Strong linearizability is a variant of linearizability and is more suitable for verification. In this paper we investigate the following two problems: (1) for which deterministic sequential specifications there e...
This research aims to aid public service organizations in selecting effective multi-modal authentication technology to mitigate authentication risks and facilitate informed decision-making, preventing financial burden...
详细信息
ISBN:
(数字)9798350387902
ISBN:
(纸本)9798350387919
This research aims to aid public service organizations in selecting effective multi-modal authentication technology to mitigate authentication risks and facilitate informed decision-making, preventing financial burdens associated with unsuccessful system implementations. It has become a financial burden for organisations to deploy inappropriate technology in an environment that ultimately goes unused and may lead to unsuccessful system implementations. Different biometric attributes, characteristics, qualities, and criteria - the environment (organisation), budget and business requirements, specifications, design, system performance, the information technology infrastructure, operations, and post-deployment functions - must be compared. The research methodology also encompasses the execution of a survey, concomitant with factor analysis, which serves as the cornerstone for assessing the model. The model evaluation survey, conducted with participants aged 18 to 55, garnered a response rate of 99.4% from respondents who positively consented to participate in the study. In order to analyse and evaluate the proposed model, this research incorporates a spectrum of intricate statistical techniques, including descriptive statistics, factor analysis, chi-square for goodness of fit, Mardia's coefficient, multivariate kurtosis, and path model analysis. This study contributes to the body of knowledge by studying the human factors that impact public awareness, perception, and the usability of multi-modal biometrics. The formalised model proposed in the study will be of value to the public services environment that may need to deploy multi-modal biometric authentication technologies to minimise future failed deployments.
This paper will aim to conduct 3 experiments to determine the best-performing action recognition approach on the SpaceJam dataset. The 3 experiments are Temporal Segment Network (TSN), Inflated 3D-CNN (I3D) and Pose-e...
详细信息
Blockchain, as an emerging transaction processing system, suffers from low throughput and high latency. Sharded blockchains can significantly increase throughput by dividing nodes into groups (i.e., shards) to process...
详细信息
In today's digital world, information security, and person In today's digital world, information security, and personal authentication are major concerns. As technology has advanced, so have the methods used t...
详细信息
Biometric selection is an increasingly popular security measure used in public services due to its potential to improve security and privacy, reduce fraud and improve service delivery in governments. Selecting the app...
详细信息
This paper presents a framework for parallel intelligent education that involves physical and virtual learning for a personalized learning *** especially focus on Chat Generative Pre-trained Transformer(ChatGPT)owing ...
详细信息
This paper presents a framework for parallel intelligent education that involves physical and virtual learning for a personalized learning *** especially focus on Chat Generative Pre-trained Transformer(ChatGPT)owing to its considerable potential to supplement regular class *** address the strengths and weaknesses of learning with ***,we discuss the challenges and solutions of the proposed parallel intelligent education with ChatGPT.
In the digital age, the security of sensitive information and data has become a paramount concern. The modern conventional encryption algorithms are very efficient, but they are very complex and need a lot of resource...
详细信息
Modeling stochastic multi-ship trajectories is vital for maritime safety and interaction efficiency. Recent researches show that diffusion models excel in trajectory prediction, surpassing GANs and VAEs in generation ...
详细信息
Risk management and optimised security control selection in information technology, particularly information security, is crucial for identifying and mitigating organisational threats. Information security control sel...
详细信息
ISBN:
(数字)9798350355468
ISBN:
(纸本)9798350355475
Risk management and optimised security control selection in information technology, particularly information security, is crucial for identifying and mitigating organisational threats. Information security control selection and planning are challenging due to limited resources such as funding, time and staffing. This research article is an academic exposition in which a quantitative method of evaluating cyber security risk and utilizing principles of Modern Portfolio Theory (MPT) to optimize the allocation of resources and funding to select security controls to mitigate an organization's specific security risk and in addition reduce and organisations attack surface as the identified Return on Investment (ROI). This article details and illustrates a novel model that uses quantitative risk evaluation methods such as Monte Carlo simulations as opposed to the widely used qualitative methods in the aim to provide organisations with empirical data to make informed decisions, using Modern Portfolio Theory (MPT), when selecting and managing a portfolio of security controls such as Anti-DDOS solutions, Endpoint Detection and Response (EDR) and Cloud Access Security Broker (CASB) solutions.
暂无评论