Journal of Independent Studies and Research Computing最新文献

筛选
英文 中文
A Model To Capture Interaction Between Data Provenance And Workflow Provenance 捕获数据来源和工作流来源之间交互的模型
Journal of Independent Studies and Research Computing Pub Date : 1900-01-01 DOI: 10.31645/2014.12.2.1
Zeeshan Ahmed, Syed Saif ur Rahman
{"title":"A Model To Capture Interaction Between Data Provenance And Workflow Provenance","authors":"Zeeshan Ahmed, Syed Saif ur Rahman","doi":"10.31645/2014.12.2.1","DOIUrl":"https://doi.org/10.31645/2014.12.2.1","url":null,"abstract":"Provenance means origin. There are two types of Provenance namely Data Provenance and Workflow Provenance. Data Provenance refers to the process of recording and tracking the source or origin of data while workflow provenance means history of workflows and their data that were used while performing an operation to get required result. The results which are obtained while performing operations are called datasets. On these datasets, the queries are performed to get required result. While exploring provenance topic in data and workflow, the author have tried to explore how a model can be presented and discussed which can capture interaction between data provenance and workflow provenance. In this paper, the author have discussed further about provenance, its types and its importance and also discussed how to execute query on provenance data. The main focus of this study was on the model which captures interaction between workflow and data provenance including the above mentioned topics.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124523570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restful Web Services Security By Using ASP.NET Web API MVC Based 基于rest的Web服务安全基于。NET Web API MVC
Journal of Independent Studies and Research Computing Pub Date : 1900-01-01 DOI: 10.31645/2014.12.1.1
Muhammad Imran Hussain, Naveed Dilber
{"title":"Restful Web Services Security By Using ASP.NET Web API MVC Based","authors":"Muhammad Imran Hussain, Naveed Dilber","doi":"10.31645/2014.12.1.1","DOIUrl":"https://doi.org/10.31645/2014.12.1.1","url":null,"abstract":"The use of web services APIs play a vital role in the development of project in web where as in the era of rapid development; the use of web services are involved as a software as services; with the assistance of Internet web sites containing the full of useful information. Therefore, the trend of REST has increases, the uses of services development gained much more attention and widely used in last few years. Hence, the values of information security are becoming a challenge. Similarly, the restful web services are becoming a favorite, because it is lightweight, easy to implement and it also compatible with the cross platform solutions like mobile, PDAs and enterprises applications. As it has not any predefined security model, therefore the engineers also take the responsibility to implement the techniques to secure the information of enterprises. In this study our focus is to explore the best practices such as claim based, web tokens and delegation based by using Asp.Net Web API.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115027889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Development of Credit Scoring Model to Determine the Creditworthiness of Borrowers 确定借款人信誉的信用评分模型的开发
Journal of Independent Studies and Research Computing Pub Date : 1900-01-01 DOI: 10.31645/2014.12.2.2
Amjad Ali, Muhammad Rafi
{"title":"Development of Credit Scoring Model to Determine the Creditworthiness of Borrowers","authors":"Amjad Ali, Muhammad Rafi","doi":"10.31645/2014.12.2.2","DOIUrl":"https://doi.org/10.31645/2014.12.2.2","url":null,"abstract":"The explosive growth of data in banking sector is common phenomena. It is due to early adaptation of information system by Banks. This vast volume of historical data related to financial position of individuals and organizations compel banks to evaluate credit worthiness of clients to offers new services. Credit scoring can be defined as a technique that facilitates lenders in deciding to grant or reject credit to consumers. A credit score is a product of advanced analytical models that catch a snapshot of the consumer credit history and translate it into a numeric number that signify the amount of risks that will be generated in a specific deal by the consumer. Automated Credit scoring mechanism has replaced onerous, error-prone labour-intensive manual reviews that were less transparent and lacks statistical-soundness in almost all financial organizations. The credit scoring functionality is a type of classification problem for the new customer. There are numerous data classification algorithm proposed and each one has its pros and cons. This independent study focuses on comparing three data classification algorithms namely: Naïve Bayes, Bayesian Network and Bagging, for credit scoring task. An extensive series of experiments are performed on three standard credit scoring datasets: (i) German credit dataset, (ii) Australian credit dataset and (iii) Pakistan credit dataset. One of the main contributions of this study is to introduced Pakistan credit dataset; it is collected from local credit repository, and transformed accordingly to be used in the study. The studies compare the experimental results of different selected algorithms for classification, their standard evaluation measures, performance on the three datasets, and conclude the major findings.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116911507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Data Mining Techniques for Fraud Detection (A Case Study of Branchless Banking) 面向欺诈检测的数据挖掘技术对比分析(以无网点银行为例)
