首页 > 最新文献

Journal of Independent Studies and Research Computing最新文献

英文 中文
Comprehensive Performance Evaluation Of Network Intrusion System Using Machine Learning Approach 基于机器学习方法的网络入侵系统综合性能评估
Pub Date : 1900-01-01 DOI: 10.31645/jisrc-019-01
Shahzad Haroon, Syed Sajjad Hussain
Over the last three decades, network devices are increasing due to technology like the Internet of Things (IoT) and Bring Your Own Device (BYOD). These rapidly increasing devices open many venues for network attacks whereas modern attacks are more sophisticated and complex to detect. To detect these attacks efficiently, we have used recently available dataset UNSW-NB15. UNSW-NB15 is developed according to the modern flow of network traffic with 49 features including 9 types of network attacks. To analyze the traffic pattern for the intrusion detection system(IDS), we have used multiple classifiers to test the accuracy. From the dataset UNSWNB15, we have used medium and strong correlated features. All the results from different classifiers are compared. Prominent results are achieved by ensemble bagged tree which classifies normal and individual attacks with an accuracy of 79%.
在过去的三十年里,由于物联网(IoT)和自带设备(BYOD)等技术的发展,网络设备正在增加。这些快速增加的设备为网络攻击打开了许多场所,而现代攻击更复杂,更难以检测。为了有效检测这些攻击,我们使用了最近可用的数据集UNSW-NB15。UNSW-NB15是根据现代网络流量流程开发的,具有49个特征,包括9种网络攻击类型。为了分析入侵检测系统(IDS)的流量模式,我们使用了多个分类器来测试其准确性。从数据集UNSWNB15中,我们使用了中等和强相关特征。比较了不同分类器的分类结果。集成袋装树对正常攻击和个体攻击进行分类,准确率达到79%,取得了显著的效果。
{"title":"Comprehensive Performance Evaluation Of Network Intrusion System Using Machine Learning Approach","authors":"Shahzad Haroon, Syed Sajjad Hussain","doi":"10.31645/jisrc-019-01","DOIUrl":"https://doi.org/10.31645/jisrc-019-01","url":null,"abstract":"Over the last three decades, network devices are increasing due to technology like the Internet of Things (IoT) and Bring Your Own Device (BYOD). These rapidly increasing devices open many venues for network attacks whereas modern attacks are more sophisticated and complex to detect. To detect these attacks efficiently, we have used recently available dataset UNSW-NB15. UNSW-NB15 is developed according to the modern flow of network traffic with 49 features including 9 types of network attacks. To analyze the traffic pattern for the intrusion detection system(IDS), we have used multiple classifiers to test the accuracy. From the dataset UNSWNB15, we have used medium and strong correlated features. All the results from different classifiers are compared. Prominent results are achieved by ensemble bagged tree which classifies normal and individual attacks with an accuracy of 79%.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129227674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobility Management in Vehicular Networks 车辆网络中的移动性管理
Pub Date : 1900-01-01 DOI: 10.31645/2013.11.1.3
A. Abbas, Naveed Dilber
In mobile technology, vehicular network mobility becomes a major issue as the vehicle (node) is continuously in motion. Further, many research groups and telecom communities are working very hard to find solutions to provide robust, efficient and continuous connectivity to the end users in order to provide seamless connectivity. Furthermore, the goal of vehicular networks is to provide connectivity to the internet through which a user can be able to access the internet from anywhere without any geographical limitation and able to support different multimedia applications with high throughput efficiency and quality of service while in motion. Moreover, by the support of different application in vehicular networks enables the user to continuously aware from the traffic situations like accidents, traffic intensity and other useful information. There are two communication scenario vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) network in (VANET). In this report, we have discussed these two scenarios and its existing mobility management schemes. Further, there are some other open issues which are needed to be resolved, the main issues which we discuss is mobility in the vehicular networks and identify the best possible protocols through theoretical analysis.
