, “Politehnica” University of Bucharest, 060042 Bucharest, Romania, [email protected]
235
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT length, distribution and statistics. The text was analyzed and several observations were made along the years with regard to characters, words, sentences, paragraphs and sections [3]. Regarding the characters, it was observed that some of them appear generally at the end of lines, while others appear almost always at the beginning of paragraphs or on the first lines. Also, some characters seem to have separating or conjunctive function and are often found together. It is believed that some characters have the role of final letters, with varying frequencies [4]. Some characters appear very rarely and only on some pages of the manuscript, unusual fact for most languages. In terms of words, the same ones can be repeated two, three or more times in a phrase [5]. Also, many words differ by only one character and are placed in proximity to each other. Throughout the text, there are only a few words of one single character. Although it is not certain from the manuscript what constitutes a ‘word’ in the grammatical sense or if the spaces are separators between words, analysts found 8114 different words and a total of 37919 tokens in the whole manuscript. Due to these uncertainties, the word statistics are the least reliable of all other statistics. However, although tokens appear to have a normal frequency distribution, they may represent syllables, as well as single characters, instead of real words. Additionally, there is a high number of word that appear only once in the whole manuscript [6]. Our paper consists of four sections: the first one is the introduction, in the second one we analyze the current attempts of decoding the manuscript, the third one presents our proposed approaches and the final one draws the conclusions of the research.
2. DECIPHERMENT CLAIMS
Over the years, a relatively high number of decipherment claims have appeared. Unfortunately, none of them could be labeled as being valid - some of them manage to identify just a few words, while others pretend to hold the key for the decoding of the entire manuscript. We will present further a few examples of deciphering claims, based on various criteria.
2.1. Old theories
There have been many theories about the meaning of the Voynich Manuscript since its discovery over a century ago. One of the earliest theories for deciphering the manuscript comes from the philosopher William Romaine Newbold. His claim is based on micrography, sustaining that the letters have no real meaning, as they are actually composed of many small signs, which can be seen only under a magnifying glass. This theory was disclaimed as being too speculative [7]. Joseph Martin Feely pretends it is a book written by Roger Bacon. By using substitution and starting from some words related to specific illustrations, he claims that it is written in a medieval, extremely abbreviated latin [5]. Leonell C. Strong suggests that after using some sort of double arithmetical progression, he discovered that the manuscript is written in a medieval form of English [8]. Both theories were considered as being extremely subjective.
236
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
2.2. Recent theories
Recent theories have appeared, made by various linguists and researchers all over the world. Dr Arthur Tucker came in 2014 with a new theory: he identified a series of proper nouns, such as plants and constellations, based on their representative drawings. The linguist suggests that the mysterious language of the document is called Nahuatl (Aztec language), but he wasn’t able to identify anything else except for those specific nouns [9]. Stephen Bax also sustained in 2014 that he succeeded in identifying several nouns (constellations or plants), by using a technique similar to the one used to decipher the hieroglyphs [10]. One of the most recent claims in deciphering the manuscript was made by Agnieszka Kałużna and Jacek Syguła. Their research, published in 2017 and entitled “The Key to The Voynich Manuscript”, is based on correlating the symbols from the Voynich Manuscript with prefixes, suffixes or abbreviations from the Latin alphabet. They give some examples of translations by passing through numerous languages, such as Latin, Greek, French or Italian [11]. Another claim of decipherment comes from Canadian researchers, who used artificial intelligence to identify the language of the manuscript. They pretend that it is written in ancient Hebrew and that the words are actual alphagrams (words which must have their letters arranged alphabetically). Their results seem to be remarkable, with 80% of words making sense in Hebrew and the first sentence of the manuscript being identified as “She made recommendations to the priest, man of the house and me and people” [12]. After performing a quick OCR on some Voynich pages and setting the language as Hebrew, some words were identified, with various meanings: “ancestors”, “forgive”, “take a look”, but these can be purely coincidences, as they are not necessarily correlated with the images or the theme of their corresponding chapter.
2.3. Hoax theories
Giving the fact that none of the theories proposed was accepted as being a valid decipherment of the Voynich Manuscript, people started to believe that it could be a hoax. Even if the parchment is allegedly dated from the 15th century, based on radiocarbon dating, it could have been used and written on centuries after being prepared. Some researchers say that Voynich himself created the manuscript and the now missing pages were removed later in order to make Roger Bacon as the intended author [13]. Some famous debate appeared between two scientists: Montemurro and Rugg. Gordon Rugg, a computing expert, claims that by using a card with randomly cut holes and moving it across various syllables, you can obtain a language that follows the statistical rules of true languages. On the other hand, physicist Marcelo Montemurro disagrees with the previously mentioned theory, stating that the manuscript itself is too complex and contains too many statistical similarities between its sections (regarding both words and images) [13] [14].
