首页 > 最新文献

GSTF international journal on computing最新文献

英文 中文
Implementation of DNA Pattern Recognition in Turing Machines DNA模式识别在图灵机中的实现
Pub Date : 2014-09-04 DOI: 10.5176/2010-2283_1.2.32
Sumitha Ch
Pattern recognition is the act of taking in raw data and taking an action based on the category of the pattern. DNA pattern recognition has applications in almost any field. It has applications in forensics, genetic engineering, bio informatics, DNA nanotechnology, history and so on. The size of the DNA molecules can be very large that it is a tedious task to perform pattern recognition for the same using common techniques. Hence this paper describes the pattern recognition for DNA molecules using the concept of Turing Machines. It also performs a simulation of the standard Turing Machine that performs DNA pattern recognition on the Universal Turing Machine.
模式识别是获取原始数据并根据模式的类别采取行动的行为。DNA模式识别几乎在任何领域都有应用。它在法医学、基因工程、生物信息学、DNA纳米技术、历史等领域都有应用。DNA分子的大小可能非常大,以至于使用普通技术对相同的DNA分子进行模式识别是一项繁琐的任务。因此,本文利用图灵机的概念描述了DNA分子的模式识别。它还模拟了在通用图灵机上执行DNA模式识别的标准图灵机。
{"title":"Implementation of DNA Pattern Recognition in Turing Machines","authors":"Sumitha Ch","doi":"10.5176/2010-2283_1.2.32","DOIUrl":"https://doi.org/10.5176/2010-2283_1.2.32","url":null,"abstract":"Pattern recognition is the act of taking in raw data and taking an action based on the category of the pattern. DNA pattern recognition has applications in almost any field. It has applications in forensics, genetic engineering, bio informatics, DNA nanotechnology, history and so on. The size of the DNA molecules can be very large that it is a tedious task to perform pattern recognition for the same using common techniques. Hence this paper describes the pattern recognition for DNA molecules using the concept of Turing Machines. It also performs a simulation of the standard Turing Machine that performs DNA pattern recognition on the Universal Turing Machine.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"30 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85765079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Issues and Challenges in Applying Computer-Based Distance Learning system as an alternative to traditional training methods 应用计算机远程学习系统替代传统培训方法的问题与挑战
Pub Date : 2014-09-04 DOI: 10.5176/2010-2283_1.2.30
T. Ahmad, Huda Ibrahim, S. M. Yusof
Many scholars have listed the problems that prevent organizations’ employees to attend face to face training methods. Additionally, they have presented Information and Communication Technology (ICT) especially distance learning system as important way to overcome these obstacles. However, they did not depend on empirical studies to mention those problems and to compare between traditional training method and applying computer-based distance learning system. Therefore, this survey aims to distinguish between the traditional training methods and computer-based distance learning system as an important way to overcome employees’ problems with traditional training, including the challenges and some issues.
许多学者列出了阻碍组织员工参加面对面培训的问题。此外,他们还提出了信息和通信技术(ICT),特别是远程学习系统,作为克服这些障碍的重要途径。然而,他们没有依靠实证研究来提到这些问题,并比较传统的训练方法和应用计算机远程学习系统。因此,本调查旨在区分传统的培训方法和基于计算机的远程学习系统作为克服员工传统培训问题的重要途径,包括挑战和一些问题。
{"title":"Issues and Challenges in Applying Computer-Based Distance Learning system as an alternative to traditional training methods","authors":"T. Ahmad, Huda Ibrahim, S. M. Yusof","doi":"10.5176/2010-2283_1.2.30","DOIUrl":"https://doi.org/10.5176/2010-2283_1.2.30","url":null,"abstract":"Many scholars have listed the problems that prevent organizations’ employees to attend face to face training methods. Additionally, they have presented Information and Communication Technology (ICT) especially distance learning system as important way to overcome these obstacles. However, they did not depend on empirical studies to mention those problems and to compare between traditional training method and applying computer-based distance learning system. Therefore, this survey aims to distinguish between the traditional training methods and computer-based distance learning system as an important way to overcome employees’ problems with traditional training, including the challenges and some issues.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77068643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image Segmentation using Two-Layer Pulse Coupled Neural Network with Inhibitory Linking Field 基于抑制连接场的双层脉冲耦合神经网络图像分割
Pub Date : 2014-09-04 DOI: 10.5176/2010-2283_1.2.35
H. Ranganath, A. Bhatnagar
For over a decade, the Pulse Coupled Neural Network (PCNN) based algorithms have been used for image segmentation. Though there are several versions of the PCNN based image segmentation methods, almost all of them use singlelayer PCNN with excitatory linking inputs. There are four major issues associated with the single-burst PCNN which need attention. Often, the PCNN parameters including the linking coefficient are determined by trial and error. The segmentation accuracy of the single-layer PCNN is highly sensitive to the value of the linking coefficient. Finally, in the single-burst mode, neurons corresponding to background pixels do not participate in the segmentation process. This paper presents a new 2-layer network organization of PCNN in which excitatory and inhibitory linking inputs exist. The value of the linking coefficient and the threshold signal at which primary firing of neurons start are determined directly from the image statistics. Simulation results show that the new PCNN achieves significant improvement in the segmentation accuracy over the widely known Kuntimad’s single burst image segmentation approach. The two-layer PCNN based image segmentation method overcomes all three drawbacks of the single-layer PCNN.
