首页 > 最新文献

Journal of Independent Studies and Research Computing最新文献

英文 中文
Repercussion Of Program Generated Objects In Smooth Operations Running From Disaster Recovery Site 程序生成对象在灾备站点平稳运行中的影响
Pub Date : 1900-01-01 DOI: 10.31645/2014.12.1.7
M. J. Ashraf, M. Mukati
The disaster could happen at any point of time and due to which there could be financial loss in addition to operational loss, considering 24/7 banking environment and having its branches in different parts of world. The risk involved in financial loss may be very high and could result in unbearable loss. In such cases where organizations have zero downtime and having high availability of data, the disaster recovery mechanism and data replication scope has to be well defined and should be strictly followed. Assuming that the network, storage and hardware is available at DR site and the replication of critical data is also verified but still there are several objects left behind which were not covered under replication scope. These objects were created by programs themselves while executing (not in replication scope). In such case the successful switch might not be called as successful because those objects will not be available at DR site and may lead to business interruption or financial loss. This problem arises when developers have access on production servers and they create new libraries/objects for their program execution without informing the implementers through proper change management process. In this paper we will provide the guidelines and framework for deployment of programs on production servers also the guide for smooth switching (change of role) of entire core banking environment running on IBM System-i to DR site.
灾难可能发生在任何时间点,考虑到24/7的银行环境和在世界各地的分支机构,除了运营损失之外,还可能造成财务损失。经济损失的风险可能非常高,并可能导致无法承受的损失。在组织零停机时间和数据高可用性的情况下,必须很好地定义灾难恢复机制和数据复制范围,并应严格遵守。假设容灾站点的网络、存储和硬件可用,并且验证了关键数据的复制,但仍然有几个对象没有在复制范围内。这些对象是由程序自己在执行时创建的(不在复制范围内)。在这种情况下,成功的交换机可能不会被称为成功,因为这些对象在DR站点上不可用,并可能导致业务中断或财务损失。当开发人员访问生产服务器,并且他们为程序执行创建新的库/对象而没有通过适当的变更管理过程通知实现者时,就会出现这个问题。在本文中,我们将提供在生产服务器上部署程序的指导方针和框架,以及在IBM System-i上运行的整个核心银行环境顺利切换(角色更改)到DR站点的指导方针。
{"title":"Repercussion Of Program Generated Objects In Smooth Operations Running From Disaster Recovery Site","authors":"M. J. Ashraf, M. Mukati","doi":"10.31645/2014.12.1.7","DOIUrl":"https://doi.org/10.31645/2014.12.1.7","url":null,"abstract":"The disaster could happen at any point of time and due to which there could be financial loss in addition to operational loss, considering 24/7 banking environment and having its branches in different parts of world. The risk involved in financial loss may be very high and could result in unbearable loss. In such cases where organizations have zero downtime and having high availability of data, the disaster recovery mechanism and data replication scope has to be well defined and should be strictly followed. Assuming that the network, storage and hardware is available at DR site and the replication of critical data is also verified but still there are several objects left behind which were not covered under replication scope. These objects were created by programs themselves while executing (not in replication scope). In such case the successful switch might not be called as successful because those objects will not be available at DR site and may lead to business interruption or financial loss. This problem arises when developers have access on production servers and they create new libraries/objects for their program execution without informing the implementers through proper change management process. In this paper we will provide the guidelines and framework for deployment of programs on production servers also the guide for smooth switching (change of role) of entire core banking environment running on IBM System-i to DR site.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124929511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications 网络安全的脆弱性及应对商业应用潜在威胁的策略
Pub Date : 1900-01-01 DOI: 10.31645/.2014.12.1.9
Muhammad Altaf Mukati, Syed Muzammil Ali
Web technology has become an important part of online business such as sharing information, social interaction, activities related to business especially online payment methods, credit card information, bank transactions, online banking and many other applications. The exponential use of web technology introduces new possibilities of criminal activities and creates unbearable threats to the information and business trades. This is mainly because of the widely use of the World Wide Web and cloud computing for information sharing and saving regardless of the user. As technology grows with the passage of time, the web technology becomes more advanced and complex in terms of security and privacy and drives new challenges and threats which makes the internet unsafe for business applications. Many of the currently available applications have loopholes which makes cyber criminals to exploit the applications easily. The main vulnerabilities are Cyber theft, vandalism, web jacking, credit card information stolen, privacy and security issues, cyber terrorism, spam and etc. An ongoing challenge related to cyber security community is related to handle the transition of technology to commercial or open source web applications available in the market. This paper provides the strategy to overcome the vulnerabilities and potential threats to the business applications.