237
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
3. PROPOSED THEORY AND POSSIBLE ALGORITHM
Taking into account the fact that most decipherment techniques focused on searching for the meaning of the voynichese characters and words by correlating them with other languages, we considered that a totally different approach was needed. It is possible that several optical instruments (mirrors, lenses) were used in order to create the Voynich manuscript. We propose the simulation of different types of image transformations by using computer software in the attempt of correctly identifying the meaning of the Voynich manuscript.
3.1. Optical instruments for distortions
In the beginning, the best solution was to implement parameterized transformations which could be applied as filters to images containing selected chunks of texts. Prior to implementing the transformations as equations, they have been tested using specialized tools from dedicated programs (such as the Kaleidoscope tool from KrazyDad [15] or Adobe Photoshop filters). The kaleidoscoppe effect (figure 1), while it is quite beautiful and interesting, doesn’t promise successful results in actually distorting the content, and the process of applying this effect on single words in order to encode such rich text is time consuming and highly unlikely to have been used.
Figure 1. Kaleidoscope effect on Voynich words
238
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
Figure 2. Polar coordinates distortion Figure 3. Wave (sine) distortion
We have tested several Photoshop effects, such as pinch, polar coordinates (rectangular to polar - figure 2), ripple, shear, spherize, twirl, wave (sine) - figure 3, zigzag, lens correction. Pinch, by example, could be simulated in reality using a conical mirror. The transformation of polar coordinates from rectangular to polar corresponds to the use of a cylindrical mirror. Spherize, shear, ripple, wave can be simulated using lens of specific shapes. Given the fact that the effects applied in Photoshop on the entire pages of the manuscript didn’t give any relevant results, we decided to implement ourselves several geometric distortions which can be simulated using optical instruments available in the 15th century. They are: mirroring, rotation, twirl, fisheye, inverse conical deformation, inverse cylindrical deformation, skew, perspective transformation. There are two approaches to this system. Either the text is considered ciphered and the deciphering method consists only in applying the inverse deformation, or the text has been encrypted in such a manner that it can be read only by applying a direct transformation (representing the physical object - the decypher key). Therefore we identify three classes of deformations to be applied: • Direct optical deformations (Mirroring, Rotation, Twirl, Fisheye) • Inverse optical deformations (Inverse cylindrical and conical deformations and, again, Mirroring and Rotation) • Generall optical deformations (Skew, Perspective) In order to test the implemented transformations, we selected four high resolution images from the Voynich Manuscript, which only contain text, as the drawings were irrelevant for our distortion techniques.
239
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
All complex distortions have customizable parameters, such as the twirl angle, the radius of the cone/cylinder base. For each transform and distortion technique, we can specify some width and height values and select a region of interest (ROI) from the original image. The distortion can, therefore, be applied also on that specific window, not just on the entire image. We decided to create an interactive application, where the user can specify the wanted parameters and choose the center of the ROI using the mouse click (figure 4). The interface, as well as the loading and saving of the images were done using OpenCV as an external library.
Figure 4. Output of the program - Twirl effect
Figure 5. Skew results
240
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
Figure 6. Perspective transformation results
3.2. Scrambling
Another approach taken into consideration is the scrambling of entire words or word parts situated in pseudo-random positions or around key positions marked by special characters. A certain number of ROIs are scrambled all around the page, in order to see if we can obtain some meaning to the text. The user can select in the interface the number of patches that will be scrambled, interchanging the location of each pair. The software saves the resulting images in a separate folder so that OCR can be applied to recognize words. A preliminary step is providing an input set for the scrambling operations. This is represented by a set of words and word sections which must be detected in the source image and extracted. Word extraction was realized by identifying contours and extracting bounding rectangles in which words are identified. Scrambling is then applied on the detected words, with a fixed height and variable word length to select entire or partial words.
Word extraction The implemented words extracting algorithm is a low-level image processing feature extraction algorithm [16]. As its initial set of data it receives a large resolution image of a whole, colored manuscript page and outputs a set of bounding rectangles for each individual word. The first step in extracting words from the image is processing the image in order to easily identify regions of interest. Firstly, the image is converted to grayscale, as only the morphological information is needed, and then filtered using a bilateral filter, in order to reduce noise (such as the parchment texture artefacts). Next, the image is binarized and inverted (for further processing), using an adaptive threshold method offered by OpenCV. After thresholding the image, it is necessary to apply morphological operations of dilation and erosion respectively, in order to connect letters and disconnect words and lines, thus obtaining blobs for individual words (Figure 5. B).
