首页 > 最新文献

Journal of Independent Studies and Research Computing最新文献

英文 中文
Test Case Design Of Security Threats Through State Machine OCL 基于状态机OCL的安全威胁测试用例设计
Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.9
Asif Raza, R. Faiz, Hafiz Syed Muhammad Muslim
Software testing is one activity for Software Quality Assurance (SQA). One way to test is through Black box test cases at design level. Since UML is a de-facto design language and is one of the most used design language now a day. Therefore, there is need to design black box test cases using UML behavioral diagrams. Object Constraint Language (OCL) is a formal language to write constraints on UML diagrams as it is unambiguous. Although test cases against robustness have been designed through OCL expressions but no test cases as yet have been designed against security specific authentication, access control and availability. Specification and testing of security specific authentication, access Control and availability through OCL. An experiment is performed with a hypothesis ‘if Security Specific Authentication, Access Control and Availability is specified through OCL in state diagram then Test cases can be designed’. We have specifiedsecurity in OCL then same OCL expressions are used to model security in UML state diagram. Furthermore, mutation testing is performed on OCL expressions. Then ECP is done using same extracted mutants. Security specific authentication, access control and availability is specified in OCL and then test cases are designed using a black box testing technique Equivalence Class Partitioning. Hypothesis results shows that one can design test cases through OCL. This thesis shows that Specification and Testing of Security specific authentication, access control and availability through OCL.
软件测试是软件质量保证(SQA)的一项活动。测试的一种方法是通过设计级别的黑盒测试用例。由于UML是一种事实上的设计语言,并且是目前使用最多的设计语言之一。因此,有必要使用UML行为图来设计黑盒测试用例。对象约束语言(OCL)是一种形式语言,用于在UML图上编写约束,因为它是明确的。虽然已经通过OCL表达式设计了针对健壮性的测试用例,但是还没有针对特定于安全的身份验证、访问控制和可用性设计测试用例。规范和测试安全特定的身份验证,访问控制和可用性通过OCL。假设“如果在状态图中通过OCL指定安全特定认证、访问控制和可用性,则可以设计测试用例”,并进行了实验。我们在OCL中指定了安全性,然后使用相同的OCL表达式在UML状态图中对安全性进行建模。此外,对OCL表达进行突变检测。然后用同样提取的突变体进行ECP。在OCL中指定特定于安全的身份验证、访问控制和可用性,然后使用黑盒测试技术等效类分区设计测试用例。假设结果表明,可以通过OCL设计测试用例。本文介绍了通过OCL实现安全专用认证、访问控制和可用性的规范和测试。
{"title":"Test Case Design Of Security Threats Through State Machine OCL","authors":"Asif Raza, R. Faiz, Hafiz Syed Muhammad Muslim","doi":"10.31645/jisrc.23.21.1.9","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.9","url":null,"abstract":"Software testing is one activity for Software Quality Assurance (SQA). One way to test is through Black box test cases at design level. Since UML is a de-facto design language and is one of the most used design language now a day. Therefore, there is need to design black box test cases using UML behavioral diagrams. Object Constraint Language (OCL) is a formal language to write constraints on UML diagrams as it is unambiguous. Although test cases against robustness have been designed through OCL expressions but no test cases as yet have been designed against security specific authentication, access control and availability. Specification and testing of security specific authentication, access Control and availability through OCL. An experiment is performed with a hypothesis ‘if Security Specific Authentication, Access Control and Availability is specified through OCL in state diagram then Test cases can be designed’. We have specifiedsecurity in OCL then same OCL expressions are used to model security in UML state diagram. Furthermore, mutation testing is performed on OCL expressions. Then ECP is done using same extracted mutants. Security specific authentication, access control and availability is specified in OCL and then test cases are designed using a black box testing technique Equivalence Class Partitioning. Hypothesis results shows that one can design test cases through OCL. This thesis shows that Specification and Testing of Security specific authentication, access control and availability through OCL.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"22 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132741408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey Of Machine Learning Techniques For Detecting Anomaly In Internet Of Things (IoT) 物联网异常检测的机器学习技术综述
Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.5
Imran Imran, Syed Mubashir Ali, R. Faiz, M. M. Alam, Syed Kashif Ali Quadri, Muhammad Razeen Bari, Muhammad Farooq Shibli
In recent years, there has been a lot of focus on anomaly detection. Technological advancements, such as the Internet of Things (IoT), are rapidly being acknowledged as critical means for data streams that create massive amounts of data in real time from a variety of applications. Analyzing this gathered data to detect abnormal occurrences helps decrease functional hazards and avoid unnoticed errors that cause programme delay. Methods for evaluating specific anomalous behaviorsin IoT data stream sources have been established and developed in the current literature. Unfortunately, there are very few thorough researches that include all elements of IoT data acquisition. As a result, this article seeks to address this void by presenting a comprehensive picture of numerous cutting-edge solutions on the fundamental concerns and essential issues in IoT data. The data type, types of anomalies,the learning method, datasets, and evaluation criteria are all described. Lastly, the issues that necessitate further investigation and future approaches are highlighted.
