Journal of Independent Studies and Research Computing最新文献

筛选
英文 中文
Test Case Design Of Security Threats Through State Machine OCL 基于状态机OCL的安全威胁测试用例设计
Journal of Independent Studies and Research Computing Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.9
Asif Raza, R. Faiz, Hafiz Syed Muhammad Muslim
{"title":"Test Case Design Of Security Threats Through State Machine OCL","authors":"Asif Raza, R. Faiz, Hafiz Syed Muhammad Muslim","doi":"10.31645/jisrc.23.21.1.9","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.9","url":null,"abstract":"Software testing is one activity for Software Quality Assurance (SQA). One way to test is through Black box test cases at design level. Since UML is a de-facto design language and is one of the most used design language now a day. Therefore, there is need to design black box test cases using UML behavioral diagrams. Object Constraint Language (OCL) is a formal language to write constraints on UML diagrams as it is unambiguous. Although test cases against robustness have been designed through OCL expressions but no test cases as yet have been designed against security specific authentication, access control and availability. Specification and testing of security specific authentication, access Control and availability through OCL. An experiment is performed with a hypothesis ‘if Security Specific Authentication, Access Control and Availability is specified through OCL in state diagram then Test cases can be designed’. We have specifiedsecurity in OCL then same OCL expressions are used to model security in UML state diagram. Furthermore, mutation testing is performed on OCL expressions. Then ECP is done using same extracted mutants. Security specific authentication, access control and availability is specified in OCL and then test cases are designed using a black box testing technique Equivalence Class Partitioning. Hypothesis results shows that one can design test cases through OCL. This thesis shows that Specification and Testing of Security specific authentication, access control and availability through OCL.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"22 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132741408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey Of Machine Learning Techniques For Detecting Anomaly In Internet Of Things (IoT) 物联网异常检测的机器学习技术综述
Journal of Independent Studies and Research Computing Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.5
Imran Imran, Syed Mubashir Ali, R. Faiz, M. M. Alam, Syed Kashif Ali Quadri, Muhammad Razeen Bari, Muhammad Farooq Shibli
{"title":"A Survey Of Machine Learning Techniques For Detecting Anomaly In Internet Of Things (IoT)","authors":"Imran Imran, Syed Mubashir Ali, R. Faiz, M. M. Alam, Syed Kashif Ali Quadri, Muhammad Razeen Bari, Muhammad Farooq Shibli","doi":"10.31645/jisrc.23.21.1.5","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.5","url":null,"abstract":"In recent years, there has been a lot of focus on anomaly detection. Technological advancements, such as the Internet of Things (IoT), are rapidly being acknowledged as critical means for data streams that create massive amounts of data in real time from a variety of applications. Analyzing this gathered data to detect abnormal occurrences helps decrease functional hazards and avoid unnoticed errors that cause programme delay. Methods for evaluating specific anomalous behaviorsin IoT data stream sources have been established and developed in the current literature. Unfortunately, there are very few thorough researches that include all elements of IoT data acquisition. As a result, this article seeks to address this void by presenting a comprehensive picture of numerous cutting-edge solutions on the fundamental concerns and essential issues in IoT data. The data type, types of anomalies,the learning method, datasets, and evaluation criteria are all described. Lastly, the issues that necessitate further investigation and future approaches are highlighted.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alzheimer’s Disease Detection: A Deep Learning-Based Approach 阿尔茨海默病检测:基于深度学习的方法
Journal of Independent Studies and Research Computing Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.3
Muhammad Wasim, Affan Alim, Waqas Ahmed
{"title":"Alzheimer’s Disease Detection: A Deep Learning-Based Approach","authors":"Muhammad Wasim, Affan Alim, Waqas Ahmed","doi":"10.31645/jisrc.23.21.1.3","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.3","url":null,"abstract":"Mental health is an important part of a successful life for a person whether elderly, children, or young. Alzheimer’s is a fatal brain disease that severely damages the human brain, especially in the elderly. One way to prevent Alzheimer's disease is by detecting it early. The proposed research employs a deep learning methodology using a 3D convolutional neural network (3D CNN) that has been proposed to detect Alzheimer's disease at an early stage. The proposed model is primarily evaluated using three-dimensional brain images. A series of preprocessing have been applied that is an advanced normalization tool (ANT). The underlying pattern has a size of 128×128×64 and is passed to 17 layers of a neural network that is 3D-CNN. Another contribution of this study is the conversion of a 3D Alzheimer’s image into a 2D image. A 2D convolutional neural network such that RestNET50 and VGG16 are proposed to be used for Alzheimer’s detection. The proposed model has attained the highest of 78.07% accuracy using 3D CNN.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"40 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Techy Tennis–A Game Beyond Reality 技术网球-超越现实的游戏
