首页 > 最新文献

Journal of Independent Studies and Research Computing最新文献

英文 中文
A Model To Capture Interaction Between Data Provenance And Workflow Provenance 捕获数据来源和工作流来源之间交互的模型
Pub Date : 1900-01-01 DOI: 10.31645/2014.12.2.1
Zeeshan Ahmed, Syed Saif ur Rahman
Provenance means origin. There are two types of Provenance namely Data Provenance and Workflow Provenance. Data Provenance refers to the process of recording and tracking the source or origin of data while workflow provenance means history of workflows and their data that were used while performing an operation to get required result. The results which are obtained while performing operations are called datasets. On these datasets, the queries are performed to get required result. While exploring provenance topic in data and workflow, the author have tried to explore how a model can be presented and discussed which can capture interaction between data provenance and workflow provenance. In this paper, the author have discussed further about provenance, its types and its importance and also discussed how to execute query on provenance data. The main focus of this study was on the model which captures interaction between workflow and data provenance including the above mentioned topics.
出处的意思是起源。来源有两种类型,即数据来源和工作流来源。数据来源是指记录和跟踪数据的来源或来源的过程,而工作流来源是指在执行操作以获得所需结果时使用的工作流及其数据的历史。在执行操作时获得的结果称为数据集。在这些数据集上执行查询以获得所需的结果。在探讨数据和工作流中的溯源主题的同时,作者试图探索如何提出和讨论一个能够捕捉数据溯源和工作流溯源之间交互的模型。本文进一步讨论了种源的概念、种源的类型及其重要性,并讨论了如何对种源数据进行查询。本研究的主要焦点是捕获工作流和数据来源(包括上述主题)之间交互的模型。
{"title":"A Model To Capture Interaction Between Data Provenance And Workflow Provenance","authors":"Zeeshan Ahmed, Syed Saif ur Rahman","doi":"10.31645/2014.12.2.1","DOIUrl":"https://doi.org/10.31645/2014.12.2.1","url":null,"abstract":"Provenance means origin. There are two types of Provenance namely Data Provenance and Workflow Provenance. Data Provenance refers to the process of recording and tracking the source or origin of data while workflow provenance means history of workflows and their data that were used while performing an operation to get required result. The results which are obtained while performing operations are called datasets. On these datasets, the queries are performed to get required result. While exploring provenance topic in data and workflow, the author have tried to explore how a model can be presented and discussed which can capture interaction between data provenance and workflow provenance. In this paper, the author have discussed further about provenance, its types and its importance and also discussed how to execute query on provenance data. The main focus of this study was on the model which captures interaction between workflow and data provenance including the above mentioned topics.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124523570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restful Web Services Security By Using ASP.NET Web API MVC Based 基于rest的Web服务安全基于。NET Web API MVC
Pub Date : 1900-01-01 DOI: 10.31645/2014.12.1.1
Muhammad Imran Hussain, Naveed Dilber
The use of web services APIs play a vital role in the development of project in web where as in the era of rapid development; the use of web services are involved as a software as services; with the assistance of Internet web sites containing the full of useful information. Therefore, the trend of REST has increases, the uses of services development gained much more attention and widely used in last few years. Hence, the values of information security are becoming a challenge. Similarly, the restful web services are becoming a favorite, because it is lightweight, easy to implement and it also compatible with the cross platform solutions like mobile, PDAs and enterprises applications. As it has not any predefined security model, therefore the engineers also take the responsibility to implement the techniques to secure the information of enterprises. In this study our focus is to explore the best practices such as claim based, web tokens and delegation based by using Asp.Net Web API.