近年来,异常检测成为人们关注的焦点。物联网(IoT)等技术进步正迅速被认为是数据流的关键手段,可以从各种应用程序中实时创建大量数据。分析这些收集到的数据以检测异常情况有助于减少功能危害并避免导致程序延迟的未被注意到的错误。在当前的文献中,已经建立和发展了评估物联网数据流来源中特定异常行为的方法。不幸的是,很少有深入的研究包括物联网数据采集的所有元素。因此,本文试图通过全面介绍物联网数据中基本问题和基本问题的众多前沿解决方案来解决这一空白。数据类型、异常类型、学习方法、数据集和评估标准都进行了描述。最后,强调了需要进一步调查的问题和今后的做法。
{"title":"A Survey Of Machine Learning Techniques For Detecting Anomaly In Internet Of Things (IoT)","authors":"Imran Imran, Syed Mubashir Ali, R. Faiz, M. M. Alam, Syed Kashif Ali Quadri, Muhammad Razeen Bari, Muhammad Farooq Shibli","doi":"10.31645/jisrc.23.21.1.5","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.5","url":null,"abstract":"In recent years, there has been a lot of focus on anomaly detection. Technological advancements, such as the Internet of Things (IoT), are rapidly being acknowledged as critical means for data streams that create massive amounts of data in real time from a variety of applications. Analyzing this gathered data to detect abnormal occurrences helps decrease functional hazards and avoid unnoticed errors that cause programme delay. Methods for evaluating specific anomalous behaviorsin IoT data stream sources have been established and developed in the current literature. Unfortunately, there are very few thorough researches that include all elements of IoT data acquisition. As a result, this article seeks to address this void by presenting a comprehensive picture of numerous cutting-edge solutions on the fundamental concerns and essential issues in IoT data. The data type, types of anomalies,the learning method, datasets, and evaluation criteria are all described. Lastly, the issues that necessitate further investigation and future approaches are highlighted.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alzheimer’s Disease Detection: A Deep Learning-Based Approach 阿尔茨海默病检测:基于深度学习的方法
Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.3
Muhammad Wasim, Affan Alim, Waqas Ahmed
Mental health is an important part of a successful life for a person whether elderly, children, or young. Alzheimer’s is a fatal brain disease that severely damages the human brain, especially in the elderly. One way to prevent Alzheimer's disease is by detecting it early. The proposed research employs a deep learning methodology using a 3D convolutional neural network (3D CNN) that has been proposed to detect Alzheimer's disease at an early stage. The proposed model is primarily evaluated using three-dimensional brain images. A series of preprocessing have been applied that is an advanced normalization tool (ANT). The underlying pattern has a size of 128×128×64 and is passed to 17 layers of a neural network that is 3D-CNN. Another contribution of this study is the conversion of a 3D Alzheimer’s image into a 2D image. A 2D convolutional neural network such that RestNET50 and VGG16 are proposed to be used for Alzheimer’s detection. The proposed model has attained the highest of 78.07% accuracy using 3D CNN.
