The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new approach to user identity currently being explored within the SuperIdentity project and outlines the specific role that biometric measurements can contribute towards a modelling process. The SuperIdentity project aims to define a novel holistic model wherein the proven strengths of relationships between facets of identity are mapped. These facets are drawn from both real...
In this paper, we investigate the relationship among trading volume, volatility and jump based on Hu-Shen300 index high frequency data. We measure volatility using realized volatility proposed by Andersen and Bollerslev (1998) and decompose it into upside and downside parts by the asymptotic properties of realized upside and downside power variation defined in Bi, Zhang and Wu(2013). To measure jump...
Software development is not only a single motive process as development but also have to handle number of different issues as like security. For basic software development, we generally use SDLC models for development like web projects, applications, services etc. but in this development process we are not taking care of security issues which are demand of these days. There is no central body who...
This paper addresses the potential of mathematical modelling in support of the classical security risk assessment and treatment approach. Classical security risk assessment and control selection is strongly based on expert judgment. Within the context of large scale system implementation in air traffic management, there is only a limited availability of resources during the system engineering phase...
Current biometric recognition systems for website authentication are mostly web server based, needing server support and infrastructure, and sometimes dedicated external hardware, for online authentication. Not many web servers support this kind of infrastructure for authentication. On the other hand, pure device based authentication systems are of the ‘all or none’ type, serving to authenticate users...
Farming-pastoral zone is one of typical ecological transition zone in China. To monitor and evaluate the ecological security in farming-pastoral zone is of great significance for regional environmental protection and rational utilization. This paper chooses Guyuan County as the research area, which is in typical farming-pastoral zone area named Bashang in north China. Then, in the administrative divisions...
At present, security-related engineering usually requires a big up-front design (BUFD) regarding security requirements and security design. In addition to the BUFD, at the end of the development, a security evaluation process can take up to several months. In today's volatile markets customers want to influence the software design during the development process. Agile processes have proven to support...
For service-oriented systems the estimation of QoS is an important factor to determine whether a prospective service composition will meet the expectations of its final users. Many approaches to QoS estimation of service compositions have been proposed. However, not all of them allow the QoS of composition be estimated a priori and systematically from the QoS of its individual services. This is an...
Educational resource center is a digital content management and service system with all kinds of educational information resources collected. By analyzing the current development of educational resource center, this paper proposes that ecological development is the strategic goal of educational resource center, and presents a use efficiency model of educational resource center. The use efficiency...
Big Data are becoming a new technology focus both in science and in industry and motivate technology shift to data centric architecture and operational models. There is a vital need to define the basic information/semantic models, architecture components and operational models that together comprise a socalled Big Data Ecosystem. This paper discusses a nature of Big Data that may originate from different...
The application of information and communication technology is conceived as a chance to amplify the capacity of the citizens to act, strengthen cross-border contacts and relations, and develop an open society with cultural diversity. This seminar systematically reviews and presents the use of web-based services for government, administration, the public, and politics. A process-oriented layer model...
The safety of passengers is a major concern to airports. In the event of crises, having an effective and efficient evacuation process in place can significantly aid in enhancing passenger safety. Hence, it is necessary for airport operators to have an in-depth understanding of the evacuation process of their airport terminal. Although evacuation models have been used in studying pedestrian behavior...
Cloud Computing has transformed the software support for large systems from server to service oriented paradigm. This drift has evolved new challenges for design and delivery of services over heterogeneous requirements and environments. This brings about risks and challenges for systems. The system over internet are vulnerable to performance and security risks. The performance is a composite evaluation...
This paper focuses on providing a secure, authentic and user-friendly mechanism for both the customer's of the bank holding a locker and the branch head's involvement in all the operations pertaining to the safety lockers. The primary aim of this paper is to provide a solution towards a complete biométrie based authentication mechanism for operating the safety lockers. This system rests on improving...
This paper presents a discussion of the contemporary transmission expansion planning (TEP) framework focusing on educational opportunities and curriculum development. An analysis of the mathematical models and fundamental concepts, as well as available software tools and necessary skills for state-of-the-art TEP projects, is presented based on research and academic experiences. A guide to TEP curriculum...
Technological advances in electronic services have made it easier than ever before to access and share different kinds of data. In the healthcare sector, the exchange of patients' information between different actors (hospitals, laboratories, pharmacies …) improves diagnosis and treatment quality and reduces related costs. However, this exchange arise new security concerns and makes patient information...
Application domains in which early performance evaluation is needed are becoming more complex. In addition to traditional measures of complexity due, for example, to the number of components, their interactions, complicated control coordination and schemes, emerging applications may require adaptive response and reconfiguration the impact of externally observable (security) parameters. In this paper...
How to deal with errors in estimating return and trading costs is a critical issue in portfolio management. In this paper, we investigate the over-time rebalancing benefits of the portfolio models that consider mean, variance, skewness, allowing short-sale, and transaction costs by incorporating fuzzy decision making. We apply multiple criterion method to deal with the complexity of various objectives...
As Cloud Computing continues to evolve the majority of research tends to lean towards optimising, securing and improving Cloud technologies. Less work appears which leverages the architectural and economic advantages of the Cloud. This paper examines the Cloud as a security testing environment, having a number of purposes such as penetration testing, and the dynamic creation and testing of environments...
Food Sovereignty (food freedom) is about empoweing people to develop their own local food system. Food Sovereignty challenges designers to enable people to innovate the local food system, rather than having a food system which is dictated by corporate interests and failed business ethics [1]. Communities are realising the potential for design to assist in the innovation process, and add strategic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.