Web技术已成为网上商务的重要组成部分,如信息共享、社会互动、与业务相关的活动,特别是网上支付方式、信用卡信息、银行交易、网上银行等许多应用。网络技术的快速发展为犯罪活动带来了新的可能性,并对信息和商业贸易造成了难以忍受的威胁。这主要是因为万维网和云计算的广泛使用,无论用户如何,都可以进行信息共享和保存。随着技术的发展,网络技术在安全和隐私方面变得更加先进和复杂,并带来了新的挑战和威胁,这使得互联网对商业应用程序不安全。许多现有的应用程序都存在漏洞,这使得网络罪犯很容易利用这些应用程序。主要的漏洞是网络盗窃、破坏、网络劫持、信用卡信息被盗、隐私和安全问题、网络恐怖主义、垃圾邮件等。与网络安全社区相关的一个持续挑战是如何处理技术向市场上可用的商业或开源web应用程序的过渡。本文提供了克服业务应用程序的漏洞和潜在威胁的策略。
{"title":"The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications","authors":"Muhammad Altaf Mukati, Syed Muzammil Ali","doi":"10.31645/.2014.12.1.9","DOIUrl":"https://doi.org/10.31645/.2014.12.1.9","url":null,"abstract":"Web technology has become an important part of online business such as sharing information, social interaction, activities related to business especially online payment methods, credit card information, bank transactions, online banking and many other applications. The exponential use of web technology introduces new possibilities of criminal activities and creates unbearable threats to the information and business trades. This is mainly because of the widely use of the World Wide Web and cloud computing for information sharing and saving regardless of the user. As technology grows with the passage of time, the web technology becomes more advanced and complex in terms of security and privacy and drives new challenges and threats which makes the internet unsafe for business applications. Many of the currently available applications have loopholes which makes cyber criminals to exploit the applications easily. The main vulnerabilities are Cyber theft, vandalism, web jacking, credit card information stolen, privacy and security issues, cyber terrorism, spam and etc. An ongoing challenge related to cyber security community is related to handle the transition of technology to commercial or open source web applications available in the market. This paper provides the strategy to overcome the vulnerabilities and potential threats to the business applications.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114575584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Late Acceptance Hill Climbing Algorithm For Solving Patient Facing Problems In Hospitals 晚期接受爬坡算法解决医院患者面临的问题
Pub Date : 1900-01-01 DOI: 10.31645/24
Irfan Majeed, Mansoor Alam, Mustaneer Noor, Rizwan Ahmed, Muhammad Humayoun, Javeria Iftikhar
The current study is to evaluate the patient facing problems by applying Late Acceptance Hill Climbing Algorithm (LAHC) in hospital settings. The recent proposed procedure of LAHC is based on metaheuristic algorithm which is linked with one-point clarification method. Patient’s satisfaction regarding the performance of the hospital is a composite mechanism. The optimization procedure is connected with NP-hard problems which is practically related to the problems faced by patients. These problems are concerned with assigning the group of patients visiting the hospital for receiving healthcare services. The common issues faced by patients include communication gap, response time to attend patients, early symptomatic relief, getting proper advice for dosage and usage of medicines, clean hospital environment. Moreover, patient education and guidance before discharge from hospital is also the missing element. The suggested algorithm of LAHC to PFP is developed and it has two phases: the first phase includes providing the initial feasible solution using communication-oriented methodology. The second phase uses three neighborhood framework which are implanted inside the segment of PFP based on LAHC to additionally upgrade the underlying feasible solution of the introductory phase.