无论是老人、孩子还是年轻人,心理健康都是成功生活的重要组成部分。阿尔茨海默氏症是一种致命的脑部疾病,严重损害人类大脑,尤其是老年人。预防阿尔茨海默病的一种方法是早期发现它。该研究采用了3D卷积神经网络(3D CNN)的深度学习方法,该方法已被提出用于早期检测阿尔茨海默病。所提出的模型主要使用三维脑图像进行评估。应用了一系列的预处理,是一种先进的规范化工具(ANT)。底层模式的大小为128×128×64,并传递给神经网络的17层,即3D-CNN。这项研究的另一个贡献是将阿尔茨海默病的3D图像转换为2D图像。提出了一种基于RestNET50和VGG16的二维卷积神经网络用于阿尔茨海默病的检测。该模型使用3D CNN达到了78.07%的最高准确率。
{"title":"Alzheimer’s Disease Detection: A Deep Learning-Based Approach","authors":"Muhammad Wasim, Affan Alim, Waqas Ahmed","doi":"10.31645/jisrc.23.21.1.3","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.3","url":null,"abstract":"Mental health is an important part of a successful life for a person whether elderly, children, or young. Alzheimer’s is a fatal brain disease that severely damages the human brain, especially in the elderly. One way to prevent Alzheimer's disease is by detecting it early. The proposed research employs a deep learning methodology using a 3D convolutional neural network (3D CNN) that has been proposed to detect Alzheimer's disease at an early stage. The proposed model is primarily evaluated using three-dimensional brain images. A series of preprocessing have been applied that is an advanced normalization tool (ANT). The underlying pattern has a size of 128×128×64 and is passed to 17 layers of a neural network that is 3D-CNN. Another contribution of this study is the conversion of a 3D Alzheimer’s image into a 2D image. A 2D convolutional neural network such that RestNET50 and VGG16 are proposed to be used for Alzheimer’s detection. The proposed model has attained the highest of 78.07% accuracy using 3D CNN.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"40 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Techy Tennis–A Game Beyond Reality 技术网球-超越现实的游戏
Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.4
Ayesha Anees Zaveri, Nabiha Faisal, S. Imtiaz, Sarama Shehmir, Mobeen Nazar, M. Parveen
The concept is to create a game based on augmented reality and use object tracking as the primary function for recognizing objects using a camera. The key goal is to design an atmosphere that not only satisfies a person's desire to play video games but also lowers their stress levels in a manner that is both cost-effective and makes less use of flashy devices and cutting-edge technology. The environment produced in this way will use a camera that can identify objects and carry out a series of activities that have been preset according to their functions.
这个概念是基于增强现实创造一款游戏,并使用物体追踪作为使用相机识别物体的主要功能。关键目标是设计一种氛围,不仅能满足人们玩电子游戏的欲望,还能以一种既符合成本效益又不使用花哨设备和尖端技术的方式降低他们的压力水平。以这种方式产生的环境将使用一个可以识别物体的摄像头,并根据其功能进行一系列预先设定的活动。
{"title":"Techy Tennis–A Game Beyond Reality","authors":"Ayesha Anees Zaveri, Nabiha Faisal, S. Imtiaz, Sarama Shehmir, Mobeen Nazar, M. Parveen","doi":"10.31645/jisrc.23.21.1.4","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.4","url":null,"abstract":"The concept is to create a game based on augmented reality and use object tracking as the primary function for recognizing objects using a camera. The key goal is to design an atmosphere that not only satisfies a person's desire to play video games but also lowers their stress levels in a manner that is both cost-effective and makes less use of flashy devices and cutting-edge technology. The environment produced in this way will use a camera that can identify objects and carry out a series of activities that have been preset according to their functions.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132569734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study Of Software Automation Tools: Selenium And Quick Test Professional 软件自动化工具的比较研究:Selenium和Quick Test Professional
Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.6
Sana Fatima, S. F. Nasim, N. G. Haider, Mubeen Rasheed, Zoha Akram
In today’s challenging world software testing is a very crucial part of the software development lifecycle (SDLC) as it helps in minimizing errors, and reduces maintenance and cost of the software. This work aims to analyze the various tools presently available for software automation. The selection of productive testing tools plays a vital role in the implementation of software products with high quality and it also ensures premium quality throughout the SDLC. One of the key issues is the selection of adequate software testing tools and frameworks. This paper discusses Quick Test Professional (QTP) and Selenium on the basis of various attributes which include Source and Licensing, Testing Cost, Object Repository, Usability, and programming language support.The use of an adequate automated software tool provides ease in testing and allows the tester to execute test cases in an efficient manner by overcoming the challenges such as limited time, increased pressure and minimum resources.