在web飞速发展的时代,web服务api的使用在项目开发中起着至关重要的作用;网络服务的使用涉及到作为软件的服务;在载有丰富有用资讯的互联网网站的协助下。因此,REST的趋势越来越明显,服务开发的使用在最近几年得到了越来越多的关注和广泛的应用。因此,资讯保安的价值正成为一个挑战。同样,rest式web服务正成为人们的最爱,因为它轻量级,易于实现,并且与跨平台解决方案(如移动、pda和企业应用程序)兼容。由于它没有任何预定义的安全模型,因此工程师也有责任实现企业信息安全的技术。在本研究中,我们的重点是探索使用Asp的最佳实践,如基于索赔,web令牌和基于委托。Net Web API。
{"title":"Restful Web Services Security By Using ASP.NET Web API MVC Based","authors":"Muhammad Imran Hussain, Naveed Dilber","doi":"10.31645/2014.12.1.1","DOIUrl":"https://doi.org/10.31645/2014.12.1.1","url":null,"abstract":"The use of web services APIs play a vital role in the development of project in web where as in the era of rapid development; the use of web services are involved as a software as services; with the assistance of Internet web sites containing the full of useful information. Therefore, the trend of REST has increases, the uses of services development gained much more attention and widely used in last few years. Hence, the values of information security are becoming a challenge. Similarly, the restful web services are becoming a favorite, because it is lightweight, easy to implement and it also compatible with the cross platform solutions like mobile, PDAs and enterprises applications. As it has not any predefined security model, therefore the engineers also take the responsibility to implement the techniques to secure the information of enterprises. In this study our focus is to explore the best practices such as claim based, web tokens and delegation based by using Asp.Net Web API.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115027889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Development of Credit Scoring Model to Determine the Creditworthiness of Borrowers 确定借款人信誉的信用评分模型的开发
Pub Date : 1900-01-01 DOI: 10.31645/2014.12.2.2
Amjad Ali, Muhammad Rafi
The explosive growth of data in banking sector is common phenomena. It is due to early adaptation of information system by Banks. This vast volume of historical data related to financial position of individuals and organizations compel banks to evaluate credit worthiness of clients to offers new services. Credit scoring can be defined as a technique that facilitates lenders in deciding to grant or reject credit to consumers. A credit score is a product of advanced analytical models that catch a snapshot of the consumer credit history and translate it into a numeric number that signify the amount of risks that will be generated in a specific deal by the consumer. Automated Credit scoring mechanism has replaced onerous, error-prone labour-intensive manual reviews that were less transparent and lacks statistical-soundness in almost all financial organizations. The credit scoring functionality is a type of classification problem for the new customer. There are numerous data classification algorithm proposed and each one has its pros and cons. This independent study focuses on comparing three data classification algorithms namely: Naïve Bayes, Bayesian Network and Bagging, for credit scoring task. An extensive series of experiments are performed on three standard credit scoring datasets: (i) German credit dataset, (ii) Australian credit dataset and (iii) Pakistan credit dataset. One of the main contributions of this study is to introduced Pakistan credit dataset; it is collected from local credit repository, and transformed accordingly to be used in the study. The studies compare the experimental results of different selected algorithms for classification, their standard evaluation measures, performance on the three datasets, and conclude the major findings.
银行业数据爆炸式增长是一个普遍现象。这是由于银行较早地适应了信息系统。与个人和组织的财务状况相关的大量历史数据迫使银行评估客户的信用价值,以提供新的服务。信用评分可以定义为一种技术,帮助贷款人决定授予或拒绝信贷给消费者。信用评分是高级分析模型的产物,它捕捉消费者信用历史的快照,并将其转换为数字,表示消费者在特定交易中将产生的风险量。在几乎所有的金融机构中,自动信用评分机制已经取代了繁重的、容易出错的、劳动密集型的、不那么透明且缺乏统计可靠性的人工审查。信用评分功能是新客户的一类分类问题。目前提出的数据分类算法很多,每一种算法都有其优缺点。本独立研究重点比较了信用评分任务中的三种数据分类算法:Naïve Bayes、Bayesian Network和Bagging。在三个标准信用评分数据集上进行了一系列广泛的实验:(i)德国信用数据集,(ii)澳大利亚信用数据集和(iii)巴基斯坦信用数据集。本研究的主要贡献之一是引入了巴基斯坦信贷数据集;从本地信用库中收集,并进行相应的转换以用于研究。本研究比较了所选择的不同分类算法的实验结果、标准评价指标、在三种数据集上的性能,并总结了主要发现。
{"title":"Development of Credit Scoring Model to Determine the Creditworthiness of Borrowers","authors":"Amjad Ali, Muhammad Rafi","doi":"10.31645/2014.12.2.2","DOIUrl":"https://doi.org/10.31645/2014.12.2.2","url":null,"abstract":"The explosive growth of data in banking sector is common phenomena. It is due to early adaptation of information system by Banks. This vast volume of historical data related to financial position of individuals and organizations compel banks to evaluate credit worthiness of clients to offers new services. Credit scoring can be defined as a technique that facilitates lenders in deciding to grant or reject credit to consumers. A credit score is a product of advanced analytical models that catch a snapshot of the consumer credit history and translate it into a numeric number that signify the amount of risks that will be generated in a specific deal by the consumer. Automated Credit scoring mechanism has replaced onerous, error-prone labour-intensive manual reviews that were less transparent and lacks statistical-soundness in almost all financial organizations. The credit scoring functionality