The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Large Forest Fires are one of the most destructive and recurring natural disaster types around the world, and year after year they leave environmental, material and human irreparable losses in the social nuclei in which they occur. To face them, it is essential to have a Situation Awareness that allows decisions making according to reality, promoting the collaboration between the all involved and...
Multi-Criteria Decision Analysis (MCDA) has been used widely to guide decision making in multi-attribute selection problems. Few studies have however proposed the use of combinations of MCDA approaches with goal-oriented modeling to rank design alternatives related to business process models. We propose a distance-based approach for models specified with the Goal-oriented Requirement Language (GRL)...
Modern technology has made our life better in many ways, including transportation, food, health, etc. However, it had little effect on how a democracy executes its core act: voting. In most cases, we still go to polling booths where we cast our votes in the same old way, even the frequency of such act has not been varied much. The spread of the idea of Smart City brings an opportunity to implement...
The Internet disruption has resulted in an exponential increase in the growth of new technologies [1] and resultant technology disruptions within the workplace [2]. With the rapid changes in the technology landscape, Chief Information Officers (CIO's) and key decision makers need to learn to maneuver though the plethora of emerging technologies that can result in business model innovation [3] and...
Ensuring cost-efficient cybersecurity for a networked system is a challenging task. In this task, cybersecurity situational awareness is a cornerstone to ensure that systems are protected in a meaningful way. However, cybersecurity situational awareness can be built in various ways. Firstly, several monitoring and analysing techniques can be applied, and secondly, a time window for the usage of situational...
Scholars and industrial professionals are committed to integrating traditional financial economics models and machine learning models to improve the prediction model for stock prices, which is still a challenging topic. However, there is few acceptable results reported. This study proposes a two-stage multi-view prediction method that provides a new integration perspective for the integration of finance...
Energy and Process control systems were once conveniently separated. Tighter integration is now required because of more widespread use of higher efficiency motors and variable frequency drives as well as faster dynamic load management schemes for plants with a minimal spinning reserve capability. Digital age IIoT interactions between the ANSI/ISA95 and IEC61850 Bus Architectures present challenges...
The intelligent system is constructed by using three basic principles of decomposition, the neural network and fuzzy approach, swarm intelligence, expert systems, pattern recognition, video content analysis, simultaneous localization and mapping, fractal and the wavelet-analysis. The principle of design, the structural and functional schemes of the security intelligent system are offered. These principle...
This paper offers a systematic and rigorous methodological framework for alternative futures development under growing uncertainty and complexity. It focuses on the area of military technology evolution with focus on cybernetics and robotic systems. Effectiveness of defense management is significantly constrained by its ability to predict evolution of our strategic environment, assess its impact on...
Internet technologies (Web-technologies) are developing very rapidly and, therefore, are increasingly being introduced into the social environment and daily activities of a person. The head of the university uses a certain multifaceted and complex process of making managerial decisions for organizing his work. Special opportunities for increasing the effective in the management of a university have...
Dynamic strategies used by attackers to break down the software system calls for dynamic countermeasure selection techniques. A significant challenge in engineering self-proctoring software system is selecting a proper countermeasure while the software systems undergoes a well-planned attack. To address this challenge, in this research work, we model the interactions between the attacker and the software...
In this paper we consider a single decision period consumption-investment problem with the consumption targets for an individual. The rate of return is uncertain and the portfolio preference order is influenced by the investor's social status, wealth, psychology and so on. We emphasize that the individual investor has one and only one chance to allocate the wealth into consumption and a portfolio...
Targeted and destructive nature of strategies used by attackers to break down the system require mitigation approaches with dynamic awareness. Making a right decision, when facing today's sophisticated and dynamic attacks, is one of the most challenging aspects of engineering self-protecting software systems. Inspired by game theory, in this research work, we model the interactions between the attacker...
The perception of risk is a driver for security analysts' decision making. However, security analysts may have conflicting views of a risk based on personal, system and environmental factors. This difference in perception and opinion, may impact effective decision making. In this paper, we propose a model that highlights areas contributing to the perception of risk in a socio-technical environment...
Although recent studies have provided a framework for determining factors contributing online retailers' success, they have not been successful in recognizing that customer decision-making process is mostly influenced by internal factors of the websites (e.g. navigation, color and graphics). Although website quality is important, it provides only a subset of the evaluation criteria for service provider...
Among other knowledge, software architecture de-sign decision-making relies on the relation between architecturalpatterns and quality attributes (QAs). However, this relation isoften implicit, or in the best case informally and partially defined. This leads to sub-optimal understanding of the impact of thearchitecture design on the desired level of quality. In this work, we aim to shed light on the...
Today Cyber-attacks are increasing and the security technologies so far we used are in capable of handling the large data sets of data. Now a day the attacks motive has changed from simple hacking, damaging to large scale network and server system. In the presence of fresh and formerly unknown activities, intrusion detection rate is inaccurate and low. Many research works are focused in this area...
big amount of data and information transfer among, within, and through organizations all over the globe. This big data information may include sensitive, confidential and restricted data, like financial, legal or private information. Any loss, threat, or leakage of information may trigger high-security risk on such data. Securing big data during analysis phase is still a challenge, especially in cloud...
Ensuring security in routing protocols designed for Internet of Things (IoT) is more challenging owing to the fact that devices are resource constrained. The need for lightweight security mechanisms is apparent because cryptography based mechanisms have intense computation requirements. Although Routing Protocol for Low power and lossy networks (RPL) inherently comprises a few security mechanisms,...
The preventive maintenance requirement of test equipment is determined by the reliability centered maintenance (RCM) analysis. In the first step of RCM analysis procedure, the important degree evaluations of test equipment play a significant way to identify the functionally significant item (FSI) list. To evaluate the important degree of test equipment, a systematic methodology integrating the fuzzy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.