{"title":"Network Self-Exciting Point Processes To Measure Health Impacts of COVID-19","authors":"Paolo Giudici, Paolo Pagnottoni, A. Spelta","doi":"10.2139/ssrn.3892998","DOIUrl":"https://doi.org/10.2139/ssrn.3892998","url":null,"abstract":"\u0000 The assessment of the health impacts of the COVID-19 pandemic requires the consideration of mobility networks. To this aim, we propose to augment spatio-temporal point process models with mobility network covariates. We show how the resulting model can be employed to predict contagion patterns and to help in important decisions such as the distribution of vaccines. The application of the proposed methodology to 27 European countries shows that human mobility, along with vaccine doses and government policies, are significant predictors of the number of new COVID-19 reported infections and are therefore key variables for decision-making.","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121455180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rambience: Restaurant Management Design for Stakeholder Dynamics","authors":"Ioli Delivani","doi":"10.2139/ssrn.3852683","DOIUrl":"https://doi.org/10.2139/ssrn.3852683","url":null,"abstract":"Why do people go to restaurants? And, why do people go to restaurants again? These were fundamental questions that had to be answered in order to be able to even start thinking about how to build a Restaurant Management Software/System called Rambience. This paper focuses on the process a software company had to follow in order to plan, design and finally create a booking and restaurant management software. Moreover, the paper examines the outcome of this project and the conclusions that were reached once it was concluded.","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124212687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deep Learning Technique for Web Phishing Detection Combined URL Features and Visual Similarity","authors":"Saad Al-Ahmadi, Yasser Alharbi","doi":"10.5121/ijcnc.2020.12503","DOIUrl":"https://doi.org/10.5121/ijcnc.2020.12503","url":null,"abstract":"The most popular way to deceive online users nowadays is phishing. Consequently, to increase cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper, we propose an approach that rely on websites image and URL to deals with the issue of phishing website recognition as a classification challenge. Our model uses webpage URLs and images to detect a phishing attack using convolution neural networks (CNNs) to extract the most important features of website images and URLs and then classifies them into benign and phishing pages. The accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the proposed model in detecting a web phishing attack.","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114173725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Layered Security Threats and Counter-Measures in Internet of Things: International Conference on Recent Trends in Artificial Intelligence, IOT, Smart Cities & Applications (ICAISC-2020)","authors":"Mangaldeep Singh, M. Kumari, Manish Deogam, Lovely Gupta, Lakhan Behra, Kumari Manisha Bharti, Subashis Karmakar","doi":"10.2139/ssrn.3611310","DOIUrl":"https://doi.org/10.2139/ssrn.3611310","url":null,"abstract":"Recently IoT is an emerging technology in all aspect of social and economical growth including research and technology. Starting from smart city to smart home, from industry monitoring to product evolution, from smart watch to smart health monitoring system, there are enormous aspect where IoT make a significant. But it is not possible to ensure that any system is fully safe and free from vulnerabilities. These vulnerabilities are used by attackers to access into devices and use them for malicious practice that can harm to serious extent. This review paper focuses on strategy adopted and scenarios in how many ways can IoT be attacked. Threats can be related to hardware devices, access level, software etc. This study mainly objected to layer wise security threat alone with possible counter measure and further scope of research.","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114656970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Barter Machine: Defier of the Money","authors":"C. Özturan","doi":"10.2139/ssrn.3508636","DOIUrl":"https://doi.org/10.2139/ssrn.3508636","url":null,"abstract":"Direct bartering allows us to do trading of assets with or without the use of money. We contribute a smart contract written in Solidity language for the Ethereum blockchain that implements a distributed and autonomous direct barter exchange operated by crowds. Since ERC20 smart contract tokens are widely used for initial coin offerings (ICOs), our implementation provides autonomous bartering services for ERC20 tokens. Non-fungible ERC721 token as well as Ethereum Name Service (ENS) name bartering are also supported. Finding feasible bartering solution for bids involving multiple tokens is NP-hard in general. Our exchange just provides escrow and swapping services. It assumes feasible solutions are submit ted by bartering problem solvers from the crowd who run a solver locally on their machines. Bartering problem solvers are incentivized for submitting solutions to the autonomous exchange by awarding them with excess tokens that are left over after granting the bidders the tokens they requested in their bids. Our system, called BarterMachine, can perhaps be used to facilitate a global barter economy. BarterMachine prototype is available for testing on the Ethereum Ropsten network.","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128603934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahdi H. Miraz, Muzafar A. Ganie, Maaruf Ali, Suhail A. Molvi, A. Hussein
{"title":"Performance Evaluation of VoIP QoS parameters using WiFi-UMTS Networks","authors":"Mahdi H. Miraz, Muzafar A. Ganie, Maaruf Ali, Suhail A. Molvi, A. Hussein","doi":"10.1007/978-94-017-9804-4_38","DOIUrl":"https://doi.org/10.1007/978-94-017-9804-4_38","url":null,"abstract":"","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130550924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Grid and Intruder Detection Server","authors":"Shrawan Kumar, A. Srivastava","doi":"10.2139/ssrn.3493139","DOIUrl":"https://doi.org/10.2139/ssrn.3493139","url":null,"abstract":"Wireless Grid is an emerging communication and resource sharing architecture in recent years. It is getting more and more researches and application in mission, industry, business, science research. Wireless grid technique is developing and improving, especially with the storage capacity rising. Storage resource can be managed by wireless grid and ensure the grid availability and reliability by replica, cache prefetch and buffer. Extracting information or discovering knowledge from wireless or mobile grids has become increasingly important issue. Many researches in grid environment only consider data mining time. Other constraints, such as energy consumption and immediate bandwidth that are more important in mobile computing, will physically affect the performance and system availability. If Grid system is integrated with the wireless network devices, Grid applications will soon be popularly and widely deployed in different domains to serve many more people in the world. Wireless Grid-based mobile agent system (WGMAS) which integrates mobile agent techniques and wireless environment with a Grid system, to provide a wireless accessible mobile agent system to users. An Intruder is a person who attempts to gain unauthorized access to a system, to damage that system, or to disturb data on that system. In summary, this person attempts to violate Security by interfering with system Availability, data Integrity or data Confidentiality. The goal of an Intrusion Detection System (IDS) is to \"identify, preferably in real time, unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrates\". An IDS is used as an alternative (or a complement) to building a shield around the network. The shielding approaches deficient in several ways, including failure to prevent attacks from insiders","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130860462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}