在移动技术中,由于车辆(节点)持续运动,车辆网络的移动性成为一个主要问题。此外,许多研究小组和电信社区正在努力寻找解决方案,为最终用户提供强大、高效和持续的连接,以提供无缝连接。此外,车载网络的目标是提供与互联网的连接,通过这种连接,用户可以在任何地方不受任何地理限制地访问互联网,并能够在移动中以高吞吐量效率和高质量的服务支持不同的多媒体应用程序。此外,通过车联网中不同应用的支持,用户可以持续地从交通状况中感知到事故、交通强度等有用信息。在VANET中有两种通信场景:车对车(V2V)和车对基础设施(V2I)网络。在本报告中,我们讨论了这两种情况及其现有的流动性管理方案。此外,还有其他一些需要解决的开放性问题,我们讨论的主要问题是车辆网络中的移动性,并通过理论分析确定最佳协议。
{"title":"Mobility Management in Vehicular Networks","authors":"A. Abbas, Naveed Dilber","doi":"10.31645/2013.11.1.3","DOIUrl":"https://doi.org/10.31645/2013.11.1.3","url":null,"abstract":"In mobile technology, vehicular network mobility becomes a major issue as the vehicle (node) is continuously in motion. Further, many research groups and telecom communities are working very hard to find solutions to provide robust, efficient and continuous connectivity to the end users in order to provide seamless connectivity. Furthermore, the goal of vehicular networks is to provide connectivity to the internet through which a user can be able to access the internet from anywhere without any geographical limitation and able to support different multimedia applications with high throughput efficiency and quality of service while in motion. Moreover, by the support of different application in vehicular networks enables the user to continuously aware from the traffic situations like accidents, traffic intensity and other useful information. There are two communication scenario vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) network in (VANET). In this report, we have discussed these two scenarios and its existing mobility management schemes. Further, there are some other open issues which are needed to be resolved, the main issues which we discuss is mobility in the vehicular networks and identify the best possible protocols through theoretical analysis.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116637894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Standardized Software Development Model For SME Software Houses In Pakistan 巴基斯坦中小企业软件公司的标准化软件开发模型
Pub Date : 1900-01-01 DOI: 10.31645/2014.12.1.2
Asif Mansoori, M. E. Tayab
There are many software development models that exist for software development like Extreme Programming, Waterfall, Spiral, Agile, RAD, SCRUM etc. These models are very useful for development but its usefulness varies from company to company in nature of product and services of companies. When we talk about software development in Pakistan then there are no specific or standard model followed by most of the software Development Companies due to which they are facing many problems regarding development and deployment of software and at the end did not succeed to maturity level, as a whole there are lacking in standardization of software model in Pakistan. Subsequently, the customer also suffers and reluctant to avail long-term business. This study focus and cover software development procedure that are followed by small and middle level software houses like how to overcome risk management factor in software development, how to improve software development process. My target is to counter those software houses that work on limited scope software but as all software are important for the industry and for the growth of that software house, they must follow some standards and best practices that are built on their ethics and culture so that they can be known as the software houses that fulfil the maturity level. Since every country has its own ethics and goals so here the study will cover the software houses in Pakistan and proposed a SDLC model that lead them to achieve successful maturity level. Since the study assume the company size to be 30-40 employees as it is suggested to be SME. The major reason of selecting the ratio of 30 – 40 is that the companies from where I have conducted the research are small SME’s and average company size of SME’s are 30 to 40 employees.
有很多软件开发模型存在于软件开发中,比如极限编程、瀑布式、螺旋式、敏捷、RAD、SCRUM等。这些模型对开发非常有用,但其有用性因公司的产品和服务的性质而异。当我们谈论巴基斯坦的软件开发时,大多数软件开发公司都没有遵循特定的或标准的模型,因此他们面临着许多关于软件开发和部署的问题,最终没有成功达到成熟水平,整体而言,巴基斯坦缺乏软件模型的标准化。随后,客户也苦于不愿利用长期业务。本文主要研究中小型软件公司在软件开发过程中如何克服软件开发中的风险管理因素,如何改进软件开发过程等问题。我的目标是对抗那些在有限范围内工作的软件公司,但由于所有的软件对行业和软件公司的发展都很重要,他们必须遵循一些建立在他们的道德和文化基础上的标准和最佳实践,这样他们才能被称为满足成熟度水平的软件公司。由于每个国家都有自己的道德规范和目标,所以这里的研究将涵盖巴基斯坦的软件公司,并提出一个SDLC模型,使他们达到成功的成熟度水平。由于本研究假设公司规模为30-40名员工,因此建议为中小企业。选择30 - 40的比例的主要原因是我所研究的公司都是小型中小企业,中小企业的平均公司规模是30 - 40人。