十多年来,基于脉冲耦合神经网络(PCNN)的算法被用于图像分割。尽管有几种基于PCNN的图像分割方法,但几乎所有的方法都使用带有兴奋性链接输入的单层PCNN。与单脉冲PCNN相关的四个主要问题需要引起注意。通常,包括连接系数在内的PCNN参数是通过试错法确定的。单层PCNN的分割精度对连接系数的取值高度敏感。最后,在单突发模式下,背景像素对应的神经元不参与分割过程。本文提出了一种新的两层PCNN网络组织,其中存在兴奋性和抑制性连接输入。连接系数的取值和神经元初级放电开始的阈值信号直接由图像统计量确定。仿真结果表明,与Kuntimad的单突发图像分割方法相比,新的PCNN在分割精度上有了显著提高。基于两层PCNN的图像分割方法克服了单层PCNN的三个缺点。
{"title":"Image Segmentation using Two-Layer Pulse Coupled Neural Network with Inhibitory Linking Field","authors":"H. Ranganath, A. Bhatnagar","doi":"10.5176/2010-2283_1.2.35","DOIUrl":"https://doi.org/10.5176/2010-2283_1.2.35","url":null,"abstract":"For over a decade, the Pulse Coupled Neural Network (PCNN) based algorithms have been used for image segmentation. Though there are several versions of the PCNN based image segmentation methods, almost all of them use singlelayer PCNN with excitatory linking inputs. There are four major issues associated with the single-burst PCNN which need attention. Often, the PCNN parameters including the linking coefficient are determined by trial and error. The segmentation accuracy of the single-layer PCNN is highly sensitive to the value of the linking coefficient. Finally, in the single-burst mode, neurons corresponding to background pixels do not participate in the segmentation process. This paper presents a new 2-layer network organization of PCNN in which excitatory and inhibitory linking inputs exist. The value of the linking coefficient and the threshold signal at which primary firing of neurons start are determined directly from the image statistics. Simulation results show that the new PCNN achieves significant improvement in the segmentation accuracy over the widely known Kuntimad’s single burst image segmentation approach. The two-layer PCNN based image segmentation method overcomes all three drawbacks of the single-layer PCNN.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82903398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Generating Embedded Systems Software using a Component Based Development Approach 使用基于组件的开发方法生成嵌入式系统软件
Pub Date : 2014-09-02 DOI: 10.1037/e525192013-013
Mark Dixon
This work examines how a predominantly graphical approach to software development, that was designed to be deployment platform agnostic, can be used to target embedded software systems. The general aim of the approach was to provide engineers with a development method that was general enough to be applied across a multitude of problem domains. The development technique employs a component centric approach, in which target platform specifics are hidden from the language design. Deployment specific mapping tools are then used to target each type of system. Embedded software systems however are probably the most demanding type of target system, due to limited resources and lack of software infrastructure support. This paper describes a method of mapping an example component based design to a target embedded system.