Journal of Independent Studies and Research Computing Pub Date : 1900-01-01 DOI: 10.31645/2013.11.1.2
Talha Umair, Syed Saif-ur-Rahman
{"title":"Comparative Analysis of Data Mining Techniques for Fraud Detection (A Case Study of Branchless Banking)","authors":"Talha Umair, Syed Saif-ur-Rahman","doi":"10.31645/2013.11.1.2","DOIUrl":"https://doi.org/10.31645/2013.11.1.2","url":null,"abstract":"Data mining algorithms have been using since few years in financial institutions like banks, insurance organizations, etc, and these organizations are using applications of data mining techniques in prediction of business collapse, marketing analysis and fraud detection. In this study our objective is to provide a comparative analysis and find the most suitable techniques of data mining for fraud detection in the area of branchless banking on certain comparison criteria. We have used few different mining algorithms like decision tree, association rules, clustering, naïve bayes and neural network. Our other objective is to find out the comparison criteria, through which we compare these algorithms and that criteria are training volume (small dataset) against quality patterns level, model creation Time, ease of implementation, ease of presentation, extensibility, efficiency, simplicity, training volume (large dataset) against quality patterns level, popularity. In the end we have suggested the most suitable algorithms for fraud detection on branches bank.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"499 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERFORMANCE ANALYSIS OF MPLS AND TRADITIONAL IP IN NODE SCALABLE NETWORKS 节点可扩展网络中MPLS与传统IP的性能分析
Journal of Independent Studies and Research Computing Pub Date : 1900-01-01 DOI: 10.31645/jisrc-019-02
Muhammad Arshad, L. Rukh, Hussain Shah, B. Khan
{"title":"PERFORMANCE ANALYSIS OF MPLS AND TRADITIONAL IP IN NODE SCALABLE NETWORKS","authors":"Muhammad Arshad, L. Rukh, Hussain Shah, B. Khan","doi":"10.31645/jisrc-019-02","DOIUrl":"https://doi.org/10.31645/jisrc-019-02","url":null,"abstract":"Multiprotocol label switching is the latest and developing technology in the world of the internet. It speeds up the network by using the technique of label instead of an IP address. It provides reliable transmission of data with high speed and low delay. For efficient use of network utilization MPLS has a key feature of QoS. Due to the effective utilization of network resources, minimum delay and predictable performance MPLS technology make it more appropriate for implementing multimedia type applications. In this research, the performance of MPLS technology is compared with the traditional IP network for multimedia traffic in node scalable networks. For simulating and comparing the performance of both technologies OPNET modular 14.5 is used. This comparison is done on the basis of network performance parameters such as packet loss/ traffic drop, end-to-end delay, and throughput. Finally, the results have been evaluated which show that MPLS technology provides better performance as compared to IP in node scalable environment.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117332900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving data quality using techniques from human computation 利用人工计算技术提高数据质量
Journal of Independent Studies and Research Computing Pub Date : 1900-01-01 DOI: 10.31645/2014.12.1.10
Vikram Kumar Kirpalani, Saif-ur-Rahman Saif-ur-Rahman
{"title":"Improving data quality using techniques from human computation","authors":"Vikram Kumar Kirpalani, Saif-ur-Rahman Saif-ur-Rahman","doi":"10.31645/2014.12.1.10","DOIUrl":"https://doi.org/10.31645/2014.12.1.10","url":null,"abstract":"The DBpedia is an open data repository extracted from a crowd sourced Knowledge base Wikipedia, because of which the information available there is more vulnerable to inconsistency, grammatical errors, structures and, data type problems. These are just a few issues that existing data is prone to. In this research, our prime focus would be on Data type problems, particularly, the problem of one attribute containing multiple facts. Proposed is the approach in which the issue of Inconsistent behavior of the desired output is addressed and improved, on the idea based on concept hierarchy i.e. association of Parent - Child relationship by employing Human computation and the confidence, and trust of the output has been calculated, out of which the Hierarchies of the entities could be maintained in the form of Triples which could be used to mapped on other data to led the data out of the problem of Implicit type of relationship between attributes.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115841042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ontological Knowledge Management System Of Islamic Concepts 伊斯兰概念本体知识管理系统
Journal of Independent Studies and Research Computing Pub Date : 1900-01-01 DOI: 10.31645/2013.11.1.5
H. Ali