本研究是在医院环境中应用延迟接受爬坡算法(Late Acceptance Hill climb Algorithm, LAHC)来评估患者面临的问题。最近提出的LAHC过程是基于与一点澄清法相结合的元启发式算法。患者对医院绩效的满意度是一个复合机制。优化过程与NP-hard问题有关,而NP-hard问题与患者所面临的问题实际相关。这些问题涉及分配到医院接受保健服务的病人组。患者面临的常见问题包括沟通差距、就诊反应时间、早期症状缓解、正确用药建议、医院环境清洁等。此外,患者出院前的教育和指导也是缺失的因素。提出了从LAHC到PFP的建议算法,该算法分为两个阶段:第一阶段采用面向通信的方法提供初始可行解。第二阶段采用三个邻域框架植入到基于LAHC的PFP片段中,对引入阶段的底层可行解进行额外升级。
{"title":"Late Acceptance Hill Climbing Algorithm For Solving Patient Facing Problems In Hospitals","authors":"Irfan Majeed, Mansoor Alam, Mustaneer Noor, Rizwan Ahmed, Muhammad Humayoun, Javeria Iftikhar","doi":"10.31645/24","DOIUrl":"https://doi.org/10.31645/24","url":null,"abstract":"The current study is to evaluate the patient facing problems by applying Late Acceptance Hill Climbing Algorithm (LAHC) in hospital settings. The recent proposed procedure of LAHC is based on metaheuristic algorithm which is linked with one-point clarification method. Patient’s satisfaction regarding the performance of the hospital is a composite mechanism. The optimization procedure is connected with NP-hard problems which is practically related to the problems faced by patients. These problems are concerned with assigning the group of patients visiting the hospital for receiving healthcare services. The common issues faced by patients include communication gap, response time to attend patients, early symptomatic relief, getting proper advice for dosage and usage of medicines, clean hospital environment. Moreover, patient education and guidance before discharge from hospital is also the missing element. The suggested algorithm of LAHC to PFP is developed and it has two phases: the first phase includes providing the initial feasible solution using communication-oriented methodology. The second phase uses three neighborhood framework which are implanted inside the segment of PFP based on LAHC to additionally upgrade the underlying feasible solution of the introductory phase.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122132731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive Analysis on Electoral Poll using micro- blogging (twitter) 基于微博(twitter)的选举投票预测分析
Pub Date : 1900-01-01 DOI: 10.31645/2013.11.1.6
Tabraiz Anwer, Adeel Ahmed
The advent of blogging more and more content is published on the web. Micro blogging is used to convey ideas using short text messages; video links or images .micro blogging platforms allow the public to convey their ideas through new technologies and to convey ideas and news in precise manner. This paper aims to use to text mining algorithm, which is used for gathering relevant information from passages of text, to derive a context through which predictive analysis can be made. The goal will be to use this technique to provide a predictive analysis on the electoral polls using tweets from the micro-blogging platform twitter.