241
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
The dilation is horizontal, while the erosion is vertical, because the letters in each word are disconnected, and the rows of the text are quite compact, and vertical neighboring words need to be separated. Lastly, by applying a custom function, the contours of the blobs are obtained. For each contour whose length is greater than a threshold calculated from the original dimensions of the source image, its straight bounding rectangle is determined (Figure 5. C) and then only this will be used for ulterior processing [17]. The algorithm also detects regions that do not correspond to words (such as drawings, sheet edges etc.), or even groups of connected words. Therefore, when selecting the correct bounding rectangles, several conditions must be taken into account. The following features are established through simple observation and direct testing, even though their limitations sometimes eliminate words correspondents in the final data set. Rectangles having an area which is too large or too small, or having a height more than three times larger than the average height of the rectangles (being assumed to be the average height of a word) are overlooked. Another condition is that words should have a greater length than height. Finally, for each filtered rectangle, a mask from the binarized source image is selected. A ratio of non-zero pixels is calculated for each ROI, and if this ratio is greater than 0.45 (assuming words have a greater than 45% text surface), the rectangle is accepted.
Figure 5. Image processing steps in detecting words. A. Part of source image B. Binarized and dilated image. C.1., C.2. Identified contours and bounding rectangles D. Two of the identified words
242
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
OCR Tesseract OCR is probably the most famous optical character recognition system, developed initially by Hewlett Packard and currently sponsored by Google. We used the API on each image saved after performing the scrambling in order to see if any text can be extracted from it. There were no concluding results, so further investigations are needed.
Template matching Template matching is a well-known technique used in image processing, which has the goal of finding a sub-image (template) in a bigger image (search area). The process implies the translation of the template over the search area and calculating the similarity between each translated window and the original template [18]. An essential step is represented by the way the similarity measure is chosen is order to quantify the “matching”. Some of the most used similarity metrics include cross correlation and sum of absolute differences [19]. We used OpenCV in order to perform the template matching. By sliding the template window from left to right and up to down, a resulting matrix is created with the value obtained with the similarity matrix in that exact position (x, y). We used a trackbar with a certain threshold in order to accept a lower or higher degree of similarity between the wanted characters (template) and the specific Voynich page area. Template matching was essential in order to identify gallows characters (characters which raise above the other characters) (figure 6).
Figure 6. Voynich gallows characters
We used template matching on both pages of the Voynich Manuscript (figure 7) and various Medieval English manuscripts (figure 8). The interesting fact is that the template matching technique returned positive results also on some Medieval English pages, showing similarities between characters.
243
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
Figure 7. Template matching on a Voynich page
Figure 8. Template matching on a Medieval English manuscript
3.3. Mirrors
Our third approach for deciphering the Voynich manuscript consists in using various sizes and shapes of mirrors (rectangular, oval) in order to transform the text (figure 9). We tried to place the mirrors in different ways: facing each other (figure 10), perpendicular (figure 11), at an acute or obtuse angle. When positioning the mirrors facing each other, a special phenomenon called “infinite reflection” is produced, but in the end, the original image is obtained. A single mirror produces one image, two mirrors perpendicular on each other produce three images, while two mirrors at an acute angle produce more than three
244
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT images. The mirrors were also positioned in different spots on a page: in the upper part, at the middle or at the bottom. We also tried to fold the page and position the mirrors between words, between lines or next to gallows characters. An interesting result (figure 12a) was obtained on a specific Voynich page, which contained symmetrical text and images from the beginning (figure 12b).
Figure 9. Single mirror placed at the top Figure 10. Two mirrors facing each other
245
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
Figure 11. Two perpendicular mirrors
Figure 12. Symmetrical images. Left: Mirrored drawings; Right: Original Voynich page.
246
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
Our tests with the mirrors did not lead however to any conclusive results. Even if the text might be mirrored (as we also simulated through computer software) or written from right to left (similar to Hebrew writing), the images obtained did not bring any known meaning to the mysterious writing.
4. CONCLUSIONS
After experimenting with a wide variety of simulated distortion devices, we can conclude that it is unlikely that the Voynich manuscript was written using one such optical instrument (mirrors or lenses). Other techniques, such as word scrambling based on keywords or gallows characters, didn’t show concluding results either. Combining the power of artificial intelligence, OCR and trying to identify meaningful words and sentences seem to represent the best option to finally decode the mysterious manuscript.