is a type of classification problem for the new customer. There are numerous data classification algorithm proposed and each one has its pros and cons. This independent study focuses on comparing three data classification algorithms namely: Naïve Bayes, Bayesian Network and Bagging, for credit scoring task. An extensive series of experiments are performed on three standard credit scoring datasets: (i) German credit dataset, (ii) Australian credit dataset and (iii) Pakistan credit dataset. One of the main contributions of this study is to introduced Pakistan credit dataset; it is collected from local credit repository, and transformed accordingly to be used in the study. The studies compare the experimental results of different selected algorithms for classification, their standard evaluation measures, performance on the three datasets, and conclude the major findings.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116911507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Data Mining Techniques for Fraud Detection (A Case Study of Branchless Banking) 面向欺诈检测的数据挖掘技术对比分析(以无网点银行为例)
Pub Date : 1900-01-01 DOI: 10.31645/2013.11.1.2
Talha Umair, Syed Saif-ur-Rahman
Data mining algorithms have been using since few years in financial institutions like banks, insurance organizations, etc, and these organizations are using applications of data mining techniques in prediction of business collapse, marketing analysis and fraud detection. In this study our objective is to provide a comparative analysis and find the most suitable techniques of data mining for fraud detection in the area of branchless banking on certain comparison criteria. We have used few different mining algorithms like decision tree, association rules, clustering, naïve bayes and neural network. Our other objective is to find out the comparison criteria, through which we compare these algorithms and that criteria are training volume (small dataset) against quality patterns level, model creation Time, ease of implementation, ease of presentation, extensibility, efficiency, simplicity, training volume (large dataset) against quality patterns level, popularity. In the end we have suggested the most suitable algorithms for fraud detection on branches bank.
数据挖掘算法已经在银行、保险机构等金融机构中使用了几年,这些机构正在使用数据挖掘技术的应用来预测业务崩溃、营销分析和欺诈检测。在这项研究中,我们的目标是提供一个比较分析,并找到最适合的数据挖掘技术,在某些比较标准的无分支银行领域的欺诈检测。我们使用了几种不同的挖掘算法,如决策树、关联规则、聚类、naïve贝叶斯和神经网络。我们的另一个目标是找出比较标准,通过比较这些算法,这些标准是训练量(小数据集)与质量模式水平、模型创建时间、易于实现、易于表示、可扩展性、效率、简单性、训练量(大数据集)与质量模式水平、流行程度。最后提出了最适合银行分行欺诈检测的算法。
{"title":"Comparative Analysis of Data Mining Techniques for Fraud Detection (A Case Study of Branchless Banking)","authors":"Talha Umair, Syed Saif-ur-Rahman","doi":"10.31645/2013.11.1.2","DOIUrl":"https://doi.org/10.31645/2013.11.1.2","url":null,"abstract":"Data mining algorithms have been using since few years in financial institutions like banks, insurance organizations, etc, and these organizations are using applications of data mining techniques in prediction of business collapse, marketing analysis and fraud detection. In this study our objective is to provide a comparative analysis and find the most suitable techniques of data mining for fraud detection in the area of branchless banking on certain comparison criteria. We have used few different mining algorithms like decision tree, association rules, clustering, naïve bayes and neural network. Our other objective is to find out the comparison criteria, through which we compare these algorithms and that criteria are training volume (small dataset) against quality patterns level, model creation Time, ease of implementation, ease of presentation, extensibility, efficiency, simplicity, training volume (large dataset) against quality patterns level, popularity. In the end we have suggested the most suitable algorithms for fraud detection on branches bank.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"499 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERFORMANCE ANALYSIS OF MPLS AND TRADITIONAL IP IN NODE SCALABLE NETWORKS 节点可扩展网络中MPLS与传统IP的性能分析
Pub Date : 1900-01-01 DOI: 10.31645/jisrc-019-02
Muhammad Arshad, L. Rukh, Hussain Shah, B. Khan
Multiprotocol label switching is the latest and developing technology in the world of the internet. It speeds up the network by using the technique of label instead of an IP address. It provides reliable transmission of data with high speed and low delay. For efficient use of network utilization MPLS has a key feature of QoS. Due to the effective utilization of network resources, minimum delay and predictable performance MPLS technology make it more appropriate for implementing multimedia type applications. In this research, the performance of MPLS technology is compared with the traditional IP network for multimedia traffic in node scalable networks. For simulating and comparing the performance of both technologies OPNET modular 14.5 is used. This comparison is done on the basis of network performance parameters such as packet loss/ traffic drop, end-to-end delay, and throughput. Finally, the results have been evaluated which show that MPLS technology provides better performance as compared to IP in node scalable environment.