随着博客的出现,越来越多的内容被发布在网络上。微博是用短信来传达思想的;视频链接或图片。微博平台允许公众通过新技术传达他们的想法,并以精确的方式传达想法和新闻。本文的目的是利用文本挖掘算法从文本段落中收集相关信息,从而得出一个可以进行预测分析的上下文。我们的目标是利用这项技术,利用微博平台twitter上的推文,对选举民意调查进行预测分析。
{"title":"Predictive Analysis on Electoral Poll using micro- blogging (twitter)","authors":"Tabraiz Anwer, Adeel Ahmed","doi":"10.31645/2013.11.1.6","DOIUrl":"https://doi.org/10.31645/2013.11.1.6","url":null,"abstract":"The advent of blogging more and more content is published on the web. Micro blogging is used to convey ideas using short text messages; video links or images .micro blogging platforms allow the public to convey their ideas through new technologies and to convey ideas and news in precise manner. This paper aims to use to text mining algorithm, which is used for gathering relevant information from passages of text, to derive a context through which predictive analysis can be made. The goal will be to use this technique to provide a predictive analysis on the electoral polls using tweets from the micro-blogging platform twitter.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133810232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifying Practical Implementation Of QA Process Of Mechanical Component By Using Digital Image Processing 用数字图像处理技术验证机械零件质量保证过程的实际实现
Pub Date : 1900-01-01 DOI: 10.31645/2014.12.1.11
Nazim Badar
Manufacturing industry in need of a system to meet their quality assurance requirements specially when they have to produce quality and precise components which require to be used in mechanical machines. To reach this quality standard there is a need to solution which enable manufacturing industry to overcome speed and accuracy requirements. Inspection of quality parameters in mechanical components is very difficult and time consuming process. Computer vision / Image processing may contribute key role in developing solution through which quality assurance process become easy and fast.
制造业需要一个系统来满足他们的质量保证要求,特别是当他们必须生产高质量和精确的部件时,需要在机械机器中使用。为了达到这一质量标准,需要一个解决方案,使制造业能够克服速度和精度要求。机械零件质量参数的检测是一个非常困难和耗时的过程。计算机视觉/图像处理可以在开发解决方案中发挥关键作用,通过该解决方案,质量保证过程变得简单和快速。
{"title":"Verifying Practical Implementation Of QA Process Of Mechanical Component By Using Digital Image Processing","authors":"Nazim Badar","doi":"10.31645/2014.12.1.11","DOIUrl":"https://doi.org/10.31645/2014.12.1.11","url":null,"abstract":"Manufacturing industry in need of a system to meet their quality assurance requirements specially when they have to produce quality and precise components which require to be used in mechanical machines. To reach this quality standard there is a need to solution which enable manufacturing industry to overcome speed and accuracy requirements. Inspection of quality parameters in mechanical components is very difficult and time consuming process. Computer vision / Image processing may contribute key role in developing solution through which quality assurance process become easy and fast.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127373872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reflector – A Dynamic Manifestation of Turing Machines with Time and Space Complexity Analysis 反射器——图灵机的动态表现与时空复杂性分析
Pub Date : 1900-01-01 DOI: 10.31645/2013.11.2.4
Behroz Mirza, Muhammad Rafi
The Turing Machine model has proven to be capable of simulating every known computational model. Since its inception the model has served as the basis on which computational devices have been constructed. The paper focuses on highlighting the fact that Turing Machine serves as a precise model for defining and executing a specific algorithm based on the Computability Theory. The paper also highlights the fact that when executed on a Turing Machine an algorithm’s time and space complexity can be analyzed based on the Complexity Theory. Therefore, this model can serve as a superb abstraction for the computational devices as number of steps and space required to execute an algorithm can be predicted. It is worth mentioning that the simulator engine named Reflector designed in this study is the foremost simulator in the regards to have the distinct capabilities of; firstly dynamically modelling a Turing Machine based on its manifestations and secondly performing Time & Space Complexity Analysis of an algorithm executed on the Turing Machine.
