Soft computing is a combination of methods that complement each other when dealing with ambiguous real life decision systems. Rough Set Theory (RST) is a technique used in soft computing that enhances the idea of clas...Soft computing is a combination of methods that complement each other when dealing with ambiguous real life decision systems. Rough Set Theory (RST) is a technique used in soft computing that enhances the idea of classical sets to deal with incomplete knowledge and provides a mechanism for concept approximation. It uses reducts to isolate key attributes affecting outcomes in decision systems. The paper summarizes two algorithms for reduct calculation. Moreover, to automate the application of RST, different software packages are available. The paper provides a survey of packages that are most frequently used to perform data analysis based on Rough Sets. For benefit of researchers, a comparison of based on functionalities of those software is also provided.展开更多
Google Maps and other such maps in GIS have a lot of significance in every one’s life for in modern world due to technological development as well as contemporary needs in travelling, business planning, agriculture, ...Google Maps and other such maps in GIS have a lot of significance in every one’s life for in modern world due to technological development as well as contemporary needs in travelling, business planning, agriculture, e-marketing supply chain management, census and planning and excessive use of mobile phones. Being a revolutionary technology, it attracts the users from its inception. It has been revolutionary in having an impact on one’s daily life by helping one explore geographical locations virtually anywhere on the whole planet. It has become a norm that people use Google Maps before or while commuting to a certain place as most of the people rely on it to provide the shortest or fastest route to a destination. Google Maps has had a profound impact not only one’s personal life, but has opened new avenues of marketing, business intelligence, urban planning, infrastructure strategy development, as well as traffic engineering. Hence, no one can deny the impact it has had on our society in a short period. However, Google Maps has security concerns associated with its use. This is because whenever a user is searching for a geographical location on Google Maps, there is no way to ascertain his/her intention. As result, whatever is requested by the user, it is provided without much security checks or personal specific logging history. Criminal minded people may use the technology to carry out unwarranted and uncalled-for activities such as terror attacks, exploitation of military assets, target killing, trailing a potential victim, kidnapping, demanding ransom money, and compromising national security etc. Numbers of such activities may be carried out using the guidance from “Google Maps” without getting noticed. This is largely due to that anonymous login is allowed into Google Maps. The paper highlights the main security issues that exist in the use of Google Maps and suggests the key areas to improve upon. In this research paper, we discuss the security concerns related to Google Maps utilization and try to identify the associated risks that may be worst in some situations due to that it is significant to assess the usage of this tremendous technology. We categorize the millions of Anonymous Google Maps users into two major categories (Anonymous Good Users and Anonymous Bad Users) based on Google Maps browsing and analyze the associated risks and potential threats and propose the way to minimize them. In future, if Google Maps adopts the proposed techniques and improves upon, then its utilization minimizes security concerns and makes the world much safe place.展开更多
Pakistan is a developing country with more than half of its population located in rural areas. These areas neither have sufficient health care facilities nor a strong infrastructure that can address the health needs o...Pakistan is a developing country with more than half of its population located in rural areas. These areas neither have sufficient health care facilities nor a strong infrastructure that can address the health needs of the people. The expansion of Information and Communication Technology (ICT) around the globe has set up an unprecedented opportunity for delivery of healthcare facilities and infrastructure in these rural areas of Pakistan as well as in other developing countries. Mobile Health (mHealth)—the provision of health care services through mobile telephony—will revolutionize the way health care is delivered. From messaging campaigns to remote monitoring, mobile technology will impact every aspect of health systems. This paper highlights the growth of ICT sector and status of health care facilities in the developing countries, and explores prospects of mHealth as a transformer for health systems and service delivery especially in the remote rural areas.展开更多
Cloud computing is an emerging technology that is being widely adopted throughout the world due to its ease-of-use. Organizations of all types can use it without pre-requisites such as IT infra-structure, technical sk...Cloud computing is an emerging technology that is being widely adopted throughout the world due to its ease-of-use. Organizations of all types can use it without pre-requisites such as IT infra-structure, technical skills, managerial overload, storage capacity, processing power, and data recovery or privacy setup. It can be availed by all clients as per their needs, expectations and budget. However, cloud computing introduces new kinds of security vulnerabilities that need to be ad-dressed. Traditional “Computer Forensics” deals with detection, preemption and prevention of IT triggered frauds and crimes but it lacks the ability to deal with cybercrimes pertaining to cloud computing environment. In this paper, we focus on forensics issues in cloud computing, assess limitations of forensic team and present the obstacles faced during investigation.展开更多