{"title":"Ontological Knowledge Management System Of Islamic Concepts","authors":"H. Ali","doi":"10.31645/2013.11.1.5","DOIUrl":"https://doi.org/10.31645/2013.11.1.5","url":null,"abstract":"This study is focused on the conceptual relationship between different ayah of Al-Quran. Let’s take an example what Allah says about Muttaqee in the Al-Quran, the Quran say Muttaqee are those “They are on (true) guidance from their Lord” or “Those who got Falah” but when we go in the context of “Falah” we don’t find such word related Muttaqee means the relationship is there like if someone ask, who are Muttaqee the answer will be “Those who got Falah”; similarly if it is asked that who got Falah the answer is Muttaqee. There are several examples available in the Quran where we are not aware what will be the next related ayah to it. Another example in surah Al- Baqara Allah says: “The month of Ramadan in which was revealed the Qur'an” but next related ayah which we found in surah Al-Qadr in which Allah says: “Verily! We have sent it (this Qur'an) down in the night of Al-Qadr (Decree)” means the Allah revealed Al-Quran in Ramadan also in next surah it is further explained that it was revealed in lailat-ul-qadr.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123911800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Channel Assignment Algorithms and Strategies for Wireless Mesh Networks 无线网状网络的信道分配算法和策略
Journal of Independent Studies and Research Computing Pub Date : 1900-01-01 DOI: 10.31645/2013.11.1.1
Maliha Amir Ali Charania, Husnain Mansoor Ali
{"title":"Channel Assignment Algorithms and Strategies for Wireless Mesh Networks","authors":"Maliha Amir Ali Charania, Husnain Mansoor Ali","doi":"10.31645/2013.11.1.1","DOIUrl":"https://doi.org/10.31645/2013.11.1.1","url":null,"abstract":"This research report is about providing a solution to the problem of channel assignment in the multi radio wireless mesh networks that have an ad hoc based infrastructure. The aim was to minimize the fractional interference so that throughput can be maximized. The algorithms to solve this problem were classified and explained how they work. A description of channel assignment techniques is given along with a brief comparison in the literature. Main focus was towards the use on genetic algorithm. It also gives a detailed explanation of how genetic algorithm could be implemented in order to solve this problem along with conflict graphs being made by running functions in MATLAB.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126471881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey: Online and mobile banking risks, security issues and challenges on mobile devices and its user awareness 一项调查:在线和移动银行的风险、安全问题和挑战,以及移动设备和用户的意识
Journal of Independent Studies and Research Computing Pub Date : 1900-01-01 DOI: 10.31645/2013.11.2.1
A. Abbas, Naveed Dilber
{"title":"A Survey: Online and mobile banking risks, security issues and challenges on mobile devices and its user awareness","authors":"A. Abbas, Naveed Dilber","doi":"10.31645/2013.11.2.1","DOIUrl":"https://doi.org/10.31645/2013.11.2.1","url":null,"abstract":"With the growing use of mobile devices, it is a known fact that more people use internet from mobile devices than the conventional desktop PCs. Specifically, mobile devices are gaining popularity and with ease of availability its usage is a global phenomenon, creating a market and eco system of its own. Similarly online and mobile banking facilities have made a mark of its own, as consumers can now easily access their financial information from anywhere in the world and commit transactions without physically being present in financial institution of their choice. Combining the above two technologies opens a new arena of challenges, where a balance of functionality and security is to be carefully considered. Using online and mobile banking systems from mobile devices, either via browser or mobile business application, both the consumer and the institution are required to adopt a paradigm shift with respect to understanding the risks and required controls to mitigate those risks. In this research we attempted to study security issues and risks related to mobile devices faced by the banking industry, more particularly, mobile banking. Further, we shall look into the current trends, future challenges and solutions available in order to secure the communication between mobile devices and business application and how they can be mitigated. Furthermore, we will conduct a survey within the banking industry to understand the current security mechanisms adopted by these institutions. Moreover, consumer awareness, their thought process and views related to security threats shall be studied to identify their understanding of the risks and challenges and their comfort level while using mobile devices for financial transactions.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129790563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement in existing agile methodology to counter the issues and challenges in QA process 改进现有的敏捷方法,以应对QA过程中的问题和挑战
Journal of Independent Studies and Research Computing Pub Date : 1900-01-01 DOI: 10.31645/2014.12.1.3
Ali Ashraf Khanani, M. Tayyab
{"title":"Enhancement in existing agile methodology to counter the issues and challenges in QA process","authors":"Ali Ashraf Khanani, M. Tayyab","doi":"10.31645/2014.12.1.3","DOIUrl":"https://doi.org/10.31645/2014.12.1.3","url":null,"abstract":"The title of my research paper is ―Enhancement in existing Agile Testing methodology to counter the issues and challenges in QA process‖. In this research study I have worked on the issues that are faced by QA teams during agile methodology processes and have identified ways of improvement in current agile frameworks that is being used. The solution to counter the challenges and issues during testing phase is proposed to improve the time constraint in a testing environment and making testing an easy and effective job in terms of cost and time constraints in an agile environment where deadlines are very strict and time is always short. At the end, there is a survey and interview with domain expert to analyze the results achieved and to prove the hypothesis of my research.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116799036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信