{"title":"Standardized Software Development Model For SME Software Houses In Pakistan","authors":"Asif Mansoori, M. E. Tayab","doi":"10.31645/2014.12.1.2","DOIUrl":"https://doi.org/10.31645/2014.12.1.2","url":null,"abstract":"There are many software development models that exist for software development like Extreme Programming, Waterfall, Spiral, Agile, RAD, SCRUM etc. These models are very useful for development but its usefulness varies from company to company in nature of product and services of companies. When we talk about software development in Pakistan then there are no specific or standard model followed by most of the software Development Companies due to which they are facing many problems regarding development and deployment of software and at the end did not succeed to maturity level, as a whole there are lacking in standardization of software model in Pakistan. Subsequently, the customer also suffers and reluctant to avail long-term business. This study focus and cover software development procedure that are followed by small and middle level software houses like how to overcome risk management factor in software development, how to improve software development process. My target is to counter those software houses that work on limited scope software but as all software are important for the industry and for the growth of that software house, they must follow some standards and best practices that are built on their ethics and culture so that they can be known as the software houses that fulfil the maturity level. Since every country has its own ethics and goals so here the study will cover the software houses in Pakistan and proposed a SDLC model that lead them to achieve successful maturity level. Since the study assume the company size to be 30-40 employees as it is suggested to be SME. The major reason of selecting the ratio of 30 – 40 is that the companies from where I have conducted the research are small SME’s and average company size of SME’s are 30 to 40 employees.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127417191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Visualization on Big Data 大数据安全可视化
Pub Date : 1900-01-01 DOI: 10.31645/2013.11.2.6
Waqar Ahmed, Uzair Hashmi
IN 2012 2.5 QB OF DATA (18 ZEROS AFTER 1) WAS GENERATED WORLDWIDE KNOW SO FAR. EVERY DAY DATA CREATION SIZE IS BECOMING BIG-TO-BIGGER THAN WAS SEEN BY EVERYONE SINCE THE BEGINNING OF HUMANKIND. BRIEF DATA GENERATION HISTORY IN CATEGORICAL FASHION IS AS FOLLOWS: 5 Petabytes: Data flowing through Walmart’s transactional databases. Consumers spend $272,000 on Web shopping /day. Apple receives around 47,000 app downloads /minute. On Facebook, Brands receive more than 34,000 “likes” /minute. 8 billion Email messages per day On Twitter 340 million tweets per day On Facebook 684,000 bits of content per day 3,125 new photos uploaded on Flicker per minute. As data size increased so are security threats, which comprise unauthorized modification/ alteration of big data. Conducting security visualization manually on such a large-scale data is beyond compression. Therefore, we need some automated easy to use, time saving technique that can give comprehensive results, which can help to track the integrity of big data.
到目前为止,2012年全球产生了2.5 qb的数据(1后18个0)。每天的数据创建规模都在变得越来越大,比人类诞生以来的任何时候都要大。简要的数据生成历史分类如下:5pb:流经沃尔玛事务数据库的数据。消费者每天在网上购物上花费27.2万美元。苹果每分钟的应用下载量约为4.7万次。在Facebook上,品牌每分钟会收到超过34000个“赞”。每天有80亿条电子邮件在Twitter上每天有3.4亿条推文在Facebook上每天有68.4万个内容每分钟在Flicker上上传3125张新照片。随着数据规模的增加,安全威胁也在增加,其中包括未经授权的大数据修改/更改。在如此大规模的数据上手动执行安全可视化是无法压缩的。因此,我们需要一些自动化的、易于使用的、节省时间的技术,可以给出全面的结果,这有助于跟踪大数据的完整性。
{"title":"Security Visualization on Big Data","authors":"Waqar Ahmed, Uzair Hashmi","doi":"10.31645/2013.11.2.6","DOIUrl":"https://doi.org/10.31645/2013.11.2.6","url":null,"abstract":"IN 2012 2.5 QB OF DATA (18 ZEROS AFTER 1) WAS GENERATED WORLDWIDE KNOW SO FAR. EVERY DAY DATA CREATION SIZE IS BECOMING BIG-TO-BIGGER THAN WAS SEEN BY EVERYONE SINCE THE BEGINNING OF HUMANKIND. BRIEF DATA GENERATION HISTORY IN CATEGORICAL FASHION IS AS FOLLOWS: 5 Petabytes: Data flowing through Walmart’s transactional databases. Consumers spend $272,000 on Web shopping /day. Apple receives around 47,000 app downloads /minute. On Facebook, Brands receive more than 34,000 “likes” /minute. 8 billion Email messages per day On Twitter 340 million tweets per day On Facebook 684,000 bits of content per day 3,125 new photos uploaded on Flicker per minute. As data size increased so are security threats, which comprise unauthorized modification/ alteration of big data. Conducting security visualization manually on such a large-scale data is beyond compression. Therefore, we need some automated easy to use, time saving technique that can give comprehensive results, which can help to track the integrity of big data.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133873572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhance the content search by using Semantic Web 利用语义网增强内容搜索