这项工作研究了一个主要用于软件开发的图形化方法,它被设计为与部署平台无关,如何用于目标嵌入式软件系统。该方法的总体目标是为工程师提供一种足够通用的开发方法,可以应用于许多问题领域。开发技术采用了以组件为中心的方法,在这种方法中,目标平台的细节对语言设计是隐藏的。然后使用特定于部署的映射工具来针对每种类型的系统。然而,由于有限的资源和缺乏软件基础设施支持,嵌入式软件系统可能是要求最高的目标系统类型。本文描述了一种将基于示例组件的设计映射到目标嵌入式系统的方法。
{"title":"Generating Embedded Systems Software using a Component Based Development Approach","authors":"Mark Dixon","doi":"10.1037/e525192013-013","DOIUrl":"https://doi.org/10.1037/e525192013-013","url":null,"abstract":"This work examines how a predominantly graphical approach to software development, that was designed to be deployment platform agnostic, can be used to target embedded software systems. The general aim of the approach was to provide engineers with a development method that was general enough to be applied across a multitude of problem domains. The development technique employs a component centric approach, in which target platform specifics are hidden from the language design. Deployment specific mapping tools are then used to target each type of system. Embedded software systems however are probably the most demanding type of target system, due to limited resources and lack of software infrastructure support. This paper describes a method of mapping an example component based design to a target embedded system.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83315614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Collecting neurophysiological data to investigate users’ cognitive states during game play 收集神经生理学数据,调查用户在游戏过程中的认知状态
Pub Date : 2014-09-02 DOI: 10.1037/e525192013-005
Patrick Charland, Geneviève Allaire-Duquette, Pierre-Majorique Léger
This paper explores the potential of collecting neurophysiological data in order to further understand user’s learning experience. The experimental setup involves collecting electroencephalographic signal (EEG) from the brain cortex to infer users’ cognitive state while they played an educational video game designed to support the learning of Newtonian mechanics. Preliminary results suggest that this neuroscience perspective is quite promising in the idea of quantitatively characterizing users’ learning experience. This could be an innovative and promising avenue in general game development or in educational videogame research field.
本文探讨了收集神经生理数据的潜力,以进一步了解用户的学习体验。实验设置包括从大脑皮层收集脑电图信号(EEG),以推断用户在玩旨在支持牛顿力学学习的教育视频游戏时的认知状态。初步结果表明,这种神经科学的观点在定量描述用户学习体验的想法上是很有希望的。这可能是一般游戏开发或教育电子游戏研究领域的创新和有前途的途径。
{"title":"Collecting neurophysiological data to investigate users’ cognitive states during game play","authors":"Patrick Charland, Geneviève Allaire-Duquette, Pierre-Majorique Léger","doi":"10.1037/e525192013-005","DOIUrl":"https://doi.org/10.1037/e525192013-005","url":null,"abstract":"This paper explores the potential of collecting neurophysiological data in order to further understand user’s learning experience. The experimental setup involves collecting electroencephalographic signal (EEG) from the brain cortex to infer users’ cognitive state while they played an educational video game designed to support the learning of Newtonian mechanics. Preliminary results suggest that this neuroscience perspective is quite promising in the idea of quantitatively characterizing users’ learning experience. This could be an innovative and promising avenue in general game development or in educational videogame research field.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78730386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analyzing the Learning Modes of Learners using Time-Management Modules in Self-Paced Learning 自主节奏学习中使用时间管理模块的学习者学习模式分析
Pub Date : 2014-09-02 DOI: 10.1037/e525192013-011
Juin-Ling Tseng, Ing-Chyi Pai
Enhancing the effectiveness of e-learning is an important topic today. Many factors influence the effectiveness of learning, among which time management has the most direct impact on self-paced learning. This study developed a calendar time-management module to record the learning process in an self-paced learning environment. After analyzing the learning modes, we extracted learners that displayed intensive learning towards the end of a course period. We implemented two types of time management modules on the extracted subjects: a countdown timer and a course schedule module, and then analyzed the influence of the time modules on the learners in self-paced learning. The objective was to promote diligence by helping learners to begin learning earlier in the course period. Our results demonstrate that the incorporation of the countdown timer and course schedule time-management modules altered the distribution of study times and prompted all of the learners to complete the reading of course materials. The countdown timer module presented a stronger correlation with the tendencies of time management and the use of the time modules. This indicates that learners who are sensitive to changing numbers are more likely to follow a set course. Overall, the time modules differed in the degree of impact according to the characteristics of learners; however, the use of time modules was proven to enhance the effectiveness of studying.