REFERENCES
[1] Steindl, Klaus; Sulzer, Andreas (2011). "The Voynich Code - The World's Mysterious Manuscript" [2] Schmeh, Klaus (2011). "The Voynich Manuscript: The Book Nobody Can Read". Skeptical Inquirer. [3] Zandbergen, René. "Voynich MS - Long tour: Known history of the manuscript". Voynich.nu [4] Tiltman, John (1967). “The Voynich Manuscript, The Most Mysterious Manuscript in the World”. NSA Technical Journal 12, pp.41-85. [5] D'Imperio, M. E. (1978). “The Voynich Manuscript: An Elegant Enigma”. National Security Agency. pp. 1–152. [6] Reddy, Sravana; Kevin, Knight (2011): “What we know about the Voynich Manuscript”. Proceedings of the ACL Workshop on Language Technology for Cultural Heritage, Social Sciences, and Humanities. [7] "Penn Biographies - William Romaine Newbold (1865–1926)". University of Pennsylvania. [8] Winter, Jay (October 17, 2015). “The Complete Voynich Manuscript Digitally Enhanced Researchers Edition”. Lulu Press. pp. 1–259. [9] Flood, Alison (2014). “New clue to Voynich manuscript mystery”. The Guardian, Science and Nature. [10] Bax, Stephens (2014). “A proposed partial decoding of the Voynich script”. [11] Kaluzna, Agnieszka; Syguła, Jacek; Jaśkiewicz, Grzegorz (2017). „The Key to The Voynich Manuscript”. [12] Hauer, Bradley; Kondrak, Grzegorz, (2018). “Decoding Anagrammed Texts Written in an Unknown Language and Script”. Transactions of the Association for Computational Linguistics
247
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
[13] Rugg, Gordon; Taylor, Gavin (2016): “Hoaxing statistical features of the Voynich Manuscript”. Cryptologia Journal 41, pp. 247-268. [14] Montemurro, Marcelo A.; Zanette, Damian H. (2013): “Keywords and Co- Occurrence Patterns in the Voynich Manuscript: An Information-Theoretic Analysis”. Plos One Journal. [15] Krazy Dad (2017). Make your own kaleidoscope. Available online: https://krazydad.com/kaleido/, Accessed at: April 27, 2018. [16] Mark S. Nixon, Alberto S. Aguado (2012). “Feature Extraction & Image Processing for Computer Vision”, Academic Press 2012 [17] OpenCV Official documentation, Image Thresholding, Finding contours in your image, Contour features [18] Kim, Yongmin; Sun, Shijun; Park, HyunWook (2004). “Template Matching Using Correlative Autopredicative Search”. University of Washington. [19] Yang, Ruigang (2016). „Object recognition and template matching”, Universitatea din Kentucky, SUA.
248
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
EXTENDED ERP USING RESTFUL WEB SERVICES CASE STUDY: WINMENTOR ENTERPRISE®
Lucia RUSU 1* Ervin GERŐCS-SZÁSZ 2
ABSTRACT
Enterprise Resource Planning Systems are dominated by explosion of Internet technologies and WEB evolution. Concepts like extended enterprise ERPII and ERPIII became more attractive and suitable for newest business process. The purpose of this paper is to examine the new generation of ERP and REST concept used in ERP II implementations. The paper offers a concrete case study using WinMENTOR ENTERPRISE® implemented with REST as an ERP II solution for e-commerce in a company of bio products.
KEYWORDS: Extended ERP, RESTful web services, e-commerce
1. INTRODUCTION
The origin of Enterprise Resource Planning (ERP) stands in 1960 when appeared first Inventory management and control systems. A brief review pointed evolution to 1970: MRP (Material Requirements Planning) systems, 1980: MRPII (Manufacturing Requirements Planning) systems then in 1990 Enterprise Resource Planning (ERP). Internet Development and companies’ extension via e-business solution forced another ERP expansion (started to millennium) to Extended ERP/ERPII systems. From now one term like Enterprise Systems (ES), Enterprise Information Systems (EIS) and Enterprise Applications (EA) describe better actual processes in companies. ERP solve internal application integration: back-office and front-office (Espinoza and Windahl, 2008). ERP II proposes a web-centric solution, which involves Web platform, new modules like: e-business, business intelligence (BI), cloud SaaS, thin client-server. Extended ERP solve an inter-organizational integration across the whole supply chain, both customers and suppliers and offer also open source ERP systems as a solution for small enterprises (Mullaney, 2012). Web 2.0, 3.0 and 4.0 facilities were used in Extended ERP and from 2010 software vendors and developers offer a Post-Modern ERP or Entire Resource Planning (ERPIII). This approach include BI and analytics, RFID, performance IT tools, internet of things (IoT), ecosystems, in-memory technologies, mobility, and increased integrated functionality (Wood, 2011).
1* corresponding author, PhD., Professor, "Babes Bolyai" University, Cluj-Napoca, Romania, [email protected] 2 Software Developer, L&E Solutions, Cluj-Napoca, [email protected]
249
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
This paper presents a solution for Extended ERP implementation for a medium size company which used e-commerce solution as main relation with customers. After a short introduction, section 2 describes main issues of ERP system and Restful Web services. The next section offers a practical implementation of WinMENTOR ENTERPRISE® with Restful Web services and a functional evaluation and results based on quantified business parameters. Conclusions and future work are described in section 4.
