- Все статьи 611
Статьи журнала - International Journal of Information Engineering and Electronic Business
Все статьи: 611
Security Analysis in Online Transaction Systems: A Proposed Framework
Rakin S. Aftab, Md. Kais K. Emon, Sanjana F. Anny, Durjoy Sarker, Md. Mazid-Ul-Haque
Статья научная
The safety of online transactions is paramount in the modern world, mainly since technology develops at a dizzying rate. This study aims to shed light on the numerous threats that users of online transaction systems face. The study used a mixed-methods research strategy to investigate the experiences and perspectives of 400 individuals from various backgrounds. Worryingly, the results show a significant knowledge gap on the many types of cyber hazards. The research reveals a troubling lack of awareness about various cyber risks, including fraud, phishing, and identity theft. It highlights the user’s common functional difficulties. The study proposes a novel framework named COTSEF: A Comprehensive Framework for Enhancing Security in Online Transactions to enhance online transaction security alongside these findings. This comprehensive framework aims to provide a safer and more dependable environment for online commerce by mitigating the identified risks and challenges. The demographic breakdown of the users is also investigated, with the results indicating the increased vulnerability of some age groups and professions to various hazards. It also highlights the need for educational activities to address the significant need for more awareness about data protection rules. The study is a critical resource for policymakers, corporations, and educational institutions, offering actionable insights for developing more secure and user-friendly online transaction systems.
Бесплатно
Security Challenges and Attacks in Mobile Ad Hoc Networks
CH.V. Raghavendran, G. Naga Satish, P. Suresh Varma
Статья научная
Mobile Ad hoc Network (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are not designed to defense against security challenges. In this paper we discuss about current challenges in an ad hoc environment which includes the different types of potential attacks that are possible in the Mobile Ad hoc Networks that can harm its working and operation. We have done literature study and gathered information relating to various types of attacks. In our study, we have found that there is no general algorithm that suits well against the most commonly known attacks. But the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET. To develop suitable security solutions for such environments, we must first understand how MANETs can be attacked. This paper provides a comprehensive study of attacks against mobile ad hoc networks. We present a detailed classification of the attacks against MANETs.
Бесплатно
Security Framework for Social Internet of Things: A Relativity Strength Approach
K.S. Santhosh Kumar, Hanumanthappa J., S.P. Shiva Prakash, Kirill Krinkin
Статья научная
The evolution of the Internet of Things (IoT) into the Social Internet of Things (SIoT) involves the integration of social networking features into smart devices. In this paradigm, smart devices emulate human social behavior by forming social relationships with other devices within the network. These relationships are leveraged for service discovery, emphasizing the need for robust security to foster collaboration and cooperation among devices. Security is paramount in the SIoT landscape, as malicious messages from devices can disrupt service functionality, impacting service quality and reliability. These challenges are particularly pronounced in social networks, introducing unique considerations such as heterogeneity and navigability. This study introduces a Security Framework for the Social Internet of Things, adopting a Relativity Strength Approach to enhance the security and reliability of IoT devices within social network contexts. The framework incorporates a relativity-based security model, utilizes Q-learning for efficient device navigation, and employs decision tree classification for assessing service availability. By optimizing hop counts and considering the strength of relationships between devices, the framework enhances security, resource utilization, and service reliability. The proposed security framework introduces a” Relationship key” derived from device-to-device relationships as a central element. This key, coupled with a standard 256-bit Advanced Encryption Standard (AES) algorithm, is employed for encryption and decryption processes. The relationship key technique ensures data protection during transmission, guaranteeing confidentiality and service integrity during network navigation. The system demonstrates an overall security effectiveness of 88.75%, showcasing its robustness in thwarting attacks and preventing unauthorized access. With an impressive overall communication efficiency of 91.75%, the framework minimizes errors and delays, facilitating optimal information trans- mission in smart environments. Furthermore, its 97.5% overall service availability assures a continuous and reliable user experience, establishing the framework’s capability to deliver secure, efficient, and highly accessible smart services.
Бесплатно
Security Measures in Data Mining
Anish Gupta, Vimal Bibhu, Rashid Hussain
Статья научная
Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.
Бесплатно
Security and Privacy for Data Storage Service Scheme in Cloud Computing
Jayashree Agarkhed, Ashalatha R.