在当今充满挑战的世界中,软件测试是软件开发生命周期(SDLC)中非常重要的一部分,因为它有助于将错误最小化,并减少软件的维护和成本。这项工作旨在分析目前可用于软件自动化的各种工具。生产性测试工具的选择在高质量软件产品的实现中起着至关重要的作用,它也确保了整个SDLC的优质质量。关键问题之一是选择适当的软件测试工具和框架。本文在各种属性的基础上讨论了Quick Test Professional (QTP)和Selenium,这些属性包括源代码和许可、测试成本、对象存储库、可用性和编程语言支持。适当的自动化软件工具的使用为测试提供了便利,并允许测试人员通过克服诸如有限的时间、增加的压力和最少的资源等挑战,以有效的方式执行测试用例。
{"title":"Comparative Study Of Software Automation Tools: Selenium And Quick Test Professional","authors":"Sana Fatima, S. F. Nasim, N. G. Haider, Mubeen Rasheed, Zoha Akram","doi":"10.31645/jisrc.23.21.1.6","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.6","url":null,"abstract":"In today’s challenging world software testing is a very crucial part of the software development lifecycle (SDLC) as it helps in minimizing errors, and reduces maintenance and cost of the software. This work aims to analyze the various tools presently available for software automation. The selection of productive testing tools plays a vital role in the implementation of software products with high quality and it also ensures premium quality throughout the SDLC. One of the key issues is the selection of adequate software testing tools and frameworks. This paper discusses Quick Test Professional (QTP) and Selenium on the basis of various attributes which include Source and Licensing, Testing Cost, Object Repository, Usability, and programming language support.The use of an adequate automated software tool provides ease in testing and allows the tester to execute test cases in an efficient manner by overcoming the challenges such as limited time, increased pressure and minimum resources.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122178306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical Investigations At High Altitudes For Nozzles Performance Monitoring 喷管性能监测的高海拔数值研究
Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.7
M. N. Qureshi, M. Ozair, Ahmad Hussain, S. Rehman, Q. Sultan, N. Islam
Large area ratio nozzles that are employed for space propulsion applications are not meant to be tested at the ground-level conditions because of the flow conditions that occurs in their divergent section due to their low exhaust pressures. Therefore, it is desired to perform the experimental evaluation at high-altitude to evaluate the performance of the said nozzles. Generally, a high-altitude test facility, consisting of a supersonic exhaust diffuser, is generally employed. In thispaper, a second-throat exhaust diffuser has been numerically investigated to predict its minimum starting pressure, and to understand the flow physics in the diffuser using Computational Fluid Dynamics (CFD). Numerical computation of the flow field in the diffuser system is done for the two cases: 1) when the nozzle and the diffuser system are initially evacuated to a low pressure, and 2) when the nozzle and the diffuser system are initially at ambient pressure (1 bar). Simulations have been carried out for cold flow situation (Ȗ=1.4) over a range of nozzle inlet stagnation pressures. Numerical results compare favorably with the theoretical and experimental results and provide adequate insight to the flow physics and internal shock structures formed in thediffuser in addition to minimum starting pressure, diffuser wall pressure and vacuum thrust.