2. THEORETICAL FUNDAMENTALS
2.1. From ERP to ERPII and ERPIII
For ERP evolution argumentation we find several definitions, all of them agree that ERP is the core system in every ES software. Motiwalla & Thompson approach (2012) put the accent on internal value chain and from that point of view “ERP systems are the specific kind of enterprise systems to integrate data across and be comprehensive in supporting all the major functions of the organization”. If we analyse an ERP from the supply chain process, it “is a modular software package for integrating data, processes, and information technology, in real-time, across internal and external value chains” (Shang&Sheddon, 2002). Another comprehensive definition for ERPII underlined that it “extends the foundation ERP system’s functionalities such as finances, distribution, manufacturing, human resources and payroll to customer relationship management, supply chain management, sales-force automation, and Internet-enabled integrated e-commerce and e-business” (IGI- global, 2017).
Table 1: ERP, extended ERP and their functionalities (de Búrca et al., 2005). Functionalities ERP Extended ERP Procurement e-procurement, SCM Production SCM, CRM, Supplier web Sales e-commerce, SCM, CRM Distribution e-commerce, SCM
As a synthesis, Table 1 shows how ERP II extend business process function with e- procurement, SCM, CRM, e-commerce and supplier web and Figure 1 shows a relevant manner on how customers and suppliers are in central role of companies’ business, linked together with central databases’ information and cooperate with companies via SCM, CRM e-commerce and e-procurement modules.
250
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
Figure 1. Conceptualization of the extended ERP (Espinoza and Windahl, 2008)
ERP marketplace is dominated by SAP, which offers revolutionary approach of business started to MRP in ’70 and followed with SAP R/3, SAP ECC, SAP Business One and SAP Hana. Second serious competitor is Oracle but both have serious impediments for implementation: highest price and complexity. Microsoft is another competitor, with Microsoft Dynamics AX, an ERP system fit for Windows systems and for companies in quest for project and financial software. All are fit for large companies. For small and medium companies we find: Infor, with a solution for discrete production: Infor Discrete Manufacturing Essentials, Industrial and Financial Systems IFS, Abas ERP for manufacturing and distribution, Epicor, Syspro, BatchMaster ERP, Sage (Shaul, 2015). Romanian solutions for ERP system are dominated by Borg and WinMENTOR ENTERPRISE®, followed by Clarvision and other ERP systems.
2.2. RESTful Web Services
The concept of REST (REpresentation State Transfer) was introduced by Roy Fielding. It describes a new architectural style of Web applications and network systems (Sun, 2009). For gaining work extensibility on Internet Web servers, clients, and intermediaries shared some four principles which Fielding calls REST constraints: 1. Identification of resources 2. Manipulation of resources through representations 3. Self-descriptive messages 4. Hypermedia as the engine of application state (HATEOAS) In fact these principles form a consistent metaphor of systems and interactions on the Web. More detailed, resources (1) could be identified with everything that can be named by a target of hypertext (e.g., a file, a script, a collection of resources). The client receives a representation (2) of that resource, as a response to a request for respectively. The representation of the resource may have a different format than despite the resource on the server. Manipulation of resources is done via messages on the Web, as HTTP methods.
251
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
All links or URIs kept state of any client-server interaction in the hypermedia (4) which is exchanged. The client and the server exchanged state information from messages, are maintained stateless (Fielding, 2000). Another comparison study between RESTful and WS-* services was focused on 3 levels: 1) architectural principles, 2) conceptual decisions, and 3) technology decisions (Pautasso et al., 2008). Both support architectural principles consist on protocol layering, heterogeneity and loose coupling to location (or dynamic late binding). As conceptual decisions, Pautasso et al compare 9 different designer decisions and RESTful services make 8 of them, while WS-* only 5, offering more alternatives than RESTful services. Technology decision shows 10 solutions for both styles. Relevant principles for systems available on the Web afford to identify four system properties of RESTful services: 1) uniform interface, 2) addressability, 3) statelessness, and 4) connectedness. WS-* services offers three of these four properties while RESTful Web services includes all in resources, URIs, representations, and the links (Richardson and Ruby, 2007).
3. EXTENDED ERP IMPLEMENTATION USING RESTFUL WEB SERVICES
The ERP implementations are widely acknowledged in even small and medium-sized enterprises. Diversification of web solutions and technologies and the explosion of e- commerce alternatives have spurred the modernization and development of enterprise solutions in ERPII or ERP III. Beyond the schemes presented in paragraph 2.1, we aim to offer a concrete ERP II implementation solution using WinMENTOR ENTERPRISE® and RESTFul web services (WME®, 2018). Starting with 2008 TH JUNIOR SRL offers a modularized and full integrated ERP - WinMENTOR ENTERPRISE® (WME®), based on Oracle DB technology as a host central database. During the following few years WME® was continuously developed from an ERP classic solution (contained accounting, finance, human resource management, production management, logistic management, CRM and SCM) to a modern approach linking together several newest modules: DataWareHouse, WME® Analytics (BI), WME® EDI, Import/Export Module, Web-Rest-Server (WME®, 2018). Thus, the developers offer a solution for the ERP II approach and WME® can be implemented successfully in corporate companies or in small and medium-size companies, which decided to extend them business via e-commerce. We will present the characteristics of the main modules involved in implementing the ERP II solution for a company producing bio products, which sells them on the Internet.
