The Internet of Things (IoT) has greatly increased the possibility for developing intelligent connections and applications in many facets of daily life. Traditional security solutions frequently fail to solve security...
详细信息
As we know in today’s modern software engineering, use case diagrams for representing the functionalities of the system act significantly in mediating the gap between the stakeholder and the developer. Some of the ea...
详细信息
As we know in today’s modern software engineering, use case diagrams for representing the functionalities of the system act significantly in mediating the gap between the stakeholder and the developer. Some of the earlier techniques used in constructing such diagrams can be problematic when these diagrams are to be employed in large systems where there are many actors and activities. That is why every limitation outlined above might be resolved further with the help of NLP and developments in graphs theory. The proposed method makes improvements by reducing the human interference; it can handle increase in system size and the number of actors and their interactions; it also provides highly accurate shortest-path identification through use of validation methods. In addition, shortest-path algorithms are incorporated to improve the validation exercise, thereby minimizing errors common in presenting the system functionalities. Hence, the results indicate that the proposed method is more effective not only for generating use case diagrams with increased precision and scalability but also for constructing the necessary framework for checking system interactions’ correctness. This work provides a foundation for future studies aimed at enhancing the automation of the use case diagram especially for complex systems.
Cloud computing is a modern way for many businesses to offer computing tools and services that have transformed their business at a low cost. But the main concern is protection and privacy in cloud computing using a s...
详细信息
This paper studies quasi-Newton methods for solving nonlinear equations. We propose block variants of both good and bad Broyden's methods, which enjoy explicit local superlinear convergence rates. Our block good B...
详细信息
Background: The objective of this work is to analyze and predict the harmfulness in traffic accidents. Method: Several Random Forest statistical models are created, in which the predictable variable (response/ output ...
详细信息
The Interconnection via Internet is ubiquitous and it is significant to everyone's lives in the area of safety. Forest fires are a result of human intervention, lightning, and global warming and have an impact on ...
详细信息
FinTech is the term used to refer to financial and technology convergence space solutions. It usually refers to new innovations that conduct or connect with financial services via the internet, smart devices, software...
FinTech is the term used to refer to financial and technology convergence space solutions. It usually refers to new innovations that conduct or connect with financial services via the internet, smart devices, software applications, or cloud services and encompasses anything from mobile banking to cryptocurrency applications. Despite the advantages of FinTech, cybercriminals seized the opportunity to exploit vulnerabilities in FinTech systems. Phishing attacks, ransomware, and data breaches have become more prevalent, targeting individuals and FinTech institutions. Bahrain, which is not different from the rest of the world, was impacted by such cyber threats. Thus, FinTech companies have had to strengthen their cybersecurity countermeasures and protocols to combat these threats. Existing countermeasures in the literature primarily focus on general cybersecurity practices and frameworks, with limited attention given to the specific needs of the FinTech industry. Hence, there is a notable gap in the literature regarding a focused cybersecurity framework that caters to the unique requirements of FinTech innovations, especially in Bahrain. To bridge this gap, this research addresses the problem by conducting an extensive review of existing cybersecurity challenges, common practices, and cybersecurity standards and through in-depth research interviews with executives, experts, and other FinTech business stakeholders. Leveraging this knowledge, this research proposed an adaptable framework that addresses the risks and vulnerabilities faced by FinTech innovations in Bahrain. Through panel discussions and Delphi sessions, industry experts evaluated the framework’s practical feasibility, ability to address specific risks, and compatibility with the existing FinTech regulatory landscape. The results demonstrate a high acceptance of the developed framework and highlight the framework’s potential to enhance cybersecurity resilience significantly. Moreover, the exp
Abstract: This paper introduces an innovative approach to evaluate the classification performance of parameters derived from diverse spectral and nonlinear investigation methods in the analysis of cardiac heart diseas...
详细信息
ISBN:
(纸本)9798400709418
Abstract: This paper introduces an innovative approach to evaluate the classification performance of parameters derived from diverse spectral and nonlinear investigation methods in the analysis of cardiac heart disease using ranking techniques. The objective of this study is to identify the most suitable methods for application in a clinical setting. Ranking methods are employed to assign ranks to features extracted from heart rate variability (HRV) data by spectral and chaos investigation methods, organizing them based on their clinical significance. Initially, 30 and 10 different features are extracted from HRV time-series signals using popular HRV analysis methods, including spectral and nonlinear investigation techniques. Among these, 5 spectral features are derived from the auto-regression (AR) model, 15 from multiscale Wavelet packet (MSWP) decomposition, and 10 from higher-order spectra (HOS). The top ten features from each method are selected and ranked using Fisher score, Wilcoxon, receiver operating characteristics (ROC), entropy, and Bhattacharya space methods. Numerical results demonstrate that features at the third level of MSWP decomposition exhibit the lowest p-value (<<0.0001). Given that features with the lowest p-value possess the highest discrimination ability, the third-level MSWP features outperform other features extracted by AR and HOS spectral methods in HRV dataset analysis. Furthermore, features such as CD, DFA:α₂, ApEn, SaEn, and SD1/SD2, derived from chaos investigation methods, consistently display the lowest p-values compared to all considered features. Consequently, these features are identified as optimal choices for HRV analysis of datasets.
This study investigates the design and execution of an automated attendance tracking system using facial recognition CCTV based . Facial recognition technology and CCTV cameras are integrated in this system to provide...
详细信息
ISBN:
(数字)9798331529833
ISBN:
(纸本)9798331529840
This study investigates the design and execution of an automated attendance tracking system using facial recognition CCTV based . Facial recognition technology and CCTV cameras are integrated in this system to provide a seamless, frictionless way to track and record attendance in real time. In addition to boosting attendance record accuracy, the approach reduces the administrative burden associated with using traditional methods. The suggested system is designed to recognise people when they enter or leave a monitored area by leveraging developments in computer vision. It accomplishes this automatically and requires no interaction from humans. Furthermore, the system's use of the Internet of Things makes it flexible and scalable to a variety of business situations, including offices, schools, and large-scale events. This is made feasible via real-time data synchronising and reporting.
Vascular Dementia (VD) is a form of cognitive impairment seen in individuals, restricting from problems with blood vessels supplying the brain. These issues lead to strokes or reduced blood flow and gradually lead to ...
详细信息
暂无评论