Anomaly detection is the identification of instances that substantially deviate from the majority of the data and do not conform to a well-defined normal behavior. Investigating time series anomalies has become increa...
详细信息
This paper forecasts the microeconomic level household expenditures using a novel hybrid deep learning approach. In terms of research significance, household finance control has a major influence on the finance system...
详细信息
Mobile payment systems have become an infrastructural component in citizens' socio-economic life in China. The rapid shift to a cashless society demands vendors of all ages to quickly adapt themselves to the ubiqu...
详细信息
Mobile payment systems have become an infrastructural component in citizens' socio-economic life in China. The rapid shift to a cashless society demands vendors of all ages to quickly adapt themselves to the ubiquitous mobile payment era. However, how this trend may impact senior vendors, a group that typically uses less technology, remains unknown despite its significance in inclusive mobile payment design. This work aims to address this gap by investigating the challenges and strategies of senior vendors in mobile payment adoption. Particularly, we focus on a traditional low-resource setting with a large volume of senior vendors: street vending. We conduct a qualitative study incorporating field observations on 33 senior street vendors and semi-structured interviews with 15 of them (aged 53-78), and take Moneywork as an analytical lens to unpack their challenges in physical and social interactions. We find that senior street vendors are a group passively adopting mobile payments due to business requirements instead of recognizing their advantages. Vendors with relatively low digital literacy have to take an alternative method - using family members' QR codes - to run the business as family-dependent money receivers. With limited considerations for senior vendors' situational vulnerabilities, unexpected difficulties of payment confirmation emerge during transactions, such as reduced confirmation efficacy under noisy surroundings and degraded hearing. Transaction security issues also appear when mobile payment-based frauds target both confirmation interfaces (e.g., fake sounds of successful payment) and trust systems (e.g., showing half-done proof to flee without paying) in street vending. Finally, we raise a less visible yet critical concern of family-dependent vendors on the lost money freedom when their income flows into their families' wallets. We propose design implications for mobile payment systems to support more secure, efficient and accessible money collec
Chili is a plant that originates from America and is included in the Solonaceae and Capsicum genera. One type of chili that is included in the large chili category is Katokkon chili, commonly referred to as Toraja chi...
详细信息
This paper presents NDAS (Noise-Decomposed Abnormal Segmentation), an innovative framework for robust medical image retrieval and segmentation. By explicitly decomposing noise and abnormal features, NDAS enhances retr...
详细信息
A high-stakes event is an extreme risk with a low probability of occurring, but severe consequences (e.g., life-threatening conditions or economic collapse). The accompanying lack of information is a source of high-st...
详细信息
Diabetes is one of the fastest-growing human diseases worldwide and poses a significant threat to the population’s longer *** prediction of diabetes is crucial to taking precautionary steps to avoid or delay its *** ...
详细信息
Diabetes is one of the fastest-growing human diseases worldwide and poses a significant threat to the population’s longer *** prediction of diabetes is crucial to taking precautionary steps to avoid or delay its *** this study,we proposed a Deep Dense Layer Neural Network(DDLNN)for diabetes prediction using a dataset with 768 instances and nine *** also applied a combination of classical machine learning(ML)algorithms and ensemble learning algorithms for the effective prediction of the *** classical ML algorithms used were Support Vector Machine(SVM),Logistic Regression(LR),Decision Tree(DT),K-Nearest Neighbor(KNN),and Naïve Bayes(NB).We also constructed ensemble models such as bagging(Random Forest)and boosting like AdaBoost and Extreme Gradient Boosting(XGBoost)to evaluate the performance of prediction *** proposed DDLNN model and ensemble learning models were trained and tested using hyperparameter tuning and K-Fold cross-validation to determine the best parameters for predicting the *** combined ML models used majority voting to select the best outcomes among the *** efficacy of the proposed and other models was evaluated for effective diabetes *** investigation concluded that the proposed model,after hyperparameter tuning,outperformed other learning models with an accuracy of 84.42%,a precision of 85.12%,a recall rate of 65.40%,and a specificity of 94.11%.
Cybersecurity is one of the most critical sectors of information systems and is considered a strategic priority for many Organizations. Information security investments are a crucial aspect of cybersecurity. However, ...
详细信息
ISBN:
(纸本)9781917204194
Cybersecurity is one of the most critical sectors of information systems and is considered a strategic priority for many Organizations. Information security investments are a crucial aspect of cybersecurity. However, it often happens that the economic decisions, which aim to improve information security, have poor efficiency. One reason is the lack of background on economics of the Chief Information Security Officers who are often not familiar with the evaluation of the non-technical aspects of security, e.g. economics. The other reason is the cultural gap between the different persons related to business management and administration. In this paper we present an interactive - simulation software designed to familiarize the aforementioned persons with information security investments. The software is actually a game that aims to boost learning for all the stakeholders who are involved in the investment process. Α better understanding of the processes, the technical, economic and human factors, along with the cultural convergence of the stakeholders will help boost the efficiency of investments. Design Science is used as the research method. The creative method, a brainstorming technique, is combined with the five steps of Design Science, i.e. explicate the problem, define the requirements, design and develop the artefact, demonstrate the artefact, and evaluate the artefact, to develop a process framework that will be able to cope with this problem. The artefact is an interactive-simulation platform in which a person could take the decision maker role and (a) deal with events that happen and (b) investigate different aspects of information security investment complexity. The evaluation of the artefact is made with a case study in the Industry, where real world data are used to feed the simulation and real-world decision makers play the game in order to better understand the different aspects of the problem and help us trim and enhance the functioning of the platform.
Diabetic Retinopathy (DR) is a primary cause of blindness, necessitating early detection and diagnosis. This paper focuses on referable DR classification to enhance the applicability of the proposed method in clinical...
详细信息
Non-Volatile Memory Express (NVMe) over TCP is an efficient technology for accessing remote Solid State Drives (SSDs);however, it may cause a serious interference issue when used in a containerized environment. In thi...
详细信息
暂无评论