多协议标签交换是互联网领域最新发展的技术。它通过使用标签技术代替IP地址来提高网络速度。它提供了高速、低延迟的可靠数据传输。为了有效地利用网络资源,MPLS的一个关键特征是QoS。由于有效地利用了网络资源,最小的延迟和可预测的性能使MPLS技术更适合于实现多媒体类型的应用。本研究在节点可扩展网络中,比较了MPLS技术与传统IP网络在多媒体流量方面的性能。为了对两种技术的性能进行仿真和比较,采用了OPNET模块14.5。这种比较是在网络性能参数的基础上进行的,比如丢包/流量丢失、端到端延迟和吞吐量。最后,对结果进行了评估,结果表明MPLS技术在节点可扩展环境下提供了比IP更好的性能。
{"title":"PERFORMANCE ANALYSIS OF MPLS AND TRADITIONAL IP IN NODE SCALABLE NETWORKS","authors":"Muhammad Arshad, L. Rukh, Hussain Shah, B. Khan","doi":"10.31645/jisrc-019-02","DOIUrl":"https://doi.org/10.31645/jisrc-019-02","url":null,"abstract":"Multiprotocol label switching is the latest and developing technology in the world of the internet. It speeds up the network by using the technique of label instead of an IP address. It provides reliable transmission of data with high speed and low delay. For efficient use of network utilization MPLS has a key feature of QoS. Due to the effective utilization of network resources, minimum delay and predictable performance MPLS technology make it more appropriate for implementing multimedia type applications. In this research, the performance of MPLS technology is compared with the traditional IP network for multimedia traffic in node scalable networks. For simulating and comparing the performance of both technologies OPNET modular 14.5 is used. This comparison is done on the basis of network performance parameters such as packet loss/ traffic drop, end-to-end delay, and throughput. Finally, the results have been evaluated which show that MPLS technology provides better performance as compared to IP in node scalable environment.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117332900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving data quality using techniques from human computation 利用人工计算技术提高数据质量
Pub Date : 1900-01-01 DOI: 10.31645/2014.12.1.10
Vikram Kumar Kirpalani, Saif-ur-Rahman Saif-ur-Rahman
The DBpedia is an open data repository extracted from a crowd sourced Knowledge base Wikipedia, because of which the information available there is more vulnerable to inconsistency, grammatical errors, structures and, data type problems. These are just a few issues that existing data is prone to. In this research, our prime focus would be on Data type problems, particularly, the problem of one attribute containing multiple facts. Proposed is the approach in which the issue of Inconsistent behavior of the desired output is addressed and improved, on the idea based on concept hierarchy i.e. association of Parent - Child relationship by employing Human computation and the confidence, and trust of the output has been calculated, out of which the Hierarchies of the entities could be maintained in the form of Triples which could be used to mapped on other data to led the data out of the problem of Implicit type of relationship between attributes.
