CompSciRN: Software Network (Topic)最新文献

筛选
英文 中文
Network Self-Exciting Point Processes To Measure Health Impacts of COVID-19 测量COVID-19对健康影响的网络自激点过程
CompSciRN: Software Network (Topic) Pub Date : 2021-07-25 DOI: 10.2139/ssrn.3892998
Paolo Giudici, Paolo Pagnottoni, A. Spelta
{"title":"Network Self-Exciting Point Processes To Measure Health Impacts of COVID-19","authors":"Paolo Giudici, Paolo Pagnottoni, A. Spelta","doi":"10.2139/ssrn.3892998","DOIUrl":"https://doi.org/10.2139/ssrn.3892998","url":null,"abstract":"\u0000 The assessment of the health impacts of the COVID-19 pandemic requires the consideration of mobility networks. To this aim, we propose to augment spatio-temporal point process models with mobility network covariates. We show how the resulting model can be employed to predict contagion patterns and to help in important decisions such as the distribution of vaccines. The application of the proposed methodology to 27 European countries shows that human mobility, along with vaccine doses and government policies, are significant predictors of the number of new COVID-19 reported infections and are therefore key variables for decision-making.","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121455180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Rambience: Restaurant Management Design for Stakeholder Dynamics Rambience:利益相关者动态的餐厅管理设计
CompSciRN: Software Network (Topic) Pub Date : 2021-05-01 DOI: 10.2139/ssrn.3852683
Ioli Delivani
{"title":"Rambience: Restaurant Management Design for Stakeholder Dynamics","authors":"Ioli Delivani","doi":"10.2139/ssrn.3852683","DOIUrl":"https://doi.org/10.2139/ssrn.3852683","url":null,"abstract":"Why do people go to restaurants? And, why do people go to restaurants again? These were fundamental questions that had to be answered in order to be able to even start thinking about how to build a Restaurant Management Software/System called Rambience. This paper focuses on the process a software company had to follow in order to plan, design and finally create a booking and restaurant management software. Moreover, the paper examines the outcome of this project and the conclusions that were reached once it was concluded.","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124212687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Learning Technique for Web Phishing Detection Combined URL Features and Visual Similarity 一种结合URL特征和视觉相似性的网络钓鱼检测深度学习技术
CompSciRN: Software Network (Topic) Pub Date : 2020-09-30 DOI: 10.5121/ijcnc.2020.12503
Saad Al-Ahmadi, Yasser Alharbi
{"title":"A Deep Learning Technique for Web Phishing Detection Combined URL Features and Visual Similarity","authors":"Saad Al-Ahmadi, Yasser Alharbi","doi":"10.5121/ijcnc.2020.12503","DOIUrl":"https://doi.org/10.5121/ijcnc.2020.12503","url":null,"abstract":"The most popular way to deceive online users nowadays is phishing. Consequently, to increase cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper, we propose an approach that rely on websites image and URL to deals with the issue of phishing website recognition as a classification challenge. Our model uses webpage URLs and images to detect a phishing attack using convolution neural networks (CNNs) to extract the most important features of website images and URLs and then classifies them into benign and phishing pages. The accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the proposed model in detecting a web phishing attack.","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114173725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Study on Layered Security Threats and Counter-Measures in Internet of Things: International Conference on Recent Trends in Artificial Intelligence, IOT, Smart Cities & Applications (ICAISC-2020) 物联网分层安全威胁与对策研究:人工智能、物联网、智慧城市与应用最新趋势国际会议(ICAISC-2020)
CompSciRN: Software Network (Topic) Pub Date : 2020-05-26 DOI: 10.2139/ssrn.3611310
Mangaldeep Singh, M. Kumari, Manish Deogam, Lovely Gupta, Lakhan Behra, Kumari Manisha Bharti, Subashis Karmakar
{"title":"A Study on Layered Security Threats and Counter-Measures in Internet of Things: International Conference on Recent Trends in Artificial Intelligence, IOT, Smart Cities & Applications (ICAISC-2020)","authors":"Mangaldeep Singh, M. Kumari, Manish Deogam, Lovely Gupta, Lakhan Behra, Kumari Manisha Bharti, Subashis Karmakar","doi":"10.2139/ssrn.3611310","DOIUrl":"https://doi.org/10.2139/ssrn.3611310","url":null,"abstract":"Recently IoT is an emerging technology in all aspect of social and economical growth including research and technology. Starting from smart city to smart home, from industry monitoring to product evolution, from smart watch to smart health monitoring system, there are enormous aspect where IoT make a significant. But it is not possible to ensure that any system is fully safe and free from vulnerabilities. These vulnerabilities are used by attackers to access into devices and use them for malicious practice that can harm to serious extent. This review paper focuses on strategy adopted and scenarios in how many ways can IoT be attacked. Threats can be related to hardware devices, access level, software etc. This study mainly objected to layer wise security threat alone with possible counter measure and further scope of research.","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114656970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Barter Machine: Defier of the Money 物物交换机器:金钱的反对者