252
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
Figure 2. Configuration option for REST Web service
RESTful WebService allows other virtual applications to communicate with the Oracle Database (DB) of WinMENTOR ENTERPRISE® (WME®). The functions contained in this server offer the following features for virtual businesses (WinMENTOR®,2018): • Update functions, which refer to: article, new client, new order, new order from different management, customer outgoing, vendor inputs, house or bank transactions, which gives it the advantages of using the central database in virtual business. • Query functions: client-side databases, active discount criteria, earnings, item information, order information, client order status, price promotions are designed to facilitate access to DB virtual client information. Other category of functions focused on Production process Query functions: release stage in production, subunits nomenclature, status queries, inventory, inventory accumulated, not discharged on management. The EDI (Electronic Data Interchange) module is used for importing documents from other applications, or exporting documents in standard formats. It allows export of payments to banks in MT103 format, import of payments made, bank or POS receipts, import of invoices, notices, orders, transfers, teaching notes, etc. It also facilitates the import of client orders in XML, TecNET and EdiNET formats and is a permanent subject to customization, depending on customers’ demands. The link between both modules and Oracle DB is shown in Figure 2 and a sample of Order status from virtual customers is presented in Figure 3.
253
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
Figure 3. Orders status
Commercial documents related to e-commerce activity (especially invoices and warranty certificates) are automatically generated in PDF format, according to customer requirements, sent to every customer via email and stored in special directories (Figure 4).
Figure 4. Commercial Documents
4. EVALUATION OF THE PROPOSED SOLUTION
The practical implementation of the WME® as an ERP II solution was done for the benefit of a bio-company that did not have an earlier ERP solution and wanted to develop its virtual business in parallel. The WME® and Web Rest Server solutions allow the company to generate more than 1,000 bills per month, with a single operator, and also to process billing documents for virtual payments in less than an hour. This means that the documents received by the banks are processed by the REST and EDI modules, to enable the automatic generation of the accounting notes related to the collections of the issued bills.
254
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
Commercial documents
1200 1000 800 600 896 923 998 1024 400 679 735 768 812 Commercial 200 documents 0 Jan Feb Mar Jun Jul Aug Sep Oct
Figure 5. Dynamic of Commercial Documents
Since January 2018, when the implementation was completed, and until October the same year, the number of automated business documents has increased from 679 to 1024 (Figure 5). Automatic generation of PDF bills and warranty certificates and automatic send just-in- time to all customers is essential to eliminate manual effort at customer’s company. Major benefits consist on increased number of automated documents during a period of time besides reduce number of employers. The company has only one operator in the delivery process and a fast courier company is charged to deliver products requested by customers. By aquisiton another ERPII module: WME Analytics (BI under Qlik) company could make a decizion optimization. It will increase efficient management and business evolution.With this solution, the client benefitting from the implementation estimates that it will be able to increase the activity volume by at least 10 times.
CONCLUSIONS
This papers presents an extended enterprise implementation for a company specialized on bio production, which offers an e-commerce solution as main customer relationship tool for developing businesses. The core of implementation is WinMENTOR ENTERPRISE®, a Romanian ERP solution, which is extended with Web RESTful services and EDI modules. In this manner all the commercial documents are generated as PDF files and sent via email to customers. Payment process is linked with the central Oracle database via the Web-REST and EDI modules. By implementing an ERP II solution, the company automated the order processing and payment processes, increased the sales and offered a modern solution to its customers. Beside all, the company reduced the sales employees number , increased business indicators and started an initiative to become a paperless company.
255
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
ACKNOWLEDGMENTS
This research was supported by TH JUNIOR SRL, which offers the WinMENTOR ENTERPRISE® software solution for developed our work.