DBpedia是一个从大众知识库Wikipedia中提取的开放数据存储库,因为那里的可用信息更容易受到不一致、语法错误、结构和数据类型问题的影响。这些只是现有数据容易出现的几个问题。在本研究中,我们主要关注数据类型问题,特别是一个属性包含多个事实的问题。提出了一种基于概念层次的方法,即利用人工计算和置信度来关联父子关系,解决和改进期望输出行为不一致的问题,并计算了输出的信任度。其中实体的层次结构可以以三元组的形式进行维护,三元组可以用于映射到其他数据上,从而使数据摆脱属性之间隐式关系的问题。
{"title":"Improving data quality using techniques from human computation","authors":"Vikram Kumar Kirpalani, Saif-ur-Rahman Saif-ur-Rahman","doi":"10.31645/2014.12.1.10","DOIUrl":"https://doi.org/10.31645/2014.12.1.10","url":null,"abstract":"The DBpedia is an open data repository extracted from a crowd sourced Knowledge base Wikipedia, because of which the information available there is more vulnerable to inconsistency, grammatical errors, structures and, data type problems. These are just a few issues that existing data is prone to. In this research, our prime focus would be on Data type problems, particularly, the problem of one attribute containing multiple facts. Proposed is the approach in which the issue of Inconsistent behavior of the desired output is addressed and improved, on the idea based on concept hierarchy i.e. association of Parent - Child relationship by employing Human computation and the confidence, and trust of the output has been calculated, out of which the Hierarchies of the entities could be maintained in the form of Triples which could be used to mapped on other data to led the data out of the problem of Implicit type of relationship between attributes.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115841042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ontological Knowledge Management System Of Islamic Concepts 伊斯兰概念本体知识管理系统
Pub Date : 1900-01-01 DOI: 10.31645/2013.11.1.5
H. Ali
This study is focused on the conceptual relationship between different ayah of Al-Quran. Let’s take an example what Allah says about Muttaqee in the Al-Quran, the Quran say Muttaqee are those “They are on (true) guidance from their Lord” or “Those who got Falah” but when we go in the context of “Falah” we don’t find such word related Muttaqee means the relationship is there like if someone ask, who are Muttaqee the answer will be “Those who got Falah”; similarly if it is asked that who got Falah the answer is Muttaqee. There are several examples available in the Quran where we are not aware what will be the next related ayah to it. Another example in surah Al- Baqara Allah says: “The month of Ramadan in which was revealed the Qur'an” but next related ayah which we found in surah Al-Qadr in which Allah says: “Verily! We have sent it (this Qur'an) down in the night of Al-Qadr (Decree)” means the Allah revealed Al-Quran in Ramadan also in next surah it is further explained that it was revealed in lailat-ul-qadr.
本文主要研究《古兰经》中不同ayah之间的概念关系。让我们举一个例子,安拉在古兰经中是怎么说穆塔基人的,古兰经说穆塔基人是那些“他们在主的(真正)指引下”或“那些得到法拉的人”但是当我们在“法拉”的上下文中我们找不到这样的词,穆塔基的意思是这种关系就像如果有人问,谁是穆塔基人答案会是“那些得到法拉的人”;同样,如果问谁得到了法拉,答案是穆塔基。在《古兰经》中有几个例子,我们不知道下一个与之相关的ayah是什么。另一个例子是在Al- Baqara章中,真主说:“斋月是《古兰经》降示的月份”,但下一个相关的ayah是我们在Al- qadr章中发现的,真主说:“真的!我已在卡德尔(法令)之夜降示它(这部古兰经)”意思是真主在斋月降示《古兰经》,在下一章中进一步解释说,它是在卡德尔降示的。
{"title":"Ontological Knowledge Management System Of Islamic Concepts","authors":"H. Ali","doi":"10.31645/2013.11.1.5","DOIUrl":"https://doi.org/10.31645/2013.11.1.5","url":null,"abstract":"This study is focused on the conceptual relationship between different ayah of Al-Quran. Let’s take an example what Allah says about Muttaqee in the Al-Quran, the Quran say Muttaqee are those “They are on (true) guidance from their Lord” or “Those who got Falah” but when we go in the context of “Falah” we don’t find such word related Muttaqee means the relationship is there like if someone ask, who are Muttaqee the answer will be “Those who got Falah”; similarly if it is asked that who got Falah the answer is Muttaqee. There are several examples available in the Quran where we are not aware what will be the next related ayah to it. Another example in surah Al- Baqara Allah says: “The month of Ramadan in which was revealed the Qur'an” but next related ayah which we found in surah Al-Qadr in which Allah says: “Verily! We have sent it (this Qur'an) down in the night of Al-Qadr (Decree)” means the Allah revealed Al-Quran in Ramadan also in next surah it is further explained that it was revealed in lailat-ul-qadr.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123911800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Channel Assignment Algorithms and Strategies for Wireless Mesh Networks 无线网状网络的信道分配算法和策略
Pub Date : 1900-01-01 DOI: 10.31645/2013.11.1.1
Maliha Amir Ali Charania, Husnain Mansoor Ali
This research report is about providing a solution to the problem of channel assignment in the multi radio wireless mesh networks that have an ad hoc based infrastructure. The aim was to minimize the fractional interference so that throughput can be maximized. The algorithms to solve this problem were classified and explained how they work. A description of channel assignment techniques is given along with a brief comparison in the literature. Main focus was towards the use on genetic algorithm. It also gives a detailed explanation of how genetic algorithm could be implemented in order to solve this problem along with conflict graphs being made by running functions in MATLAB.