提高电子学习的有效性是当今的一个重要话题。影响学习效果的因素很多,其中时间管理对自主节奏学习的影响最为直接。本研究开发了一个日历时间管理模块,用于记录自定进度学习环境中的学习过程。在分析了学习模式后,我们提取了在课程结束时表现出强化学习的学习者。我们在抽取的科目上实现了两种类型的时间管理模块:倒计时计时器和课程计划模块,然后分析了时间模块对学习者自主节奏学习的影响。其目的是通过帮助学习者在课程期间更早地开始学习来促进勤奋。我们的研究结果表明,加入倒计时计时器和课程时间表时间管理模块改变了学习时间的分布,并促使所有学习者完成课程材料的阅读。倒数计时器模块与时间管理倾向和时间模块的使用有较强的相关性。这表明对数字变化敏感的学习者更有可能遵循固定的课程。总体而言,时间模块的影响程度因学习者的特点而异;然而,时间模块的使用被证明可以提高学习的有效性。
{"title":"Analyzing the Learning Modes of Learners using Time-Management Modules in Self-Paced Learning","authors":"Juin-Ling Tseng, Ing-Chyi Pai","doi":"10.1037/e525192013-011","DOIUrl":"https://doi.org/10.1037/e525192013-011","url":null,"abstract":"Enhancing the effectiveness of e-learning is an important topic today. Many factors influence the effectiveness of learning, among which time management has the most direct impact on self-paced learning. This study developed a calendar time-management module to record the learning process in an self-paced learning environment. After analyzing the learning modes, we extracted learners that displayed intensive learning towards the end of a course period. We implemented two types of time management modules on the extracted subjects: a countdown timer and a course schedule module, and then analyzed the influence of the time modules on the learners in self-paced learning. The objective was to promote diligence by helping learners to begin learning earlier in the course period. Our results demonstrate that the incorporation of the countdown timer and course schedule time-management modules altered the distribution of study times and prompted all of the learners to complete the reading of course materials. The countdown timer module presented a stronger correlation with the tendencies of time management and the use of the time modules. This indicates that learners who are sensitive to changing numbers are more likely to follow a set course. Overall, the time modules differed in the degree of impact according to the characteristics of learners; however, the use of time modules was proven to enhance the effectiveness of studying.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"297 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89226791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Multidimensional Modelling 智能多维建模
Pub Date : 2014-09-02 DOI: 10.1037/e525192013-016
Swati Hira, P. Deshpande
On-Line Analytical Processing (OLAP) systems considerably ease the process of analyzing business data and have become widely used in industry. Such systems primarily employ multidimensional data models to structure their data. However, current multidimensional data models fall short in time and skills to model the complex data found in some real-world application domains. Multidimensional data Analysis is based on Measure, Dimensions and Hierarchies. Process to find them manually is very crucial and time consuming because large and complex data is involved across multiple regions, products, and employees. This paper presents an Intelligent Multidimensional modelling system which helps the modeller in building multidimensional model and provides working at logical level by hiding heterogeneousity of physical database. The paper proposes the process to identify Measures, Dimensions, and Hierarchies to generate multidimensional model.
联机分析处理(OLAP)系统大大简化了分析业务数据的过程,并已在工业中得到广泛应用。这类系统主要使用多维数据模型来构建其数据。然而,当前的多维数据模型在时间和技能上都不够,无法对某些实际应用程序领域中的复杂数据进行建模。多维数据分析是基于度量、维度和层次的。手动查找它们的过程非常关键且耗时,因为涉及多个地区、产品和员工的大型复杂数据。本文提出了一种智能多维建模系统,它可以帮助建模者建立多维模型,并通过隐藏物理数据库的异构性提供逻辑层面的工作。本文提出了识别度量、维度和层次的过程,以生成多维模型。
{"title":"Intelligent Multidimensional Modelling","authors":"Swati Hira, P. Deshpande","doi":"10.1037/e525192013-016","DOIUrl":"https://doi.org/10.1037/e525192013-016","url":null,"abstract":"On-Line Analytical Processing (OLAP) systems considerably ease the process of analyzing business data and have become widely used in industry. Such systems primarily employ multidimensional data models to structure their data. However, current multidimensional data models fall short in time and skills to model the complex data found in some real-world application domains. Multidimensional data Analysis is based on Measure, Dimensions and Hierarchies. Process to find them manually is very crucial and time consuming because large and complex data is involved across multiple regions, products, and employees. This paper presents an Intelligent Multidimensional modelling system which helps the modeller in building multidimensional model and provides working at logical level by hiding heterogeneousity of physical database. The paper proposes the process to identify Measures, Dimensions, and Hierarchies to generate multidimensional model.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75615849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial Education: Expert systems used to assist and support 21st century education. 人工教育:用于协助和支持21世纪教育的专家系统。
Pub Date : 2014-09-02 DOI: 10.1037/e525192013-002
C. sora, A. S. Sora
This paper offers a new concept called in education called Artificial Education. Though the term artificial education might disturb many educators, parents and students, it is important to understand what it is and the potential it has for the educational success of all learners. Artificial education refers to using artificially intelligent systems, also known as expert systems, to educate students and teachers. This is a short introductory article on what artificial education refers to, and how intelligent or expert systems can assist students and teachers at the elementary level.
