It is pointed out that the healthcare industry faces big problems when it comes to keeping private patient data safe in software-defined networks (SDNs). Healthcare apps need to have strong security measures because o...
详细信息
software project management (SPM) is an important process in the software development (SD) industry, that involves the planning, organizing, and overseeing software application development. Kanban agile (KA) methodolo...
详细信息
Poor software quality can lead to crashes, failures or downtime, the consequences of which may be lost profits, financial costs, leakage or loss of data, accidents, human casualties, material losses or environmental d...
详细信息
In today's world almost all organizations heavily depend on Web-based systems or web applications for their day-to-day operations. In this paper, we will present zoned role-based (ZRB) approach to the design and i...
详细信息
ISBN:
(纸本)9783031752001;9783031752018
In today's world almost all organizations heavily depend on Web-based systems or web applications for their day-to-day operations. In this paper, we will present zoned role-based (ZRB) approach to the design and implementation of integrated web-based systems for organizations and enterprises. In contrast to Role-Based Access Control (RBAC), well-known in computer security, this approach can be used throughout the entire life cycle of a web-based system, and can make the design, implementation, deployment and maintenance of integrated web system more efficient and effective for all organizations and enterprises. In this approach, areas of business, or divisions, departments or designated groups of employees for specific missions are called zones, and for each zone a set of roles are defined;for each role, some web apps, each of which consists of a set of operations, are designed and implemented for users in their respective roles to conduct their business in each associated zone;and control of user access to each operation can then be done explicitly by associating each operation with roles by inference based on the relationships between roles. Within such a zoned role-based integrated system, once a user has roles assigned in each zone he or she is affiliated, he will be able to access, precisely, all the apps and operations needed to fulfill his or her role or roles in respective zone, with only one authentication. Such integration is rather important and convenient especially when users may be affiliated with multiple zones or play multiple roles.
The hot topic in the field of artificial intelligence is the production of intelligent products based on knowledge graphs as effective method for building applications of explainable Artificial Intelligence (XAI). The...
详细信息
MultiLevel software Modeling (MLM) views complex domains as a classification system, created by monotonically growing abstraction of a domain. A multilevel model consists of levels which are structures of modeling ele...
详细信息
ISBN:
(纸本)9798350324983
MultiLevel software Modeling (MLM) views complex domains as a classification system, created by monotonically growing abstraction of a domain. A multilevel model consists of levels which are structures of modeling elements that are inter-related and possibly constrained. Elements in different levels can be inter-related by an instantiation relation, that defines an element of a lower level as an instance-of an element of a higher level. The instance-of relation assigns a dual role to an instance class: In addition to its role as a class - its class facet, it also functions as an object of its owner class - its object facet. Such classes are termed clabjects. This position paper raises the issue of typing the class facet of clabjects and its relationship to the types of the dual object facet. The approaches of four MLM systems are summarized. The paper points out the crucial impact of clabject typing on computation with MLM-driven systems.
The publication of scientific results together with the underlying experiments is an important source of further research. In 2016, the "FAIR Guiding Principles for scientific data management and stewardship"...
详细信息
Semi active rectifiers (SAR) have proven to be a solid middle ground in terms of performance, when compared to standard full bridge diode rectifiers and active rectifiers (AR), in matters of system complexity and effi...
详细信息
ISBN:
(纸本)9798350318272;9798350318265
Semi active rectifiers (SAR) have proven to be a solid middle ground in terms of performance, when compared to standard full bridge diode rectifiers and active rectifiers (AR), in matters of system complexity and efficiency. Phase shift control is often applied to these systems in cases when output regulation and or/load matching is required. This paper analyzes non-ideal SAR, considering voltage transients caused by parasitic capacitance of the lower leg transistors, in order to derive the maximum shift angle for which correct system operation is maintained. The analytical results are then solidified by a numerical example simulated in PSIM software.
The rapidly growing technology specially in the field of software, Machine Learning (ML) has played an important role in a range of tasks, including voice, video, and computer vision. It is currently being utilised in...
详细信息
In the current landscape, security challenges extend to various domains, such as IoT networking, UAV communication, and VANETs, rendering underlying infrastructures increasingly susceptible to cyber-attacks. The taxon...
详细信息
暂无评论