用于空间推进应用的大面积比喷管并不打算在地面条件下进行测试,因为由于其排气压力低,在其发散部分会发生流动条件。因此,希望在高空进行实验评估,以评估所述喷嘴的性能。一般采用高空试验装置,由超音速排气扩散器组成。本文采用计算流体动力学(CFD)方法对一种第二喉道排气扩压器进行了数值研究,以预测其最小启动压力,并了解扩压器内的流动物理特性。对扩压器系统的流场进行了两种情况下的数值计算:1)喷嘴和扩压器系统最初抽真空到低压时,2)喷嘴和扩压器系统最初处于环境压力(1 bar)时。在一定的喷嘴进口停滞压力范围内,对冷流动情况(Ȗ=1.4)进行了模拟。数值结果与理论和实验结果比较良好,并提供了充分的了解流动物理和内部激波结构形成的扩散器除了最小启动压力,扩散器壁压力和真空推力。
{"title":"Numerical Investigations At High Altitudes For Nozzles Performance Monitoring","authors":"M. N. Qureshi, M. Ozair, Ahmad Hussain, S. Rehman, Q. Sultan, N. Islam","doi":"10.31645/jisrc.23.21.1.7","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.7","url":null,"abstract":"Large area ratio nozzles that are employed for space propulsion applications are not meant to be tested at the ground-level conditions because of the flow conditions that occurs in their divergent section due to their low exhaust pressures. Therefore, it is desired to perform the experimental evaluation at high-altitude to evaluate the performance of the said nozzles. Generally, a high-altitude test facility, consisting of a supersonic exhaust diffuser, is generally employed. In thispaper, a second-throat exhaust diffuser has been numerically investigated to predict its minimum starting pressure, and to understand the flow physics in the diffuser using Computational Fluid Dynamics (CFD). Numerical computation of the flow field in the diffuser system is done for the two cases: 1) when the nozzle and the diffuser system are initially evacuated to a low pressure, and 2) when the nozzle and the diffuser system are initially at ambient pressure (1 bar). Simulations have been carried out for cold flow situation (Ȗ=1.4) over a range of nozzle inlet stagnation pressures. Numerical results compare favorably with the theoretical and experimental results and provide adequate insight to the flow physics and internal shock structures formed in thediffuser in addition to minimum starting pressure, diffuser wall pressure and vacuum thrust.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122184756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review Of Blockchain Technology In Big Data Paradigm 大数据范式下的区块链技术综述
Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.2
Huma Jamshed, Ansha Zahid, Rizwan Ul Hasan, Ahmad Hussain, N. Islam
Various organizations have plunged towards cloud computing solutions because of high cost, storage space and maintenance issues from big data. Big data is utilized by institutions in decision making process to achieve valuable insights in real time. Nevertheless big data has indeed helped organizations, andeven small to medium-sized businesses, but it characteristics has posed great challenges at same time. The cloud platform has facilitated in handling computational, networking and storage capacity related issues but still these mechanisms are inadequate to deal with the rapid data explosion. Moreover data is not secure in Cloud Environment as the servers are governed by third party. In recent years fusion of big data and blockchain technology has pushed big data beyond imagination and imparted great prospective in better-quality big data services and applications. Organizations certainly will adopt these two emerging technologies to transform their business needs. In this paper we present an overview of security related issue of big sensitive data on cloud platform along with motivation behind paradigm shift i.e. Integration of big data and blockchain technology.