本文提出了一个新的教育概念——人工教育。尽管人工教育这个术语可能会让许多教育者、家长和学生感到困惑,但了解它是什么以及它对所有学习者的教育成功所具有的潜力是很重要的。人工教育是指利用人工智能系统,也称为专家系统,对学生和教师进行教育。这是一篇简短的介绍性文章,介绍了人工教育是什么,以及智能或专家系统如何在初级阶段帮助学生和教师。
{"title":"Artificial Education: Expert systems used to assist and support 21st century education.","authors":"C. sora, A. S. Sora","doi":"10.1037/e525192013-002","DOIUrl":"https://doi.org/10.1037/e525192013-002","url":null,"abstract":"This paper offers a new concept called in education called Artificial Education. Though the term artificial education might disturb many educators, parents and students, it is important to understand what it is and the potential it has for the educational success of all learners. Artificial education refers to using artificially intelligent systems, also known as expert systems, to educate students and teachers. This is a short introductory article on what artificial education refers to, and how intelligent or expert systems can assist students and teachers at the elementary level.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73351920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cloud Computing Security for Organizations using Live Signature – TPALM Printing Client Service 使用实时签名的组织云计算安全- TPALM打印客户端服务
Pub Date : 2014-09-02 DOI: 10.1037/e525192013-004
Atif Farid Mohammad, S. E. Grant
Cloud is taking over the computing environment in both public as well as private sector. This has increased the use of service-oriented architecture (SOA) for the development of services later deployed in the Cloud. This paper presents a Cloud Security algorithm using SOA 3.0 for secured transactions on the data, which usually governments of countries like USA International Traffic in Arms Regulations (ITAR) and Export Administration Regulations (EAR) requires to be utilized and distributed only within United States by security cleared personal only. In this paper, we describe a novel algorithm and corresponding cloud service as Cloud Monitoring Gateway (CMG). The current service prototype simulates the behavior of actual Cloud Security Gateway Application (CSGA) using the algorithm called as TPALM (The Privacy Authentication Latency Management). This simulation is coarse-grained, but is capable of measuring the privacy authentication on the given variables of a legit user. We also present an evaluation of this service utilization on actual data.