REFERENCES
[1] de Búrca, Sean. Fynes, Brian & Marshall, Donna. Strategic technology adoption: extending ERP across the supply chain. The Journal of Enterprise Information Management, Vol. 18 No. 4, pp 427-440, (2005) [2] Fielding, R., Architectural Styles and the Design of Network-based Software Architectures., Doctoral dissertation. Technical report, University of California, Irvine, (2000). [3] https://www.igi-global.com/dictionary/extended-erp/10650 [4] L. Richardson and S. Ruby. RESTful Web Services. OReilly, (2007). [5] Motiwalla, L., and J. Thompson Enterprise Systems for Management, (2 ed.), Prentice Hall, (2012) [6] Mullaney, E., The Difference Between ERP And ERP II, Enterprise Resource Planning (ERP) and Analytics Software, SAP Business One Enterprise Software, (2012) [7] Pablo Espinoza, Torbjörn Windahl, How do Organizations Expand their ERP beyond its core capabilities, PhD thesis, Mälardalen University School of Sustainable Development of Society and Technology,(2008) [8] Paul Adamczyk, Patrick H. Smith, Ralph E. Johnson, Munawar Hafiz, REST and Web Services: In Theory and In Practice, (2015) [9] Pautasso, C. , Zimmermann, O. and Leymann, F. , Restful web services vs. ”big”’ web services: making the right architectural decision. In WWW ’08: Proceeding of the 17th international conference on World Wide Web, pages 805–814, New York, NY, USA, ACM., (2008) [10] Shang, S., and P.B. Seddon "Assessing and Managing the Benefits of Enterprise Systems: The Business Manager’s Perspective", Information Systems Journal, 12 (4), pp. 271–299, (2002) [11] Shaul, C., Top 10 ERP Solutions, http://erpselectionhelp.com/top-10-erp-solutions/, (2015) [12] Sun,B., A multi-tier architecture for building RESTful Webservices, IBM, 2009, ibm.com/developerWorks/ [13] WinMENTOR®, https://portal.winmentor.ro/wme/p/module, (2018) [14] Wood, B., ERP vs. ERP II vs. ERP III Future Enterprise Applications, http://www.r3now.com/erp-vs-erp-ii-vs-erp-iii-future-enterprise-applications/, (2010)
256
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
255 THE FACTORIZATION OF X – 1 IN Z2[X]
Adrian ATANASIU 1* Bogdan GHIMIŞ 2
ABSTRACT
AES (Rijndael) is considered the most prolific and widely used ([2]) encryption algorithm and it has deep roots in Galois field theory. The mathematical operations that occur are 8 done in a special finite field – GF(2 ) that is obtained by factorizing Z2[X] over the polinomial 1 + X + X3 + X4 + X8. We have been wondering why that polynomial has been chosen and if there are some hidden proprieties of that polynomial that other’s don’t have. In this paper, we are going to look into the structure of GF(28) and try to find some answers regarding this choice made by the authors of AES.
1. INTRODUCTION
First we are going to present a short mathematical set of basic concepts; followed by the inner workings of AES by pointing out its computations using the GF(28) field. Finally will look into other papers published by the authors of AES and see how they solved another similar problem.
2. MATHEMATICAL PRELIMINARIES
2.1. Groups and Rings
Definition 2.1.1. A group (G, *) is defined by a set G and a binary operation * on the set, that obeys the following proprieties: • the binary operation * is closed on S (taking any two elements x, y from G and applying the binary operation, the result is still an element from S) • the binary operation * is associative (e. g. ) • there exists an identity element in G (1) (e.g. . . ) • each element in G has an inverse (e.g. . . ) Definition 2.1.2. An abelian group (G, *) is a group where the binary operation is also commutative.
1* corresponding author, Professor, PhD, University of Bucharest, [email protected] 2 University of Bucharest, [email protected]
257
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
Definition 2.1.3. In a group (G, *), a subset S generates G if any element of G can be expressed as a combination of elements of S using the binary operation *. Definition 2.1.4. A group (G, *) is called cyclic if it can be generated by a single element, which means that all the elements are actually “powers” of a single item α, called a generator ([5]). Definition 2.1.5. A ring (R, +, *) is defined by a set R and two binary operations (additive and multiplicative), so that: • (R, +) is an abelian group, with the identity element noted 0 • (R, *) is an monoid, with the identity element noted 1 • , , Definition 2.1.5. A commutative ring is a ring in which the multiplicative operation is commutative.
2.2 . Fields
Definition 2.2.1. A field (K, +, *) respects the following proprieties: • (K, +, *) is a commutative ring • \ . . Definition 2.2.2. A finite field is a field K with a finite number of elements. This number is called the order of K and denoted by ord(K). Theorem 2.2.3. If K is a finite field and then , where p is a prime number and n is a positive integer. Usually we shall work with field , where the addition is XOR, and the multiplication is defined iff . Definition 2.2.4. A polynomial ring K[X] in variable X over a field K is the set of polynomials: P … having as operations usual addition and multiplications with polynomials. The degree (deg) of a polynomial represents the largest power of X for which the coefficient an is not null. The fundamental result used here is the following: For every two polynomials P and Q, with Q ≠ 0, there are (unique) polynomials q (quotient) and r (remainder) so that: • • Furthermore, we can define the greatest common divisor ( ) and the least common multiple ( ) for polynomials. We can calculate them using – first - the Euclid’s algorithm (for gcd), then (for lcm) the relation , . , Definition 2.2.5. An irreducible polynomial is polynomial that cannot be written as a product of nontrivial polynomials over the same field.