由于大数据带来的高成本、存储空间和维护问题,各种组织纷纷转向云计算解决方案。机构在决策过程中利用大数据,实时获得有价值的见解。尽管如此,大数据确实帮助了组织,甚至是中小型企业,但它的特点同时也带来了巨大的挑战。云平台有助于处理与计算、网络和存储容量相关的问题,但这些机制仍然不足以应对快速的数据爆炸。此外,云环境中的数据不安全,因为服务器是由第三方管理的。近年来,大数据与区块链技术的融合使大数据的发展超出了人们的想象,为提高大数据的服务质量和应用提供了广阔的前景。组织肯定会采用这两种新兴技术来转变他们的业务需求。在本文中,我们概述了云平台上大敏感数据的安全相关问题,以及范式转变背后的动机,即大数据和区块链技术的整合。
{"title":"A Review Of Blockchain Technology In Big Data Paradigm","authors":"Huma Jamshed, Ansha Zahid, Rizwan Ul Hasan, Ahmad Hussain, N. Islam","doi":"10.31645/jisrc.23.21.1.2","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.2","url":null,"abstract":"Various organizations have plunged towards cloud computing solutions because of high cost, storage space and maintenance issues from big data. Big data is utilized by institutions in decision making process to achieve valuable insights in real time. Nevertheless big data has indeed helped organizations, andeven small to medium-sized businesses, but it characteristics has posed great challenges at same time. The cloud platform has facilitated in handling computational, networking and storage capacity related issues but still these mechanisms are inadequate to deal with the rapid data explosion. Moreover data is not secure in Cloud Environment as the servers are governed by third party. In recent years fusion of big data and blockchain technology has pushed big data beyond imagination and imparted great prospective in better-quality big data services and applications. Organizations certainly will adopt these two emerging technologies to transform their business needs. In this paper we present an overview of security related issue of big sensitive data on cloud platform along with motivation behind paradigm shift i.e. Integration of big data and blockchain technology.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparison Of Three Antennas With Passive Reflecting Walls For Wireless Power Transmission 三种无源反射壁天线无线输电性能比较
Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.1
Syed Rehan Abbas Jafri, Dr. Ghous B. Narego
This paper presents a novel wireless power transmission system through reflecting walls for enhancing received signal strength. The study has been conducted with an objective to achieve a novel system for the energy harvesting and subsequent wireless power transmission for mobile phone charging applications. The work is carried out at the well-known RF frequency range from 469.5 MHz to 773.5 MHz. We have employed three different antennas for the proposed system. Multiple changes in antenna orientations have also been accounted for including azimuthal variations. The results show substantial enhancement in the received signal strength (RSS) due to use of these reflecting walls
本文提出了一种新型的穿透反射墙的无线电力传输系统,以增强接收信号的强度。该研究的目的是实现一种用于手机充电应用的能量收集和随后的无线电力传输的新系统。这项工作是在469.5 MHz到773.5 MHz众所周知的射频频率范围内进行的。我们在这个系统中使用了三种不同的天线。天线方向的多种变化也被考虑在内,包括方位角变化。结果表明,由于使用这些反射壁,接收信号强度(RSS)有了实质性的增强
{"title":"Performance Comparison Of Three Antennas With Passive Reflecting Walls For Wireless Power Transmission","authors":"Syed Rehan Abbas Jafri, Dr. Ghous B. Narego","doi":"10.31645/jisrc.23.21.1.1","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.1","url":null,"abstract":"This paper presents a novel wireless power transmission system through reflecting walls for enhancing received signal strength. The study has been conducted with an objective to achieve a novel system for the energy harvesting and subsequent wireless power transmission for mobile phone charging applications. The work is carried out at the well-known RF frequency range from 469.5 MHz to 773.5 MHz. We have employed three different antennas for the proposed system. Multiple changes in antenna orientations have also been accounted for including azimuthal variations. The results show substantial enhancement in the received signal strength (RSS) due to use of these reflecting walls","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NNBI: A Neural Network Based Business Intelligence Dashboard For A Clothing Store 基于神经网络的服装商店商业智能仪表板
Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.8
U. Afzal, Areeba Fatima, Bushra Nadeem, Faiza Shermeen, S. Usmani
Business Intelligence (BI) plays an important role in decision support systems by analyzing business data. Demand forecasting is a primary part of a sales decision system. In this research work, a Neural Network based Business Intelligence (NNBI) dashboard is proposed for a sales decision system. Data is collected from a leading clothing brand, then NNBI executes data and uses Recurrent Neural Network (RNN) to predict daily, monthly and weekly sales. The accuracy of the prediction model (0.95) validates the performance of NNBI. Tableau, a well-known BI tool is used to design NNBI dashboard. A combination of graphs, charts and text is used to interactively present the sales information. Results of NNBI show that a BI dashboard with the analysis and prediction power of NN is a good fit for a business organization.