Pub Date : 1900-01-01 DOI: 10.31645/2013.11.2.2
Aeman Jamali, Asim Riaz
The content search of web content for large data and information presents enormous resourcing and quality challenges. Users expect to find information quickly, with minimal navigation and with consistency of information and nomenclature. For example content and solutions information, users expect clear, relevant lists of information and services that comprise those solutions, including research papers, publications, videos, images, interviews, conferences and case studies that provide referential examples. The foundation component of the Semantic Web is ontologies which are used to embody knowledge in the Semantic Web. Ontology is an information form is used to demonstrate a set of concepts and the relationships connecting those concepts within a domain. Taking unstructured data from the web and formalizing it so that it can be structured automatically is a difficult work to do, but apart from its significance it is interesting as well. Through this research it is intended to make the automation of ontology public, as it is based on open standard and constructed using publicly available resources of Google, like Google AJAX API and JavaScript parser JSON.
大数据和信息的网络内容搜索呈现出巨大的资源和质量挑战。用户希望快速查找信息,尽量减少导航,保持信息和术语的一致性。例如,内容和解决方案信息,用户期望包含这些解决方案的清晰、相关的信息和服务列表,包括提供参考示例的研究论文、出版物、视频、图像、访谈、会议和案例研究。本体是语义网的基础组成部分,本体用于在语义网中体现知识。本体是一种信息形式,用于演示领域内的一组概念和连接这些概念的关系。从网络中获取非结构化数据并将其形式化以使其能够自动结构化是一项困难的工作,但除了它的重要性之外,它也很有趣。通过本研究的目的是使本体的自动化公开化,因为它是基于开放的标准,并使用谷歌的公共可用资源,如谷歌AJAX API和JavaScript解析器JSON构建的。
{"title":"Enhance the content search by using Semantic Web","authors":"Aeman Jamali, Asim Riaz","doi":"10.31645/2013.11.2.2","DOIUrl":"https://doi.org/10.31645/2013.11.2.2","url":null,"abstract":"The content search of web content for large data and information presents enormous resourcing and quality challenges. Users expect to find information quickly, with minimal navigation and with consistency of information and nomenclature. For example content and solutions information, users expect clear, relevant lists of information and services that comprise those solutions, including research papers, publications, videos, images, interviews, conferences and case studies that provide referential examples. The foundation component of the Semantic Web is ontologies which are used to embody knowledge in the Semantic Web. Ontology is an information form is used to demonstrate a set of concepts and the relationships connecting those concepts within a domain. Taking unstructured data from the web and formalizing it so that it can be structured automatically is a difficult work to do, but apart from its significance it is interesting as well. Through this research it is intended to make the automation of ontology public, as it is based on open standard and constructed using publicly available resources of Google, like Google AJAX API and JavaScript parser JSON.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133833313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect Of Information Systems On Customer Satisfaction And Influence Of Trust: Evidence From Pakistani Digital Banking Industry 信息系统对客户满意度和信任的影响:来自巴基斯坦数字银行业的证据
Pub Date : 1900-01-01 DOI: 10.31645/00
Syed Arham Hussaini, Syed Ali Shiraz Jafari, Muhammad Adeel Karim
Aim of this paper is to investigate the relationship among information system of digital banking, trust and customer satisfaction. For this we have applied the [1], S. J. (2009) model to Pakistani banking industry. More specifically dimensions of management information system in this study are system quality, information quality and information presentation. Total of 300 Self-administrated questionnaires were distributed among the general public of Pakistan. Smart PLS (partial least square) method were used to test the statically analysis. From statically analysis we have found that all the three dimensions of management information system significantly and positively impact the customer trust and satisfaction toward digital banking. Furthermore, this paper will surely contribute to the theoretical and managerial impactions.