本研究报告是针对具有自组织基础架构的多无线网状网络中的信道分配问题提供一种解决方案。其目的是最小化分数干扰,从而使吞吐量最大化。解决这个问题的算法被分类,并解释了它们是如何工作的。对信道分配技术的描述与文献中的简要比较一起给出。主要关注的是遗传算法的应用。文中还详细说明了遗传算法是如何实现的,以解决这个问题,并通过在MATLAB中运行函数来绘制冲突图。
{"title":"Channel Assignment Algorithms and Strategies for Wireless Mesh Networks","authors":"Maliha Amir Ali Charania, Husnain Mansoor Ali","doi":"10.31645/2013.11.1.1","DOIUrl":"https://doi.org/10.31645/2013.11.1.1","url":null,"abstract":"This research report is about providing a solution to the problem of channel assignment in the multi radio wireless mesh networks that have an ad hoc based infrastructure. The aim was to minimize the fractional interference so that throughput can be maximized. The algorithms to solve this problem were classified and explained how they work. A description of channel assignment techniques is given along with a brief comparison in the literature. Main focus was towards the use on genetic algorithm. It also gives a detailed explanation of how genetic algorithm could be implemented in order to solve this problem along with conflict graphs being made by running functions in MATLAB.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126471881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey: Online and mobile banking risks, security issues and challenges on mobile devices and its user awareness 一项调查:在线和移动银行的风险、安全问题和挑战,以及移动设备和用户的意识
Pub Date : 1900-01-01 DOI: 10.31645/2013.11.2.1
A. Abbas, Naveed Dilber
With the growing use of mobile devices, it is a known fact that more people use internet from mobile devices than the conventional desktop PCs. Specifically, mobile devices are gaining popularity and with ease of availability its usage is a global phenomenon, creating a market and eco system of its own. Similarly online and mobile banking facilities have made a mark of its own, as consumers can now easily access their financial information from anywhere in the world and commit transactions without physically being present in financial institution of their choice. Combining the above two technologies opens a new arena of challenges, where a balance of functionality and security is to be carefully considered. Using online and mobile banking systems from mobile devices, either via browser or mobile business application, both the consumer and the institution are required to adopt a paradigm shift with respect to understanding the risks and required controls to mitigate those risks. In this research we attempted to study security issues and risks related to mobile devices faced by the banking industry, more particularly, mobile banking. Further, we shall look into the current trends, future challenges and solutions available in order to secure the communication between mobile devices and business application and how they can be mitigated. Furthermore, we will conduct a survey within the banking industry to understand the current security mechanisms adopted by these institutions. Moreover, consumer awareness, their thought process and views related to security threats shall be studied to identify their understanding of the risks and challenges and their comfort level while using mobile devices for financial transactions.