图灵机模型已被证明能够模拟所有已知的计算模型。从一开始,该模型就作为计算设备构建的基础。本文着重强调图灵机作为一个精确的模型来定义和执行基于可计算性理论的特定算法。本文还强调了在图灵机上执行算法时,可以根据复杂度理论分析算法的时间和空间复杂度。因此,该模型可以作为计算设备的极好抽象,因为可以预测执行算法所需的步骤数和空间。值得一提的是,本研究设计的名为Reflector的模拟器引擎是最重要的模拟器,在具有不同的功能方面;首先根据图灵机的表现形式对其进行动态建模,然后对图灵机上执行的算法进行时空复杂度分析。
{"title":"Reflector – A Dynamic Manifestation of Turing Machines with Time and Space Complexity Analysis","authors":"Behroz Mirza, Muhammad Rafi","doi":"10.31645/2013.11.2.4","DOIUrl":"https://doi.org/10.31645/2013.11.2.4","url":null,"abstract":"The Turing Machine model has proven to be capable of simulating every known computational model. Since its inception the model has served as the basis on which computational devices have been constructed. The paper focuses on highlighting the fact that Turing Machine serves as a precise model for defining and executing a specific algorithm based on the Computability Theory. The paper also highlights the fact that when executed on a Turing Machine an algorithm’s time and space complexity can be analyzed based on the Complexity Theory. Therefore, this model can serve as a superb abstraction for the computational devices as number of steps and space required to execute an algorithm can be predicted. It is worth mentioning that the simulator engine named Reflector designed in this study is the foremost simulator in the regards to have the distinct capabilities of; firstly dynamically modelling a Turing Machine based on its manifestations and secondly performing Time & Space Complexity Analysis of an algorithm executed on the Turing Machine.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Ontology for Requirements Reuse 建议的需求重用本体
Pub Date : 1900-01-01 DOI: 10.31645/2014.12.2.3
Sugandh Wafai, Z. Jan
Requirements engineering is a crucial phase in system development. If the requirements are correct, the entire project will succeed but the failure of requirements will have negative impact on the project. In this research, ontology for requirement reuse is proposed either across different projects or within a single project. The requirements once elicited, designed, verified and validated, produce sets of artefacts that are used to build the system. These requirements can be useful if stored in a repository and searched for similar criteria in future scenario thus, saving time and effort. This paper proposes ontology for the reuse process of the requirements.
需求工程是系统开发的关键阶段。如果需求是正确的,那么整个项目将会成功,但是需求的失败将会对项目产生负面影响。在本研究中,提出了跨不同项目或在单个项目内进行需求重用的本体。需求一旦被引出、设计、验证和确认,就会产生一组用于构建系统的工件。如果将这些需求存储在存储库中,并在未来的场景中搜索类似的标准,那么这些需求将非常有用,从而节省时间和精力。本文提出了面向需求重用过程的本体。
{"title":"Proposed Ontology for Requirements Reuse","authors":"Sugandh Wafai, Z. Jan","doi":"10.31645/2014.12.2.3","DOIUrl":"https://doi.org/10.31645/2014.12.2.3","url":null,"abstract":"Requirements engineering is a crucial phase in system development. If the requirements are correct, the entire project will succeed but the failure of requirements will have negative impact on the project. In this research, ontology for requirement reuse is proposed either across different projects or within a single project. The requirements once elicited, designed, verified and validated, produce sets of artefacts that are used to build the system. These requirements can be useful if stored in a repository and searched for similar criteria in future scenario thus, saving time and effort. This paper proposes ontology for the reuse process of the requirements.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134528450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure User Authentication Using Graphical Passwords 使用图形化密码进行安全用户认证
Pub Date : 1900-01-01 DOI: 10.31645/2013.11.2.5
Fariya Ghori, Kashif Abbasi
The paper discusses secure user authentication mechanisms using graphical passwords. Graphical Password is an alternative to a textual password, which uses images, designs patterns etc. as a password instead of alphanumeric password. Graphical passwords provide better security and usability over textual password, but along with so many advantages of graphical password, they have a major issue of Shoulder Surfing Attack. In this report different techniques of graphical passwords are discussed. To combat shoulder surfing attack, two different techniques of graphical password based authentication are implemented as part of this project. Different user based surveys are conducted. Based on results of user surveys, a comparative analysis is carried out between two prototypes developed in this project. In the end, conclusion is written in terms of application’s security, reliability, user convenience and security against the shoulder surfing attack.