云计算正在接管公共和私营部门的计算环境。这增加了面向服务的体系结构(SOA)的使用,用于开发稍后部署在云中的服务。本文提出了一种使用SOA 3.0的云安全算法,用于数据的安全交易,通常美国国际武器贸易条例(ITAR)和出口管理条例(EAR)等国家的政府要求仅在美国境内由安全清除的个人使用和分发。在本文中,我们描述了一种新的算法和相应的云服务——云监控网关(CMG)。当前的服务原型使用称为TPALM(隐私认证延迟管理)的算法模拟实际的云安全网关应用程序(CSGA)的行为。此模拟是粗粒度的,但能够测量合法用户的给定变量的隐私身份验证。我们还在实际数据上对该服务的利用率进行了评估。
{"title":"Cloud Computing Security for Organizations using Live Signature – TPALM Printing Client Service","authors":"Atif Farid Mohammad, S. E. Grant","doi":"10.1037/e525192013-004","DOIUrl":"https://doi.org/10.1037/e525192013-004","url":null,"abstract":"Cloud is taking over the computing environment in both public as well as private sector. This has increased the use of service-oriented architecture (SOA) for the development of services later deployed in the Cloud. This paper presents a Cloud Security algorithm using SOA 3.0 for secured transactions on the data, which usually governments of countries like USA International Traffic in Arms Regulations (ITAR) and Export Administration Regulations (EAR) requires to be utilized and distributed only within United States by security cleared personal only. In this paper, we describe a novel algorithm and corresponding cloud service as Cloud Monitoring Gateway (CMG). The current service prototype simulates the behavior of actual Cloud Security Gateway Application (CSGA) using the algorithm called as TPALM (The Privacy Authentication Latency Management). This simulation is coarse-grained, but is capable of measuring the privacy authentication on the given variables of a legit user. We also present an evaluation of this service utilization on actual data.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81720300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BI APPLICATION IN FINANCIAL SECTOR - CREDIT SCORING OF RETAIL LOANS USING A HYBRID MODELING APPROACH Bi在金融领域的应用——基于混合建模的零售贷款信用评分方法
Pub Date : 2014-09-02 DOI: 10.1037/e525192013-023
S. Chandrasekhar, B. Tech, .. M.Tec
Retail Loans now-a-days form a major proportion of Loan Portfolio. Broadly they can be classified as (i) Loans for Small and medium Sector and (ii) Loans for Individuals. The objective of Credit Scoring is that we use enough of precaution before the sanction of the loan so that the loans do not go bad after disbursement. This will increase to the bottom line of the financial institution and also reduce the Credit Risk. Techniques used to perform Credit Scoring Varies for the above two classes of loans. In this paper, we concentrate on the application of Credit Scoring for individual or so called personal loans like – Auto loan, buying goods like Televisions, Refrigerators etc. Large numbers of loans are being disbursed in these areas. Though the size of the loan may be small, when compared to Small/Medium Scale Industry, if one does not control the defaults, the consequences will be disastrous. From the characteristics of borrower, product characteristics a Credit Score is computed for each applicant. If the Score exceeds a given threshold loan is sanctioned. If it is below the threshold, loan is sanctioned. If it is below the threshold, loan is rejected. In practice a buffer zone is created near the threshold so that those Credit Scores that fall in buffer zone, detailed investigation will be done before a decision is taken. Two broad classes of Scoring Model exists (i) Subjective Scoring and (ii) Statistical Scoring. Subjective Scoring is based on intuitive judgement. Subjective Scoring works but there is scope for improvement one limitation is prediction of risk is person dependent and focuses on few characteristics and may be mistakenly focusing on wrong characteristics. Statistical Scoring uses hardcore data of borrower characteristics, product characteristics and uses mathematical models to predict the risk. The relation is expressed in the form of an equation which finally gets converted to a score. Subjectivity will be reduced and variable(s) that are important to scoring are identified based on strong mathematical foundation. Different Models have been used in Credit Scoring like Regression, Decision Tree, Discriminate Analysis and Logistic  Regression. Most of the times, a single model is used to compute the Credit Score. This method works well when the underlying decision rule is simple and when the rule becomes complex, the accuracy of the model diminishes very fast. In this Research Paper, a combination of Decision Tree and Logistic Regression is used to determine the weights that are to be assigned to different characteristics of the borrower. Decision Tree is used at first level of analysis to narrow down the importance of Variables and overall weights that needs to be assigned. It is also used for optimum groupings of numeric and non-numeric Variables. At second level, Logistic Regression is used to compute odd ratios a variant of probability, which in turn is used to assign weights for an attribute and to individual levels in an