This study investigated a new approach for synthesizing Bacillus subtilis biofilm-supported Mn-Ce/zeolite catalysts for the degradation of gaseous toluene.Four different metal oxide nano-catalysts(ZMn,ZMnCe-10%,ZMnCe-...This study investigated a new approach for synthesizing Bacillus subtilis biofilm-supported Mn-Ce/zeolite catalysts for the degradation of gaseous toluene.Four different metal oxide nano-catalysts(ZMn,ZMnCe-10%,ZMnCe-20%,and ZMnCe-30%)were synthesized with varying ratios of manganese(Mn)and cerium(Ce)on zeolite nanoparticles.TEM,SEM,XRD,BET,XPS,and EDX mapping were used to examine these four samples,as well as simple zeolite.Based on these analyses,the catalytic activity of the prepared samples ZMn,ZMnCe-10%,ZMnCe-20%,and ZMnCe-30%for the complete oxidation of toluene and toluene intermediate products were tested with Non-thermal plasma(NTP)technology in a dielectric barrier discharge(DBD)reactor.Among all,ZMnCe-20%showed the highest toluene degradation efficiency(89%)at low concentrations(200 ppm)and humidity(>50%).Later,highly efficient and hydrophobic nano-biocatalysts were prepared by combining B.subtilis biofilm wildtype(WT)and engineered B.subtilis biofilm EPS with ZMnCe-20%catalyst.EPS is the main component found in biofilm matrix and plays a key role in influencing properties such as biofilm stability,electron transfer,surface roughness and hydrophobicity.Compared to WT B.subtilis biofilm,EPS overexpressed B.subtilis biofilm showed stronger growth and development on ZMnCe-20%nanocatalyst.Moreover,the NTP system packed with ZMnCe-20%/biofilm(EPSt)nano-biocatalyst exhibited the highest toluene degradation activity(99%)with(83%)CO_(2)selectivity,(up to 50%)reduction in NOx concentration and complete ozone decomposition at(250 ppm)toluene concentrations and increased humidity(>90%).High-energy electrons generated in the NTP system break the C-H and C-C bond between the rings of the toluene molecule,forming several byproducts which are later reacted with active radical species such as O·,OH·,and O_(3)and further converted into final degradation products(CO_(2)and H_(2)O).The results demonstrated successful biofilm development and growth on the ZMnCe-20%catalyst with advanced features such as superhydrophobicity,H_(2)O resistance,improved surface roughness,and electron generation.In short,the study's approach combines bioengineering and material science to develop sustainable nanobiocatalysts for removing VOCs in industrial and environmental settings.展开更多
文摘Soft computing is a combination of methods that complement each other when dealing with ambiguous real life decision systems. Rough Set Theory (RST) is a technique used in soft computing that enhances the idea of classical sets to deal with incomplete knowledge and provides a mechanism for concept approximation. It uses reducts to isolate key attributes affecting outcomes in decision systems. The paper summarizes two algorithms for reduct calculation. Moreover, to automate the application of RST, different software packages are available. The paper provides a survey of packages that are most frequently used to perform data analysis based on Rough Sets. For benefit of researchers, a comparison of based on functionalities of those software is also provided.
文摘Google Maps and other such maps in GIS have a lot of significance in every one’s life for in modern world due to technological development as well as contemporary needs in travelling, business planning, agriculture, e-marketing supply chain management, census and planning and excessive use of mobile phones. Being a revolutionary technology, it attracts the users from its inception. It has been revolutionary in having an impact on one’s daily life by helping one explore geographical locations virtually anywhere on the whole planet. It has become a norm that people use Google Maps before or while commuting to a certain place as most of the people rely on it to provide the shortest or fastest route to a destination. Google Maps has had a profound impact not only one’s personal life, but has opened new avenues of marketing, business intelligence, urban planning, infrastructure strategy development, as well as traffic engineering. Hence, no one can deny the impact it has had on our society in a short period. However, Google Maps has security concerns associated with its use. This is because whenever a user is searching for a geographical location on Google Maps, there is no way to ascertain his/her intention. As result, whatever is requested by the user, it is provided without much security checks or personal specific logging history. Criminal minded people may use the technology to carry out unwarranted and uncalled-for activities such as terror attacks, exploitation of military assets, target killing, trailing a potential victim, kidnapping, demanding ransom money, and compromising national security etc. Numbers of such activities may be carried out using the guidance from “Google Maps” without getting noticed. This is largely due to that anonymous login is allowed into Google Maps. The paper highlights the main security issues that exist in the use of Google Maps and suggests the key areas to improve upon. In this research paper, we discuss the security concerns related to Google Maps utilization and try to identify the associated risks that may be worst in some situations due to that it is significant to assess the usage of this tremendous technology. We categorize the millions of Anonymous Google Maps users into two major categories (Anonymous Good Users and Anonymous Bad Users) based on Google Maps browsing and analyze the associated risks and potential threats and propose the way to minimize them. In future, if Google Maps adopts the proposed techniques and improves upon, then its utilization minimizes security concerns and makes the world much safe place.