Journal of Independent Studies and Research Computing Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.4
Ayesha Anees Zaveri, Nabiha Faisal, S. Imtiaz, Sarama Shehmir, Mobeen Nazar, M. Parveen
{"title":"Techy Tennis–A Game Beyond Reality","authors":"Ayesha Anees Zaveri, Nabiha Faisal, S. Imtiaz, Sarama Shehmir, Mobeen Nazar, M. Parveen","doi":"10.31645/jisrc.23.21.1.4","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.4","url":null,"abstract":"The concept is to create a game based on augmented reality and use object tracking as the primary function for recognizing objects using a camera. The key goal is to design an atmosphere that not only satisfies a person's desire to play video games but also lowers their stress levels in a manner that is both cost-effective and makes less use of flashy devices and cutting-edge technology. The environment produced in this way will use a camera that can identify objects and carry out a series of activities that have been preset according to their functions.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132569734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study Of Software Automation Tools: Selenium And Quick Test Professional 软件自动化工具的比较研究:Selenium和Quick Test Professional
Journal of Independent Studies and Research Computing Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.6
Sana Fatima, S. F. Nasim, N. G. Haider, Mubeen Rasheed, Zoha Akram
{"title":"Comparative Study Of Software Automation Tools: Selenium And Quick Test Professional","authors":"Sana Fatima, S. F. Nasim, N. G. Haider, Mubeen Rasheed, Zoha Akram","doi":"10.31645/jisrc.23.21.1.6","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.6","url":null,"abstract":"In today’s challenging world software testing is a very crucial part of the software development lifecycle (SDLC) as it helps in minimizing errors, and reduces maintenance and cost of the software. This work aims to analyze the various tools presently available for software automation. The selection of productive testing tools plays a vital role in the implementation of software products with high quality and it also ensures premium quality throughout the SDLC. One of the key issues is the selection of adequate software testing tools and frameworks. This paper discusses Quick Test Professional (QTP) and Selenium on the basis of various attributes which include Source and Licensing, Testing Cost, Object Repository, Usability, and programming language support.The use of an adequate automated software tool provides ease in testing and allows the tester to execute test cases in an efficient manner by overcoming the challenges such as limited time, increased pressure and minimum resources.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122178306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical Investigations At High Altitudes For Nozzles Performance Monitoring 喷管性能监测的高海拔数值研究
Journal of Independent Studies and Research Computing Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.7
M. N. Qureshi, M. Ozair, Ahmad Hussain, S. Rehman, Q. Sultan, N. Islam
{"title":"Numerical Investigations At High Altitudes For Nozzles Performance Monitoring","authors":"M. N. Qureshi, M. Ozair, Ahmad Hussain, S. Rehman, Q. Sultan, N. Islam","doi":"10.31645/jisrc.23.21.1.7","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.7","url":null,"abstract":"Large area ratio nozzles that are employed for space propulsion applications are not meant to be tested at the ground-level conditions because of the flow conditions that occurs in their divergent section due to their low exhaust pressures. Therefore, it is desired to perform the experimental evaluation at high-altitude to evaluate the performance of the said nozzles. Generally, a high-altitude test facility, consisting of a supersonic exhaust diffuser, is generally employed. In thispaper, a second-throat exhaust diffuser has been numerically investigated to predict its minimum starting pressure, and to understand the flow physics in the diffuser using Computational Fluid Dynamics (CFD). Numerical computation of the flow field in the diffuser system is done for the two cases: 1) when the nozzle and the diffuser system are initially evacuated to a low pressure, and 2) when the nozzle and the diffuser system are initially at ambient pressure (1 bar). Simulations have been carried out for cold flow situation (Ȗ=1.4) over a range of nozzle inlet stagnation pressures. Numerical results compare favorably with the theoretical and experimental results and provide adequate insight to the flow physics and internal shock structures formed in thediffuser in addition to minimum starting pressure, diffuser wall pressure and vacuum thrust.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122184756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review Of Blockchain Technology In Big Data Paradigm 大数据范式下的区块链技术综述
Journal of Independent Studies and Research Computing Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.2
Huma Jamshed, Ansha Zahid, Rizwan Ul Hasan, Ahmad Hussain, N. Islam