如今,零售贷款在贷款组合中占很大比例。大体上可分为(i)中小型部门贷款和(ii)个人贷款。信用评分的目的是我们在贷款批准之前使用足够的预防措施,以便贷款在支付后不会变成坏账。这将提高金融机构的底线,也将降低信用风险。用于执行信用评分的技术对上述两类贷款有所不同。本文主要研究了信用评分在个人贷款中的应用,如汽车贷款、购买电视、冰箱等商品。这些领域正在发放大量贷款。虽然贷款规模可能很小,但与中小企业相比,如果不控制违约,后果将是灾难性的。根据借款人的特征,为每个申请人计算产品特征和信用评分。如果分数超过给定的阈值,则批准贷款。如果低于阈值,则批准贷款。如果低于阈值,则拒绝贷款。在实践中,在阈值附近创建一个缓冲区,以便那些落在缓冲区的信用评分,在做出决定之前将进行详细的调查。评分模型有两大类:(i)主观评分和(ii)统计评分。主观评分是基于直觉判断。主观评分是有效的,但也有改进的余地,一个限制是风险预测依赖于人,关注的特征很少,可能会错误地关注错误的特征。统计评分法利用借款人特征、产品特征等核心数据,运用数学模型对风险进行预测。这种关系以方程的形式表示,最终转化为分数。将减少主观性,并根据强大的数学基础确定对评分重要的变量。信用评分中常用的模型有回归分析、决策树分析、判别分析和逻辑回归等。大多数情况下,使用单一模型来计算信用评分。当底层决策规则较简单时,该方法效果良好,而当决策规则较复杂时,模型的准确性下降很快。本文采用决策树和逻辑回归相结合的方法来确定借款人不同特征的权重。决策树用于第一级分析,以缩小变量的重要性和需要分配的总体权重。它还用于数值和非数值变量的最佳分组。在第二级,逻辑回归用于计算奇数比(概率的一种变体),它又用于为属性和属性中的各个级别分配权重。这已经在现实生活数据上进行了测试,发现与使用单阶段模型的方法相比,效果更好。在决策中获得了80%左右的准确性,这对于任何建模研究都是有益的,因为没有模型可以给出100%的准确性。下一节解释了方法、使用的数据和结果。SPSS软件已用于模型构建和数据分析
{"title":"BI APPLICATION IN FINANCIAL SECTOR - CREDIT SCORING OF RETAIL LOANS USING A HYBRID MODELING APPROACH","authors":"S. Chandrasekhar, B. Tech, .. M.Tec","doi":"10.1037/e525192013-023","DOIUrl":"https://doi.org/10.1037/e525192013-023","url":null,"abstract":"Retail Loans now-a-days form a major proportion of Loan Portfolio. Broadly they can be classified as (i) Loans for Small and medium Sector and (ii) Loans for Individuals. The objective of Credit Scoring is that we use enough of precaution before the sanction of the loan so that the loans do not go bad after disbursement. This will increase to the bottom line of the financial institution and also reduce the Credit Risk. Techniques used to perform Credit Scoring Varies for the above two classes of loans. In this paper, we concentrate on the application of Credit Scoring for individual or so called personal loans like – Auto loan, buying goods like Televisions, Refrigerators etc. Large numbers of loans are being disbursed in these areas. Though the size of the loan may be small, when compared to Small/Medium Scale Industry, if one does not control the defaults, the consequences will be disastrous. From the characteristics of borrower, product characteristics a Credit Score is computed for each applicant. If the Score exceeds a given threshold loan is sanctioned. If it is below the threshold, loan is sanctioned. If it is below the threshold, loan is rejected. In practice a buffer zone is created near the threshold so that those Credit Scores that fall in buffer zone, detailed investigation will be done before a decision is taken. Two broad classes of Scoring Model exists (i) Subjective Scoring and (ii) Statistical Scoring. Subjective Scoring is based on intuitive judgement. Subjective Scoring works but there is scope for improvement one limitation is prediction of risk is person dependent and focuses on few characteristics and may be mistakenly focusing on wrong characteristics. Statistical Scoring uses hardcore data of borrower characteristics, product characteristics and uses mathematical models to predict the risk. The relation is expressed in the form of an equation which finally gets converted to a score. Subjectivity will be reduced and variable(s) that are important to scoring are identified based on strong mathematical foundation. Different Models have been used in Credit Scoring like Regression, Decision Tree, Discriminate Analysis and Logistic  Regression. Most of the times, a single model is used to compute the Credit Score. This method works well when the underlying decision rule is simple and when the rule becomes complex, the accuracy of the model diminishes very fast. In this Research Paper, a combination of Decision Tree and Logistic Regression is used to determine the weights that are to be assigned to different characteristics of the borrower. Decision Tree is used at first level of analysis to narrow down the importance of Variables and overall weights that needs to be assigned. It is also used for optimum groupings of numeric and non-numeric Variables. At second level, Logistic Regression is used to compute odd ratios a variant of probability, which in turn is used to assign weights for an attribute and to individual levels in an ","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84921595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
GSTF international journal on computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1