本文的目的是研究数字银行信息系统、信任和客户满意度之间的关系。为此,我们将[1],S. J.(2009)模型应用于巴基斯坦银行业。在本研究中,管理信息系统更具体的维度是系统质量、信息质量和信息呈现。共向巴基斯坦公众分发了300份自我管理的问卷。采用偏最小二乘法进行静态分析检验。通过静态分析,我们发现管理信息系统的三个维度都显著正向影响客户对数字银行的信任和满意度。此外,本文的研究将对理论和管理产生一定的影响。
{"title":"Effect Of Information Systems On Customer Satisfaction And Influence Of Trust: Evidence From Pakistani Digital Banking Industry","authors":"Syed Arham Hussaini, Syed Ali Shiraz Jafari, Muhammad Adeel Karim","doi":"10.31645/00","DOIUrl":"https://doi.org/10.31645/00","url":null,"abstract":"Aim of this paper is to investigate the relationship among information system of digital banking, trust and customer satisfaction. For this we have applied the [1], S. J. (2009) model to Pakistani banking industry. More specifically dimensions of management information system in this study are system quality, information quality and information presentation. Total of 300 Self-administrated questionnaires were distributed among the general public of Pakistan. Smart PLS (partial least square) method were used to test the statically analysis. From statically analysis we have found that all the three dimensions of management information system significantly and positively impact the customer trust and satisfaction toward digital banking. Furthermore, this paper will surely contribute to the theoretical and managerial impactions.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126017951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of payment system and suggesting solutions for data security issues in Pakistan 巴基斯坦支付系统的比较分析及数据安全问题的解决方案
Pub Date : 1900-01-01 DOI: 10.31645/2014.12.1.6
J. Akhtar, Husnain Ali
The payment system has been the back bone of financial systems of a country. The stability and growth of an economy is directly related to the strength, reliability, scalability and efficiency of payment system. There are various kinds of instruments and channels in payment system; some are slow like paper cheques and some electronic transfers. And after the introduction of Electronic payment methods and their wide spread acceptance in many developed countries has played an important roles in stabilizing and growing their economies. But the use of electronic payment methods is still in infancy in Pakistan due to various incidents of frauds and identity thefts. In Pakistan only 12% of population has access to Bank branches but internet is available in almost every small town and mobile penetration is almost 80-90% of population. Currently there are two major systems payment systems i.e. one is using clearance of amount based on settlement of Physical cheques drawn between difference banks and second is using online interbank fund transfer . The second one is also divided into two segments. i.e. large and small amounts of transaction. Larger transactions having no limit of amount are conducted between Banks using Real Time Gross settlement Systems (RTGS ) managed by Stat bank of Pakistan and the other is using Online Interbank fund transfer for small payments having limitation of 250,000 (Two lacs fifty thousand rupees) categorized as retail payment systems. The cost of transfer for large amount is only 50 Rupees per transaction regardless of amount, but an ordinary customer has to be a good business client of bank to carry out transfer of amount online.
支付系统一直是一个国家金融系统的支柱。一个经济体的稳定和增长直接关系到支付系统的强度、可靠性、可扩展性和效率。支付系统中有各种各样的工具和渠道;有些很慢,如纸质支票和一些电子转账。电子支付方式的引入及其在许多发达国家的广泛接受,在稳定和发展经济方面发挥了重要作用。但由于各种欺诈和身份盗窃事件,电子支付方式的使用在巴基斯坦仍处于起步阶段。在巴基斯坦,只有12%的人口可以使用银行分支机构,但几乎每个小镇都可以上网,手机普及率几乎达到80-90%。目前有两种主要的支付系统,即一种是使用基于不同银行之间的实物支票结算的金额清算,另一种是使用在线银行间资金转帐。第二部分也分为两部分。即大额和小额交易。没有金额限制的较大交易是使用巴基斯坦国家银行管理的实时全额结算系统(RTGS)的银行之间进行的,另一个是使用在线银行间资金转移进行小额支付,限额为25万卢比(2万卢比),归类为零售支付系统。大额转账费用每笔只要50卢比,无论金额多少,但普通客户必须是银行的良好业务客户才能进行网上转账。
{"title":"Comparative analysis of payment system and suggesting solutions for data security issues in Pakistan","authors":"J. Akhtar, Husnain Ali","doi":"10.31645/2014.12.1.6","DOIUrl":"https://doi.org/10.31645/2014.12.1.6","url":null,"abstract":"The payment system has been the back bone of financial systems of a country. The stability and growth of an economy is directly related to the strength, reliability, scalability and efficiency of payment system. There are various kinds of instruments and channels in payment system; some are slow like paper cheques and some electronic transfers. And after the introduction of Electronic payment methods and their wide spread acceptance in many developed countries has played an important roles in stabilizing and growing their economies. But the use of electronic payment methods is still in infancy in Pakistan due to various incidents of frauds and identity thefts. In Pakistan only 12% of population has access to Bank