http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
( Rajeev Kumar ),( Md Tarique Jamal Ansari ),( Abdullah Baz ),( Hosam Alhakami ),( Alka Agrawal ),( Raees Ahmad Khan ) 한국인터넷정보학회 2021 KSII Transactions on Internet and Information Syst Vol.15 No.1
One of the biggest challenges that the software industry is facing today is to create highly efficient applications without affecting the quality of healthcare system software. The demand for the provision of software with high quality protection has seen a rapid increase in the software business market. Moreover, it is worthless to offer extremely user-friendly software applications with no ideal security. Therefore a need to find optimal solutions and bridge the difference between accessibility and protection by offering accessible software services for defense has become an imminent prerequisite. Several research endeavours on usable security assessments have been performed to fill the gap between functionality and security. In this context, several Multi-Criteria Decision Making (MCDM) approaches have been implemented on different usability and security attributes so as to assess the usable-security of software systems. However, only a few specific studies are based on using the integrated approach of fuzzy Analytic Network Process (FANP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique for assessing the significant usable-security of hospital management software. Therefore, in this research study, the authors have employed an integrated methodology of fuzzy logic, ANP and TOPSIS to estimate the usable - security of Hospital Management System Software. For the intended objective, the study has taken into account 5 usable-security factors at first tier and 16 sub-factors at second tier with 6 hospital management system softwares as alternative solutions. To measure the weights of parameters and their relation with each other, Fuzzy ANP is implemented. Thereafter, Fuzzy TOPSIS methodology was employed and the rating of alternatives was calculated on the foundation of the proximity to the positive ideal solution.
Revisiting Software Security: Durability Perspective
Rajeev Kumar,Suhel Ahmad Khan,Raees Ahmad Khan 보안공학연구지원센터 2015 International Journal of Hybrid Information Techno Vol.8 No.2
Security is a peak significant quality element in the pitch of software engineering. Software security improvement is easily done with the support of factors, models and metrics of security. Software security should be analyzed with the help of its security factors. Security dimension is the main attribute in evaluation, executing, and calculating security in the way to organize and develop quality of software. It is to be identified that qualifications of security factors increased through inspecting damages, discriminating susceptibility and attacks in design development process. This review is discussing the description and categorization of accessible security properties. Durability is an attribute of security that refers to the capability of software to conclude of a creation on time. Software security is affected with security attributes as well as durability. A stable state of the secure software enhances additional security.
Activity Recognition using Smartphone low level sensor data
Rajeev Piyare,Joo Seong Oh,Min A Jeong,Ilhwan Oh,Seong Ro Lee 한국정보통신학회 2014 2016 INTERNATIONAL CONFERENCE Vol.6 No.1
Smartphones with built-in sensors promise a convenient, objective way to evaluate everyday movements and recognize those movements into activities. Using accelerometer as a low level sensor data we estimate the following daily activities performed by the user: walking, jogging, walking up stairs, walking down stairs, sitting and standing. Among five common machines learning algorithms: Decision Tree (J48), Naïve Bayes (NB), Support Vector Machines (SVM), Neural Network (NN), and Logistic Regression. NN classifier was found to be the best choice with classification accuracy of more than 95%. It is shown that this method is appropriate and that the phone’s orientation information is not needed.
Rajeev Kumar,Muhammad Ehsan,M.A. Barakat 한국공업화학회 2014 Journal of Industrial and Engineering Chemistry Vol.20 No.6
In this work, flake like carbon/AlOOH composite has been synthesized and evaluated as a new adsorbentfor the removal of Cr(VI) from synthetic wastewater. Different characterization tools such as, SEM, EDAX,XRD and XPS were performed to characterize the composite material. Batch adsorption studies for Cr(VI)removal were performed under the influence of various operational parameters such as solution pH,contact time, initial solution concentration and temperature. Results obtained revealed that adsorptionof Cr(VI) onto carbon/AlOOH composite followed the pseudo-second order kinetics and Freundlichisotherm model. Thermodynamic results suggests that adsorption of Cr(VI) onto carbon/AlOOHcomposite was spontaneous and endothermic in nature.
Removal of tannic acid from aqueous solution by magnetic carbohydrate natural polymer
Rajeev Kumar,M.A. Barakat,Ezzat M. Soliman 한국공업화학회 2014 Journal of Industrial and Engineering Chemistry Vol.20 No.5
Adsorptive removal of tannic acid (TA) form aqueous solution by synthesized magnetic lignocellulosic adsorbent was investigated. SEM, EDAX, and FTIR analysis were performed to characterize the magnetic saw dust (MSD). The effect of various operational parameters such as contact time, concentration and solution pH etc were studied. The optimum adsorption of TA was observed at pH 4. Results revealed that the Temkin isotherm model fitted well to the adsorption equilibrium data and obeyed the pseudosecond order kinetics model. The values of free energy change and activation energy suggested that physical forces were involved in the adsorption of TA onto MSD.
Rajeev Joshi,Hukum Singh,Ramesh Chhetri,Karan Yadav 강원대학교 산림과학연구소 2020 Journal of Forest Science Vol.36 No.2
This study was carried out in degraded and non-degraded community forests (CF) in the Terai region of Kanchanpur district, Nepal. A total of 63 concentric sample plots each of 500 m2 was laid in the inventory for estimating above and below-ground biomass of forests by using systematic random sampling with a sampling intensity of 0.5%. Mallotus philippinensis and Shorea robusta were the most dominant species in degraded and non-degraded CF accounting Importance Value Index (I.V.I) of 97.16 and 178.49, respectively. Above-ground tree biomass carbon in degraded and non-degraded community forests was 74.64±16.34 t ha-1 and 163.12±20.23 t ha-1, respectively. Soil carbon sequestration in degraded and non-degraded community forests was 42.55±3.10 t ha-1 and 54.21±3.59 t ha-1, respectively. Hence, the estimated total carbon stock was 152.68±22.95 t ha-1 and 301.08±27.07 t ha-1 in degraded and non-degraded community forests, respectively. It was found that the carbon sequestration in the non-degraded community forest was 1.97 times higher than in the degraded community forest. CO2 equivalent in degraded and non-degraded community forests was 553 t ha-1 and 1105 t ha-1, respectively. Statistical analysis showed a significant difference between degraded and non-degraded community forests in terms of its total biomass and carbon sequestration potential (p<0.05). Studies indicate that the community forest has huge potential and can reward economic benefits from carbon trading to benefit from the REDD+/CDM mechanism by promoting the sustainable conservation of community forests.
Neuron Circuit Using a Thyristor and Inter-neuron Connection with Synaptic Devices
Rajeev Ranjan,Min-Woo Kwon,Jungjin Park,Hyungjin Kim,Byung-Gook Park 대한전자공학회 2015 Journal of semiconductor technology and science Vol.15 No.3
We propose a simple and compact thyristor-based neuron circuit. The thyristor exhibits bi-stable characteristics that can mimic the action potential of the biological neuron, when it is switched between its OFF-state and ON-state with the help of assist circuit. In addition, a method of inter-neuron connection with synaptic devices is proposed, using double current mirror circuit. The circuit utilizes both short-term and long-term plasticity of the synaptic devices by flowing current through them and transferring it to the post-synaptic neuron. The double current mirror circuit is capable of shielding the pre-synaptic neuron from the post synapticneuron while transferring the signal through it, maintaining the synaptic conductance unaffected by the change in the input voltage of the post-synaptic neuron.