CompSciRN: Software Network (Topic) Pub Date : 2019-05-06 DOI: 10.2139/ssrn.3508636
C. Özturan
{"title":"Barter Machine: Defier of the Money","authors":"C. Özturan","doi":"10.2139/ssrn.3508636","DOIUrl":"https://doi.org/10.2139/ssrn.3508636","url":null,"abstract":"Direct bartering allows us to do trading of assets with or without the use of money. We contribute a smart contract written in Solidity language for the Ethereum blockchain that implements a distributed and autonomous direct barter exchange operated by crowds. Since ERC20 smart contract tokens are widely used for initial coin offerings (ICOs), our implementation provides autonomous bartering services for ERC20 tokens. Non-fungible ERC721 token as well as Ethereum Name Service (ENS) name bartering are also supported. Finding feasible bartering solution for bids involving multiple tokens is NP-hard in general. Our exchange just provides escrow and swapping services. It assumes feasible solutions are submit ted by bartering problem solvers from the crowd who run a solver locally on their machines. Bartering problem solvers are incentivized for submitting solutions to the autonomous exchange by awarding them with excess tokens that are left over after granting the bidders the tokens they requested in their bids. Our system, called BarterMachine, can perhaps be used to facilitate a global barter economy. BarterMachine prototype is available for testing on the Ethereum Ropsten network.","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128603934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of VoIP QoS parameters using WiFi-UMTS Networks 基于WiFi-UMTS网络的VoIP QoS参数性能评估
CompSciRN: Software Network (Topic) Pub Date : 2015-05-22 DOI: 10.1007/978-94-017-9804-4_38
Mahdi H. Miraz, Muzafar A. Ganie, Maaruf Ali, Suhail A. Molvi, A. Hussein
{"title":"Performance Evaluation of VoIP QoS parameters using WiFi-UMTS Networks","authors":"Mahdi H. Miraz, Muzafar A. Ganie, Maaruf Ali, Suhail A. Molvi, A. Hussein","doi":"10.1007/978-94-017-9804-4_38","DOIUrl":"https://doi.org/10.1007/978-94-017-9804-4_38","url":null,"abstract":"","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130550924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Wireless Grid and Intruder Detection Server 无线网格和入侵者检测服务器
CompSciRN: Software Network (Topic) Pub Date : 2013-09-01 DOI: 10.2139/ssrn.3493139
Shrawan Kumar, A. Srivastava
{"title":"Wireless Grid and Intruder Detection Server","authors":"Shrawan Kumar, A. Srivastava","doi":"10.2139/ssrn.3493139","DOIUrl":"https://doi.org/10.2139/ssrn.3493139","url":null,"abstract":"Wireless Grid is an emerging communication and resource sharing architecture in recent years. It is getting more and more researches and application in mission, industry, business, science research. Wireless grid technique is developing and improving, especially with the storage capacity rising. Storage resource can be managed by wireless grid and ensure the grid availability and reliability by replica, cache prefetch and buffer. Extracting information or discovering knowledge from wireless or mobile grids has become increasingly important issue. Many researches in grid environment only consider data mining time. Other constraints, such as energy consumption and immediate bandwidth that are more important in mobile computing, will physically affect the performance and system availability. If Grid system is integrated with the wireless network devices, Grid applications will soon be popularly and widely deployed in different domains to serve many more people in the world. Wireless Grid-based mobile agent system (WGMAS) which integrates mobile agent techniques and wireless environment with a Grid system, to provide a wireless accessible mobile agent system to users. An Intruder is a person who attempts to gain unauthorized access to a system, to damage that system, or to disturb data on that system. In summary, this person attempts to violate Security by interfering with system Availability, data Integrity or data Confidentiality. The goal of an Intrusion Detection System (IDS) is to \"identify, preferably in real time, unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrates\". An IDS is used as an alternative (or a complement) to building a shield around the network. The shielding approaches deficient in several ways, including failure to prevent attacks from insiders","PeriodicalId":198578,"journal":{"name":"CompSciRN: Software Network (Topic)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130860462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信