branches but internet is available in almost every small town and mobile penetration is almost 80-90% of population. Currently there are two major systems payment systems i.e. one is using clearance of amount based on settlement of Physical cheques drawn between difference banks and second is using online interbank fund transfer . The second one is also divided into two segments. i.e. large and small amounts of transaction. Larger transactions having no limit of amount are conducted between Banks using Real Time Gross settlement Systems (RTGS ) managed by Stat bank of Pakistan and the other is using Online Interbank fund transfer for small payments having limitation of 250,000 (Two lacs fifty thousand rupees) categorized as retail payment systems. The cost of transfer for large amount is only 50 Rupees per transaction regardless of amount, but an ordinary customer has to be a good business client of bank to carry out transfer of amount online.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122451279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Information Systems on customer Satisfaction and Influence of Trust: Evidence from Pakistani Digital Banking Industry 信息系统对客户满意度和信任的影响:来自巴基斯坦数字银行业的证据
Pub Date : 1900-01-01 DOI: 10.31645/jisrc
Syed Arham Hussaini, Syed Ali Shiraz Jafari, Muhammad Adeel Karim
Aim of this paper is to investigate the relationship among information system of digital banking, trust and customer satisfaction. For this we have applied the [1], S. J. (2009) model to Pakistani banking industry. More specifically dimensions of management information system in this study are system quality, information quality and information presentation. Total of 300 Self-administrated questionnaires were distributed among the general public of Pakistan. Smart PLS (partial least square) method were used to test the statically analysis. From statically analysis we have found that all the three dimensions of management information system significantly and positively impact the customer trust and satisfaction toward digital banking. Furthermore, this paper will surely contribute to the theoretical and managerial impactions.
本文的目的是研究数字银行信息系统、信任和客户满意度之间的关系。为此,我们将[1],S. J.(2009)模型应用于巴基斯坦银行业。在本研究中,管理信息系统更具体的维度是系统质量、信息质量和信息呈现。共向巴基斯坦公众分发了300份自我管理的问卷。采用偏最小二乘法进行静态分析检验。通过静态分析,我们发现管理信息系统的三个维度都显著正向影响客户对数字银行的信任和满意度。此外,本文的研究将对理论和管理产生一定的影响。
{"title":"Effect of Information Systems on customer Satisfaction and Influence of Trust: Evidence from Pakistani Digital Banking Industry","authors":"Syed Arham Hussaini, Syed Ali Shiraz Jafari, Muhammad Adeel Karim","doi":"10.31645/jisrc","DOIUrl":"https://doi.org/10.31645/jisrc","url":null,"abstract":"Aim of this paper is to investigate the relationship among information system of digital banking, trust and customer satisfaction. For this we have applied the [1], S. J. (2009) model to Pakistani banking industry. More specifically dimensions of management information system in this study are system quality, information quality and information presentation. Total of 300 Self-administrated questionnaires were distributed among the general public of Pakistan. Smart PLS (partial least square) method were used to test the statically analysis. From statically analysis we have found that all the three dimensions of management information system significantly and positively impact the customer trust and satisfaction toward digital banking. Furthermore, this paper will surely contribute to the theoretical and managerial impactions.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128087936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large Scale Hierarchical Classification 大规模层次分类
Pub Date : 1900-01-01 DOI: 10.31645/2013.11.2.3
Adarsh Khalique, Rahim Hasnani
This study elucidates various algorithms used for document or text classification challenge. A sample data is used in this study on which various algorithms like Support Vector Machines (SVM), Naïve Bayes, Neural Networks and K-Nearest Neighbor are used in order to analyze their performances and accuracies. This study tries to identify the limitations and strength of these algorithms on the given sample data that how optimally they can perform classification. Different validations are used in this study to examine the accuracies regarding the classification can be identified. Validations include Split-Validation, X-Validation and Bootstrapping. Different ways and methods are discussed through which classification is made possible in large hierarchy. Finally this study concludes on the basis of results obtained that which machine learning technique or classifier performed excellent on the provided sample data set and achieved higher accuracy as compared to others.