Статья научная
The cloud computing features aim at providing security and confidentiality to its customers. The business officials have gained maximum profit using the cloud environment. Therefore the critical data moving to and from the cloud server must be secured. The security and confidentiality issue is the most critical challenge that we are facing in today’s world of the cloud environment. The business officials have gained maximum profit accessing the cloud environment. Before the disaster occurrence, the critical data moving to and from the cloud must be preserved. The privacy preservation and cloud security issue is the most serious issue that we are facing in today’s world in cloud era.
Бесплатно
Noah N. Gana, Shafi’i M. Abdulhamid, Joseph A. Ojeniyi
Статья научная
In this paper research was carried out in order to evaluate the security risk analysis and management in banking company through the use of a questionnaire to determine the level of risk that customer of the financial institution is likely to encounter. It was discovered that though the majority of financial institution users are familiar with the possible risk associated with some banking transaction, some aspect still exists that financial institution users are not familiar with which serves as a vulnerable point that could be exploited. The study makes a recommendation for proper enlightenment of financial institution users so as to stay abreast with possible security challenge associated with some banking transaction processes to be able to mitigate possible exploit.
Бесплатно
Selection of Database Management System with Fuzzy-AHP for Electronic Medical Record
M. Ebrahimi, M. Taheri
Статья научная
Database selection is one of the main problems in designing electronic medical record (EMR) Software, since there are many different data with different types and formats in it. This work provides an approach for selecting suitable database management system (DBMS) with fuzzy analytical hierarchical process that gives capabilities of requirements to electronic medical record software. Criteria are choose based upon capabilities of requirements including supporting from type of operating system and programming language, maximum of table size, indexing, replication and access control. In addition, alternatives are PostgreSQL, MySQL, Oracle, DB2 and Microsoft SQL Server. According to the application of fuzzy analytical hierarchical process a ranking is obtained to decision making the best database management system for electronic medical record software.
Бесплатно
Self-Healing Mechanism for Reliable Architecture with Focus on Failure Detection
Eslam Nazemi, Tahere Talebi, Hadi Elyasi
Статья научная
Many companies are embracing e-commerce, or business conducted on-line over electronically networks, as a means of expanding markets, improving customer service, reducing costs, and enhancing productivity. Like other companies, banks are taking steps to expand the use of computer science technology in their business operations. On the other hand, in recent years, the adoption of e-banking began to occur quite extensively as a channel of distribution for financial services due to rapid advances in IT and intensive competitive banking markets. For a bank that wants to remain in the competition, it's more important that each e-banking service have some features such as reliability, availability, extensibility. So we have represented a new e-banking framework which used a biology concept so called self-healing. In our framework, we presented some additional services respect to self-healing cycle for decrease the failure frequency and consequently increase services reliability.
Бесплатно
Sensing as a Service: Vision, Practices and Architecture
Maha Arooj, Muhammad Asif
Статья научная
The Internet of Things (IoT) is becoming pervasive and immersive due to the recent advancements in communication and sensing technologies. The proliferation of smart devices and their sensing capabilities has opened new opportunities and business models. The billions of connected sensing devices are generating enormous amount of data. The sensing as a service concept has the potential to provide a wide variety of services to citizens, companies and public administrations. This paper presents a sensing as service vision for IoT in different domains such as agriculture, waste management, supply chain, traffic management and others. Moreover, different applications of sensing as service model is analyzed and discussed in detail. In this paper, we specifically propose a service oriented sensing as service architecture to realize the vision of sensing as a service. The proposed service oriented architecture has the potential to address the challenges of heterogeneity, integration and interoperability of a sensing as service concept and can open new business opportunities.
Бесплатно
Sensing the Material Position in Construction Project
NIE Wen-hui, ZOU Zhi-wen, JU Shi-guang
Статья научная
In order to improve the monitoring and controlling performances in construction projects, especially in multi-story projects, This paper researched the approaches to track the materials and components on construction project. A locating model in 3 dimensional spaces is proposed. The mentioned locating algorithms are compared, and shortages and advantages of each are given. The purpose is to find an optimal solution to manage the location information in construction project site with lower costs, higher locating accuracy and ideal reliability.