商业智能(BI)通过分析业务数据,在决策支持系统中发挥着重要作用。需求预测是销售决策系统的主要部分。在本研究中,提出了一种基于神经网络的商业智能(NNBI)仪表板的销售决策系统。数据从一个领先的服装品牌收集,然后NNBI执行数据并使用递归神经网络(RNN)预测每日,每月和每周的销售额。预测模型的准确率为0.95,验证了NNBI的性能。使用知名BI工具Tableau设计NNBI仪表板。使用图形、图表和文本的组合来交互式地呈现销售信息。结果表明,具有神经网络分析和预测能力的BI仪表板非常适合商业组织。
{"title":"NNBI: A Neural Network Based Business Intelligence Dashboard For A Clothing Store","authors":"U. Afzal, Areeba Fatima, Bushra Nadeem, Faiza Shermeen, S. Usmani","doi":"10.31645/jisrc.23.21.1.8","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.8","url":null,"abstract":"Business Intelligence (BI) plays an important role in decision support systems by analyzing business data. Demand forecasting is a primary part of a sales decision system. In this research work, a Neural Network based Business Intelligence (NNBI) dashboard is proposed for a sales decision system. Data is collected from a leading clothing brand, then NNBI executes data and uses Recurrent Neural Network (RNN) to predict daily, monthly and weekly sales. The accuracy of the prediction model (0.95) validates the performance of NNBI. Tableau, a well-known BI tool is used to design NNBI dashboard. A combination of graphs, charts and text is used to interactively present the sales information. Results of NNBI show that a BI dashboard with the analysis and prediction power of NN is a good fit for a business organization.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125661232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-Users' Perception Of Cybercrimes Towards E-Banking Adoption And Retention 终端用户对网络犯罪对电子银行采用和保留的看法
Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.10
Taha Abbas, Kashif Arif
The advancement of information and communication technology (ICT)has resulted in dynamic changes in the operations of various business sectors all over the world, while causing inconvenience to users and making stakeholders' lives easier. However, the advancement in the same has brought major concerns for businesses, such as cybercrime. This study focuses on identifying the impact of cybercrime on the adoption of e-banking services in Pakistan. The study aims to understand the impact of hacking, identity theft and phishing on the adoption of E-banking in Pakistan. The data was collected from 384 banking customers through structured questions containing the demographic questions as well as questions related to the constructs used in the study. The findings of the study suggest that hacking, phishing and identity theft negatively affect the adoption of E-banking in Pakistan. The results of the study are discussed in line with the existing literature. The study limitations and future research areas are also discussed.
信息和通信技术(ICT)的进步导致世界各地各个业务部门的运作发生了动态变化,同时给用户带来了不便,使利益相关者的生活更容易。然而,该技术的进步也给企业带来了重大担忧,比如网络犯罪。本研究的重点是确定网络犯罪对巴基斯坦电子银行服务采用的影响。该研究旨在了解黑客攻击、身份盗窃和网络钓鱼对巴基斯坦电子银行采用的影响。数据是通过包含人口统计问题以及与研究中使用的结构相关的问题的结构化问题从384名银行客户中收集的。研究结果表明,黑客、网络钓鱼和身份盗窃对巴基斯坦电子银行的采用产生了负面影响。结合已有文献对研究结果进行了讨论。并对研究的局限性和未来的研究方向进行了讨论。
{"title":"End-Users' Perception Of Cybercrimes Towards E-Banking Adoption And Retention","authors":"Taha Abbas, Kashif Arif","doi":"10.31645/jisrc.23.21.1.10","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.10","url":null,"abstract":"The advancement of information and communication technology (ICT)has resulted in dynamic changes in the operations of various business sectors all over the world, while causing inconvenience to users and making stakeholders' lives easier. However, the advancement in the same has brought major concerns for businesses, such as cybercrime. This study focuses on identifying the impact of cybercrime on the adoption of e-banking services in Pakistan. The study aims to understand the impact of hacking, identity theft and phishing on the adoption of E-banking in Pakistan. The data was collected from 384 banking customers through structured questions containing the demographic questions as well as questions related to the constructs used in the study. The findings of the study suggest that hacking, phishing and identity theft negatively affect the adoption of E-banking in Pakistan. The results of the study are discussed in line with the existing literature. The study limitations and future research areas are also discussed.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116302255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Independent Studies and Research Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1