本研究阐明了用于文档或文本分类挑战的各种算法。本研究使用样本数据,使用支持向量机(SVM)、Naïve贝叶斯(Bayes)、神经网络(Neural Networks)和k -最近邻(K-Nearest Neighbor)等各种算法,分析其性能和精度。本研究试图确定这些算法在给定样本数据上的局限性和强度,以及它们如何最优地执行分类。在本研究中使用不同的验证来检验关于分类可以识别的准确性。验证包括分割验证、x验证和引导。讨论了在大层次结构中实现分类的不同途径和方法。最后,本研究根据所获得的结果得出结论,哪种机器学习技术或分类器在提供的样本数据集上表现出色,并且相对于其他机器学习技术或分类器实现了更高的准确率。
{"title":"Large Scale Hierarchical Classification","authors":"Adarsh Khalique, Rahim Hasnani","doi":"10.31645/2013.11.2.3","DOIUrl":"https://doi.org/10.31645/2013.11.2.3","url":null,"abstract":"This study elucidates various algorithms used for document or text classification challenge. A sample data is used in this study on which various algorithms like Support Vector Machines (SVM), Naïve Bayes, Neural Networks and K-Nearest Neighbor are used in order to analyze their performances and accuracies. This study tries to identify the limitations and strength of these algorithms on the given sample data that how optimally they can perform classification. Different validations are used in this study to examine the accuracies regarding the classification can be identified. Validations include Split-Validation, X-Validation and Bootstrapping. Different ways and methods are discussed through which classification is made possible in large hierarchy. Finally this study concludes on the basis of results obtained that which machine learning technique or classifier performed excellent on the provided sample data set and achieved higher accuracy as compared to others.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134294273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis Of Routing Protocol Metrics In MANET MANET中路由协议度量分析
Pub Date : 1900-01-01 DOI: 10.31645/2014.12.1.12
H. Nawaz, H. Ali
This research paper work is about the analysis of routing protocol metrics in MANET. The routing protocols metrics are important subject matter in the mobile Adhoc network environment. The MANET environment connecting devices or nodes with each other energetically and develop mobile Adhoc wireless network . It offers the mobility to network devices to freely move in any direction and develop connection to any device. The aim of this research paper is to analyze the routing protocol metrics as, radio range, delay, load, media access delay and throughput by evaluating the simulation of AODV, DSR and TORA routing protocols using video conferencing application. The simulation results have been carried out through OPNET 14.5 modeler tool, however scenarios created, having different node densities and different WLAN physical characteristics and routing protocol metrics and analyzed results.
本文的研究工作是对MANET中路由协议度量的分析。路由协议度量是移动Adhoc网络环境中的一个重要问题。MANET环境将设备或节点相互连接起来,发展移动Adhoc无线网络。它为网络设备提供了向任何方向自由移动和与任何设备建立连接的移动性。本文通过对AODV、DSR和TORA路由协议在视频会议应用中的仿真评估,分析了路由协议指标as、无线电距离、延迟、负载、媒体访问延迟和吞吐量。仿真结果通过OPNET 14.5建模工具进行,创建了具有不同节点密度、不同WLAN物理特性和路由协议度量的场景,并分析了结果。
{"title":"Analysis Of Routing Protocol Metrics In MANET","authors":"H. Nawaz, H. Ali","doi":"10.31645/2014.12.1.12","DOIUrl":"https://doi.org/10.31645/2014.12.1.12","url":null,"abstract":"This research paper work is about the analysis of routing protocol metrics in MANET. The routing protocols metrics are important subject matter in the mobile Adhoc network environment. The MANET environment connecting devices or nodes with each other energetically and develop mobile Adhoc wireless network . It offers the mobility to network devices to freely move in any direction and develop connection to any device. The aim of this research paper is to analyze the routing protocol metrics as, radio range, delay, load, media access delay and throughput by evaluating the simulation of AODV, DSR and TORA routing protocols using video conferencing application. The simulation results have been carried out through OPNET 14.5 modeler tool, however scenarios created, having different node densities and different WLAN physical characteristics and routing protocol metrics and analyzed results.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129501741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Journal of Independent Studies and Research Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1