Бесплатно
Sentence Clustering Using Parts-of-Speech
Richard Khoury
Статья научная
Clustering algorithms are used in many Natural Language Processing (NLP) tasks. They have proven to be popular and effective tools to use to discover groups of similar linguistic items. In this exploratory paper, we propose a new clustering algorithm to automatically cluster together similar sentences based on the sentences’ part-of-speech syntax. The algorithm generates and merges together the clusters using a syntactic similarity metric based on a hierarchical organization of the parts-of-speech. We demonstrate the features of this algorithm by implementing it in a question type classification system, in order to determine the positive or negative impact of different changes to the algorithm.
Бесплатно
Sentiment Analysis of Review Datasets Using Naïve Bayes' and K-NN Classifier
Lopamudra Dey, Sanjay Chakraborty, Anuraag Biswas, Beepa Bose, Sweta Tiwari
Статья научная
The advent of Web 2.0 has led to an increase in the amount of sentimental content available in the Web. Such content is often found in social media web sites in the form of movie or product reviews, user comments, testimonials, messages in discussion forums etc. Timely discovery of the sentimental or opinionated web content has a number of advantages, the most important of all being monetization. Understanding of the sentiments of human masses towards different entities and products enables better services for contextual advertisements, recommendation systems and analysis of market trends. The focus of our project is sentiment focussed web crawling framework to facilitate the quick discovery of sentimental contents of movie reviews and hotel reviews and analysis of the same. We use statistical methods to capture elements of subjective style and the sentence polarity. The paper elaborately discusses two supervised machine learning algorithms: K-Nearest Neighbour(K-NN) and Naïve Bayes' and compares their overall accuracy, precisions as well as recall values. It was seen that in case of movie reviews Naïve Bayes' gave far better results than K-NN but for hotel reviews these algorithms gave lesser, almost same accuracies.
Бесплатно
Shape Design of Lifting body Based on Genetic Algorithm
Yongyuan Li, Yi Jiang, Chunping Huang
Статья научная
This paper briefly introduces the concept and history of lifting body, and puts forward a new method for the optimization of lifting body. This method has drawn lessons from the die line design of airplane is used to parametric numerical modeling for the lifting body, and extract the characterization of shape parameters as design variables, a combination of lifting body reentry vehicle aerodynamic conditions, aerodynamic heating, volumetric Rate and the stability of performance. Multi-objective hybrid genetic algorithm is adopted to complete the aerodynamic shape optimization and design of hypersonic lifting body vehicle when under more variable and constrained condition in order to obtain the Pareto optimal solution of Common Aero Vehicle shape.
Бесплатно
Simulation and Optimization of VHDL code for FPGA-Based Design using Simulink
Naresh Grover, M.K.Soni
Статья научная
Simulations and prototyping have been a very important part of the electronics industry since a very long time. In recent years, FPGA's have become increasingly important and have found their way into all kind of digital system design This paper presents a novel, easy and efficient approach of implementation and verification of VHDL code using Simulink and then to regenerate the optimized VHDL code again using Simulink. The VHDL code written for the complicated digital design of 32-bit floating point arithmetic unit has been synthesized on Xilinx, verified and simulated on Simulink. The same VHDL code in Modelsim was optimized using this approach and the optimized code so generated by Simulinkhas also been synthesized to compare the results. Power dissipations for both synthesized designs using Xilinx Power Estimator were also extracted for comparison.
Бесплатно
Simulation of electric power plant performance using Excel®-VBA
Blessing O. Abisoye, Opeyemi A. Abisoye
Статья научная
This paper presents the failure and repair simulation for electric power house with N Turbo-alternator, where N may be up to 32. The program employs a pseudo-random number generator for individual power plant that can be described by exponential probability density functions. The resulting sequences of failure and repair events are then combined for the plants to give scenarios for different time horizons. The implementation in Excel®-VBA includes an appropriately designed userform containing the macro Active-X control for input of relevant information. The result shows that as the number of samples increased the behavior of the random events better represented the desired form with a correlation of almost 99% for 25 trials. This corresponds to a confidence interval of better than 95% and hence should be used as the median for practical applications. The results were tested and the distributions of the events were found to be close approximation of the target exponential distributions.
Бесплатно
Shiraz Afzal, Farrukh hafeez, Muhammad Ovais Akhter
Статья научная
This paper presents a customized application in term of LCD interfacing through soft-core microcontroller by implementing its control circuitry in FPGA. Therefore optimum efficiency is achieved. This provide the single chip solution by replacing conventional model which contain separate microcontroller circuit, therefore the efficient resource utilization of FPGA is made, day by day as an increase in the complexity of Embedded system design thus gives many advantages over conventional designed processors such as platform independence, less cost, flexibility and greater immunity to obsolescence.