文摘Pakistan is a developing country with more than half of its population located in rural areas. These areas neither have sufficient health care facilities nor a strong infrastructure that can address the health needs of the people. The expansion of Information and Communication Technology (ICT) around the globe has set up an unprecedented opportunity for delivery of healthcare facilities and infrastructure in these rural areas of Pakistan as well as in other developing countries. Mobile Health (mHealth)—the provision of health care services through mobile telephony—will revolutionize the way health care is delivered. From messaging campaigns to remote monitoring, mobile technology will impact every aspect of health systems. This paper highlights the growth of ICT sector and status of health care facilities in the developing countries, and explores prospects of mHealth as a transformer for health systems and service delivery especially in the remote rural areas.
文摘Cloud computing is an emerging technology that is being widely adopted throughout the world due to its ease-of-use. Organizations of all types can use it without pre-requisites such as IT infra-structure, technical skills, managerial overload, storage capacity, processing power, and data recovery or privacy setup. It can be availed by all clients as per their needs, expectations and budget. However, cloud computing introduces new kinds of security vulnerabilities that need to be ad-dressed. Traditional “Computer Forensics” deals with detection, preemption and prevention of IT triggered frauds and crimes but it lacks the ability to deal with cybercrimes pertaining to cloud computing environment. In this paper, we focus on forensics issues in cloud computing, assess limitations of forensic team and present the obstacles faced during investigation.
基金supported by the National Key Research and Development Program of China(No.2020YFA0908900)the National Natural Science Foundation of China(No.22250410275)+1 种基金the Natural Science Foundation of Shanghai(No.22ZR1416000)the Fundamental Research Funds for the Central Universities.
文摘This study investigated a new approach for synthesizing Bacillus subtilis biofilm-supported Mn-Ce/zeolite catalysts for the degradation of gaseous toluene.Four different metal oxide nano-catalysts(ZMn,ZMnCe-10%,ZMnCe-20%,and ZMnCe-30%)were synthesized with varying ratios of manganese(Mn)and cerium(Ce)on zeolite nanoparticles.TEM,SEM,XRD,BET,XPS,and EDX mapping were used to examine these four samples,as well as simple zeolite.Based on these analyses,the catalytic activity of the prepared samples ZMn,ZMnCe-10%,ZMnCe-20%,and ZMnCe-30%for the complete oxidation of toluene and toluene intermediate products were tested with Non-thermal plasma(NTP)technology in a dielectric barrier discharge(DBD)reactor.Among all,ZMnCe-20%showed the highest toluene degradation efficiency(89%)at low concentrations(200 ppm)and humidity(>50%).Later,highly efficient and hydrophobic nano-biocatalysts were prepared by combining B.subtilis biofilm wildtype(WT)and engineered B.subtilis biofilm EPS with ZMnCe-20%catalyst.EPS is the main component found in biofilm matrix and plays a key role in influencing properties such as biofilm stability,electron transfer,surface roughness and hydrophobicity.Compared to WT B.subtilis biofilm,EPS overexpressed B.subtilis biofilm showed stronger growth and development on ZMnCe-20%nanocatalyst.Moreover,the NTP system packed with ZMnCe-20%/biofilm(EPSt)nano-biocatalyst exhibited the highest toluene degradation activity(99%)with(83%)CO_(2)selectivity,(up to 50%)reduction in NOx concentration and complete ozone decomposition at(250 ppm)toluene concentrations and increased humidity(>90%).High-energy electrons generated in the NTP system break the C-H and C-C bond between the rings of the toluene molecule,forming several byproducts which are later reacted with active radical species such as O·,OH·,and O_(3)and further converted into final degradation products(CO_(2)and H_(2)O).The results demonstrated successful biofilm development and growth on the ZMnCe-20%catalyst with advanced features such as superhydrophobicity,H_(2)O resistance,improved surface roughness,and electron generation.In short,the study's approach combines bioengineering and material science to develop sustainable nanobiocatalysts for removing VOCs in industrial and environmental settings.