258
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
Definition 2.2.6. A root of a polynomial P is an element so that P(r) = 0, where 2 n P(r) = a0 + a1*r + a2*r +…+ an*r . Definition 2.2.7. A minimal polynomial of a value α is the polynomial m of lowest degree such that α is a root of m. Definition 2.2.8. A primitive polynomial is a polynomial that generates all elements of an extension field. In order to construct an extension of a field , we will need • the polynomial ring K[X], • an irreducible polynomial . Then quotient ring K[X} / f is defined as follows: K[X} / f = {r | there is P ϵ K[X] so that P=q * f + r, deg(r) < deg(f)}. We say that r = P (r equals P) modulo the irreductible polinomial f. Therefore ⁄ will contain all polynomials of degrees less than deg( ).
Theorem 2.2.9. Let be a ring of polynomials and an irreducible polynomial. Then ( ⁄ , +, *) is a field, where the product is performed modulo the polinomial f.
In particular, for 2 and for an irreducible polynomial of degree 8, we define 2 ⁄ as the set of bytes having a field structure that depends on the chosen polynomial . We specify that the byte a0a1a2…a7 corresponds to the polynomial 2 7 a0 + a1X + a2X + … + a7X . 8 3 4 8 8 The field GF(2 )=Z2[X] / (1+X+X +X +X ) has 2 elements, and the polynomial 1 + X (first row in Annex 2) can be chosen as generator for the multiplicative group (GF(28)*,*).
3. ADVANCED ENCRYPTION STANDARD
AES is a block cipher encryption symmetric algorithm with which one can partition the data into blocks, encrypt it and then send it through an insecure channel. Being a symmetric encryption algorithm, it uses the same encryption key for encrypting and decrypting the data. Encryption steps: • Key-Expansion step: (the symmetric key is used to derive Round-Keys) • In the first round we execute AddRoundKey • The next (9, 11 or 13) rounds the following operations take place: o SubBytes o ShiftRows o MixColumns o AddRoundKey • In the final round, all operations will be performed except the last one: o SubBytes
259
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
o ShiftRows o MixColumns In the SubBytes step, a substitution box (S-box) is used in which each byte is swapped with another one in a deterministic fashion, using a lookup table. This lookup table was derived from the multiplicative inverse over GF(28), followed by a affine transformation. This is the only nonlinear step of the algorithm ([1]). The MixColumns step ensures that if only one bit of the input text is modified, at least half of the output bits would change ([4]). Most of the operations of this algorithm take place in a finite field GF(28) using the irreducible polynomial 1 + X + X3 + X4 + X8. All the irreducible polynomials of degree 8 over Z2 are irreducible factors of – 1 and it is because of that this factorization is particularly interesting.
4. ABOUT IRREDUCIBLE FACTORS OF
There are 30 irreducible polynomials of degree 8 over Z2 that can be found in Annex 1. Each one of them could have been used for AES encryption system. One possible reason for which the peculiar polynomial 1 + X + X3 + X4 + X8 has been chosen is the fact that it has only five terms, and it is the first polynomial in lexicographical order (among all irreducible polynomial of degree 8, this one has the smallest exponents). We can also note that for polynomial 1 + X + X3 + X4 + X8, although irreducible, the 8 3 4 8 polynomial is not a generator of GF(2 ) (=Z2[X] / (1 + X + X + X + X )), its period being 51. One of AES’s inventors, Vincent Rijmen, along with Paulo Barreto, has proposed a hash function WHIRLPOOL ([6]) which is based on AES. This hash function uses the same Galois field GF(28), but uses 1 + X2 + X3 + X4 + X8 as irreducible polynomial. It is specified by the authors that this polynomial was chosen because it was the first polynomial listed in Table C from [3], and for which the primitive polynomial generates the whole GF(28). Another possible reason for choosing the first polynomial for Rijndael is for processing speed for 8 and 32 bit processors. In the original specification of this algorithm, it is asserted that the operations that take place in this field can be very efficient both for 8-bit processors (smartcards) and for 32-bit processors (PCs) ([1]). Moreover, the construction of S-boxes for AES was made in such a manner that the polynomials are simple, but there also exists an algebraic complexity, when working in GF(28)([1]). Rijndael’s authors have initially considered that the S-box should be the mapping x => x-1 in GF(28), but the algebraic complexity was weak and some attacks (e.g. interpolation attack) can be performed. Because of that an affine transformation was added.
260
JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT
4.1. The factorization of