Бесплатно
Software Module Clustering Using Hybrid Socio-Evolutionary Algorithms
Kawal Jeet, Renu Dhir
Статья научная
Design of the software system plays a crucial role in the effective and efficient maintenance of the software system. In the absence of original design structure it might be required to re-identify the design by using the source code of the concerned software. Software clustering is one of the powerful techniques which could be used to cluster large software systems into smaller manageable subsystems containing modules of similar features. This paper examines the use of novel evolutionary imperialist competitive algorithms, genetic algorithms and their combinations for software clustering. Apparently, recursive application of these algorithms result in the best performance in terms of quality of clusters, number of epochs required for convergence and standard deviation obtained by repeated application of these algorithms.
Бесплатно
Software Quality Appraisal Using Multi-Criteria Decision Approach
Sanjay Kumar Dubey, Disha Sharma
Статья научная
Software quality measurement is the key factor in the development of any software system. Various software quality models are devised to measure the performance of a software system, which consists of numerous quality parameters on the basis of which software are quantified. Different types of software quality models are already present like an ISO/IEC9126 Quality model, Boehm's model, McCall's model, etc. In this paper, an attempt has been made to increase the quality of a software system by introducing some new quality parameters in ISO/IEC9126 model. Since the quality parameters are very unpredictable in nature, so as to evaluate the performance of quality parameters, the fuzzy multi criteria approach has been used.
Бесплатно
Solving the Problem of Pre-Selection of Personnel Based on Fuzzy Sets
Nataliya Mutovkina, Zhongfeng Pan
Статья научная
The article proposes a method for clarifying the degree of correspondence between the request of a company looking for a specialist for a vacant position and the request of an applicant. As practice shows, the requirements in the requests of companies and the requests of applicants are linguistic, using vague boundaries of compliance parameters. Based on the results of a survey of graduate students and representatives of potential employer companies conducted by the author of the work, the company’s image, its experience in the market, and a decent salary are significant for graduates. For potential employers, applicants with some experience in the branch and low financial expectations are substantial first of all. Thus, from the statements of both sides, the author managed to identify two linguistic variables: “Time” and “Salary level.” These variables are applied to identify correlations between requests at the preliminary stage of staff selection. Indirect methods, namely methods of statistical data and expert assessments, were used in the variable membership functions. The algorithm for detecting matches is noticeably simple and can be in almost any table processor, which expands the field of the proposed approach. The recruitment agency acts as an intermediary in recruitment. The algorithm for identifying compliance in its activities will significantly reduce recruiters’ time and labor costs.
Бесплатно
Some Results on Optimal Dividend Problem in Two Risk Models
Shuaiqi Zhang
Статья научная
The compound Poisson risk model and the compound Poisson risk model perturbed by diffusion are considered in the presence of a dividend barrier with solvency constraints. Moreover, it extends the known result due to [1]. Ref. [1] finds the optimal dividend policy is of a barrier type for a jump-diffusion model with exponentially distributed jumps. In this paper, it turns out that there can be two different solutions depending on the model’s parameters. Furthermore, an interesting result is given: the proportional transaction cost has no effect on the dividend barrier. The objective of the corporation is to maximize the cumulative expected discounted dividends payout with solvency constraints before the time of ruin. It is well known that under some reasonable assumptions, optimal dividend strategy is a barrier strategy, i.e., there is a level b_{1}(b_{2}) so that whenever surplus goes above the level b_{1}(b_{2}), the excess is paid out as dividends. However, the optimal level b_{1}(b_{2}) may be unacceptably low from a solvency point of view. Therefore, some constraints should imposed on an insurance company such as to pay out dividends unless the surplus has reached a level b^{1}_{c}>b_{1}(b^2_{c}>b_{2}) . We show that in this case a barrier strategy at b^{1}_{c}(b^2_{c}) is optimal.
Бесплатно
- О проекте
- Правообладателям
- Правила пользования
- Контакты
- Разработчик: ООО "Технологии мобильного чтения"
Государственная аккредитация IT: АО-20230321-12352390637-3 | Минцифры России - 2024 © SciUp.org — Платформа публикаций в области науки, технологий, медицины, образования и литературы. "SciUp" — зарегистрированный товарный знак. Все права защищены.