本文讨论了使用图形密码的安全用户认证机制。图形密码是文本密码的另一种选择,它使用图像,设计模式等作为密码,而不是字母数字密码。与文本密码相比,图形密码提供了更好的安全性和可用性,但随着图形密码的诸多优点,它们也存在着肩部冲浪攻击的主要问题。在这个报告中讨论了不同的图形密码技术。为了打击肩冲浪攻击,本项目实施了两种不同的基于图形密码的身份验证技术。进行了不同的基于用户的调查。根据用户调查结果,对本项目开发的两种原型进行了对比分析。最后从应用程序的安全性、可靠性、用户便利性和抗肩冲浪攻击的安全性等方面进行了总结。
{"title":"Secure User Authentication Using Graphical Passwords","authors":"Fariya Ghori, Kashif Abbasi","doi":"10.31645/2013.11.2.5","DOIUrl":"https://doi.org/10.31645/2013.11.2.5","url":null,"abstract":"The paper discusses secure user authentication mechanisms using graphical passwords. Graphical Password is an alternative to a textual password, which uses images, designs patterns etc. as a password instead of alphanumeric password. Graphical passwords provide better security and usability over textual password, but along with so many advantages of graphical password, they have a major issue of Shoulder Surfing Attack. In this report different techniques of graphical passwords are discussed. To combat shoulder surfing attack, two different techniques of graphical password based authentication are implemented as part of this project. Different user based surveys are conducted. Based on results of user surveys, a comparative analysis is carried out between two prototypes developed in this project. In the end, conclusion is written in terms of application’s security, reliability, user convenience and security against the shoulder surfing attack.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127688003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
To Identify the Criminal tendency of a Person by analysis of their social media profiles (Facebook) 通过分析一个人的社交媒体资料(Facebook)来识别他们的犯罪倾向
Pub Date : 1900-01-01 DOI: 10.31645/2013.11.2.7
Sajjad Khan, Z. Jan
The social networks become the important part of the life. During the last decade, use of social networks has increased to a great extent. People publish their content on the web they use to convey their idea by posting statuses, links, videos, images, comments(Facebook). The use of social networks rapidly increased during the last decade and there is huge amount of data publish on these networks People share their personal information and insights of their lives. In this paper we thoroughly studied five big personality models and come to the point that neuroticism reflects the criminal mind of person, we are using the text mining algorithm, which will be used to extract necessary information from the text massages (statuses, comments etc.) containing neuroticism words e.g. anger, anxiety stress, depression etc. and by using these words prediction can be made. The main aim of this paper is to find the crime tendency in person from the information they share on social networking site (FACEBOOK).
社交网络成为人们生活的重要组成部分。在过去的十年中,社交网络的使用在很大程度上增加了。人们在网上发布自己的内容,通过发布状态、链接、视频、图片、评论(Facebook)来传达自己的想法。在过去的十年里,社交网络的使用迅速增加,在这些网络上发布了大量的数据,人们分享他们的个人信息和对他们生活的见解。本文对五大人格模型进行了深入的研究,认为神经质反映了人的犯罪心理,采用文本挖掘算法,从包含愤怒、焦虑、压力、抑郁等神经质词汇的文本信息(状态、评论等)中提取必要的信息,并利用这些词汇进行预测。本文的主要目的是从社交网站(FACEBOOK)上分享的信息中发现个人的犯罪倾向。
{"title":"To Identify the Criminal tendency of a Person by analysis of their social media profiles (Facebook)","authors":"Sajjad Khan, Z. Jan","doi":"10.31645/2013.11.2.7","DOIUrl":"https://doi.org/10.31645/2013.11.2.7","url":null,"abstract":"The social networks become the important part of the life. During the last decade, use of social networks has increased to a great extent. People publish their content on the web they use to convey their idea by posting statuses, links, videos, images, comments(Facebook). The use of social networks rapidly increased during the last decade and there is huge amount of data publish on these networks People share their personal information and insights of their lives. In this paper we thoroughly studied five big personality models and come to the point that neuroticism reflects the criminal mind of person, we are using the text mining algorithm, which will be used to extract necessary information from the text massages (statuses, comments etc.) containing neuroticism words e.g. anger, anxiety stress, depression etc. and by using these words prediction can be made. The main aim of this paper is to find the crime tendency in person from the information they share on social networking site (FACEBOOK).","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Independent Studies and Research Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1