随着移动设备的使用越来越多,越来越多的人使用移动设备上网,这是一个众所周知的事实。具体来说,移动设备正变得越来越受欢迎,它的使用是一种全球现象,创造了一个自己的市场和生态系统。同样,网上和手机银行设施也取得了自己的成就,因为消费者现在可以从世界任何地方轻松访问他们的金融信息,并且无需亲自出现在他们选择的金融机构就可以进行交易。将上述两种技术结合在一起会带来新的挑战,需要仔细考虑功能和安全性之间的平衡。从移动设备上使用在线和移动银行系统,无论是通过浏览器还是移动业务应用程序,消费者和机构都需要在理解风险和减轻这些风险所需的控制方面采取范式转变。在这项研究中,我们试图研究银行业面临的与移动设备相关的安全问题和风险,特别是移动银行。此外,我们将研究当前的趋势、未来的挑战和可用的解决方案,以确保移动设备和业务应用程序之间的通信安全,以及如何缓解这些问题。此外,我们会在银行业内进行调查,了解这些机构目前采用的保安机制。此外,还需要研究消费者对安全威胁的认知、思维过程和看法,以确定消费者对使用移动设备进行金融交易的风险和挑战的理解程度和舒适度。
{"title":"A Survey: Online and mobile banking risks, security issues and challenges on mobile devices and its user awareness","authors":"A. Abbas, Naveed Dilber","doi":"10.31645/2013.11.2.1","DOIUrl":"https://doi.org/10.31645/2013.11.2.1","url":null,"abstract":"With the growing use of mobile devices, it is a known fact that more people use internet from mobile devices than the conventional desktop PCs. Specifically, mobile devices are gaining popularity and with ease of availability its usage is a global phenomenon, creating a market and eco system of its own. Similarly online and mobile banking facilities have made a mark of its own, as consumers can now easily access their financial information from anywhere in the world and commit transactions without physically being present in financial institution of their choice. Combining the above two technologies opens a new arena of challenges, where a balance of functionality and security is to be carefully considered. Using online and mobile banking systems from mobile devices, either via browser or mobile business application, both the consumer and the institution are required to adopt a paradigm shift with respect to understanding the risks and required controls to mitigate those risks. In this research we attempted to study security issues and risks related to mobile devices faced by the banking industry, more particularly, mobile banking. Further, we shall look into the current trends, future challenges and solutions available in order to secure the communication between mobile devices and business application and how they can be mitigated. Furthermore, we will conduct a survey within the banking industry to understand the current security mechanisms adopted by these institutions. Moreover, consumer awareness, their thought process and views related to security threats shall be studied to identify their understanding of the risks and challenges and their comfort level while using mobile devices for financial transactions.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129790563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement in existing agile methodology to counter the issues and challenges in QA process 改进现有的敏捷方法,以应对QA过程中的问题和挑战
Pub Date : 1900-01-01 DOI: 10.31645/2014.12.1.3
Ali Ashraf Khanani, M. Tayyab
The title of my research paper is ―Enhancement in existing Agile Testing methodology to counter the issues and challenges in QA process‖. In this research study I have worked on the issues that are faced by QA teams during agile methodology processes and have identified ways of improvement in current agile frameworks that is being used. The solution to counter the challenges and issues during testing phase is proposed to improve the time constraint in a testing environment and making testing an easy and effective job in terms of cost and time constraints in an agile environment where deadlines are very strict and time is always short. At the end, there is a survey and interview with domain expert to analyze the results achieved and to prove the hypothesis of my research.
我的研究论文的标题是“增强现有的敏捷测试方法,以应对QA过程中的问题和挑战”。在这项研究中,我研究了QA团队在敏捷方法过程中面临的问题,并确定了当前正在使用的敏捷框架的改进方法。针对测试阶段的挑战和问题,提出了解决方案,以改善测试环境中的时间约束,并在截止日期非常严格且时间总是很短的敏捷环境中,根据成本和时间约束,使测试成为一项简单有效的工作。最后,通过对领域专家的调查和访谈来分析所取得的结果,并证明我的研究假设。
{"title":"Enhancement in existing agile methodology to counter the issues and challenges in QA process","authors":"Ali Ashraf Khanani, M. Tayyab","doi":"10.31645/2014.12.1.3","DOIUrl":"https://doi.org/10.31645/2014.12.1.3","url":null,"abstract":"The title of my research paper is ―Enhancement in existing Agile Testing methodology to counter the issues and challenges in QA process‖. In this research study I have worked on the issues that are faced by QA teams during agile methodology processes and have identified ways of improvement in current agile frameworks that is being used. The solution to counter the challenges and issues during testing phase is proposed to improve the time constraint in a testing environment and making testing an easy and effective job in terms of cost and time constraints in an agile environment where deadlines are very strict and time is always short. At the end, there is a survey and interview with domain expert to analyze the results achieved and to prove the hypothesis of my research.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116799036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Independent Studies and Research Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1