{"title":"A Review Of Blockchain Technology In Big Data Paradigm","authors":"Huma Jamshed, Ansha Zahid, Rizwan Ul Hasan, Ahmad Hussain, N. Islam","doi":"10.31645/jisrc.23.21.1.2","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.2","url":null,"abstract":"Various organizations have plunged towards cloud computing solutions because of high cost, storage space and maintenance issues from big data. Big data is utilized by institutions in decision making process to achieve valuable insights in real time. Nevertheless big data has indeed helped organizations, andeven small to medium-sized businesses, but it characteristics has posed great challenges at same time. The cloud platform has facilitated in handling computational, networking and storage capacity related issues but still these mechanisms are inadequate to deal with the rapid data explosion. Moreover data is not secure in Cloud Environment as the servers are governed by third party. In recent years fusion of big data and blockchain technology has pushed big data beyond imagination and imparted great prospective in better-quality big data services and applications. Organizations certainly will adopt these two emerging technologies to transform their business needs. In this paper we present an overview of security related issue of big sensitive data on cloud platform along with motivation behind paradigm shift i.e. Integration of big data and blockchain technology.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparison Of Three Antennas With Passive Reflecting Walls For Wireless Power Transmission 三种无源反射壁天线无线输电性能比较
Journal of Independent Studies and Research Computing Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.1
Syed Rehan Abbas Jafri, Dr. Ghous B. Narego
{"title":"Performance Comparison Of Three Antennas With Passive Reflecting Walls For Wireless Power Transmission","authors":"Syed Rehan Abbas Jafri, Dr. Ghous B. Narego","doi":"10.31645/jisrc.23.21.1.1","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.1","url":null,"abstract":"This paper presents a novel wireless power transmission system through reflecting walls for enhancing received signal strength. The study has been conducted with an objective to achieve a novel system for the energy harvesting and subsequent wireless power transmission for mobile phone charging applications. The work is carried out at the well-known RF frequency range from 469.5 MHz to 773.5 MHz. We have employed three different antennas for the proposed system. Multiple changes in antenna orientations have also been accounted for including azimuthal variations. The results show substantial enhancement in the received signal strength (RSS) due to use of these reflecting walls","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NNBI: A Neural Network Based Business Intelligence Dashboard For A Clothing Store 基于神经网络的服装商店商业智能仪表板
Journal of Independent Studies and Research Computing Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.8
U. Afzal, Areeba Fatima, Bushra Nadeem, Faiza Shermeen, S. Usmani
{"title":"NNBI: A Neural Network Based Business Intelligence Dashboard For A Clothing Store","authors":"U. Afzal, Areeba Fatima, Bushra Nadeem, Faiza Shermeen, S. Usmani","doi":"10.31645/jisrc.23.21.1.8","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.8","url":null,"abstract":"Business Intelligence (BI) plays an important role in decision support systems by analyzing business data. Demand forecasting is a primary part of a sales decision system. In this research work, a Neural Network based Business Intelligence (NNBI) dashboard is proposed for a sales decision system. Data is collected from a leading clothing brand, then NNBI executes data and uses Recurrent Neural Network (RNN) to predict daily, monthly and weekly sales. The accuracy of the prediction model (0.95) validates the performance of NNBI. Tableau, a well-known BI tool is used to design NNBI dashboard. A combination of graphs, charts and text is used to interactively present the sales information. Results of NNBI show that a BI dashboard with the analysis and prediction power of NN is a good fit for a business organization.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125661232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-Users' Perception Of Cybercrimes Towards E-Banking Adoption And Retention 终端用户对网络犯罪对电子银行采用和保留的看法
Journal of Independent Studies and Research Computing Pub Date : 2023-06-07 DOI: 10.31645/jisrc.23.21.1.10
Taha Abbas, Kashif Arif
{"title":"End-Users' Perception Of Cybercrimes Towards E-Banking Adoption And Retention","authors":"Taha Abbas, Kashif Arif","doi":"10.31645/jisrc.23.21.1.10","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.10","url":null,"abstract":"The advancement of information and communication technology (ICT)has resulted in dynamic changes in the operations of various business sectors all over the world, while causing inconvenience to users and making stakeholders' lives easier. However, the advancement in the same has brought major concerns for businesses, such as cybercrime. This study focuses on identifying the impact of cybercrime on the adoption of e-banking services in Pakistan. The study aims to understand the impact of hacking, identity theft and phishing on the adoption of E-banking in Pakistan. The data was collected from 384 banking customers through structured questions containing the demographic questions as well as questions related to the constructs used in the study. The findings of the study suggest that hacking, phishing and identity theft negatively affect the adoption of E-banking in Pakistan. The results of the study are discussed in line with the existing literature. The study limitations and future research areas are also discussed.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116302255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信