This article presents the scenario of programming use by architects and engineers,creating their own unique tools.The goal is to emulate and understand the phenomenon of Building Information Modeling(BIM)software cust...This article presents the scenario of programming use by architects and engineers,creating their own unique tools.The goal is to emulate and understand the phenomenon of Building Information Modeling(BIM)software customization by developing plug-ins that can explore the human-environment relationship.Demonstrate the process for building a plugin that seeks to equalize the theory of accessibility technical standards,visually impaired and architects.Use Design Science Research methodologies to guide the construction of artifacts for specific practical problems and the Collaborative Design/Co-design to understand and know the users’expertise.It is argued that the low quality of projects that include elements for the orientation of the visually impaired in Brazil is often related to an unstructured methodology in which important aspects such as the real needs of this group and the human-environment relationship are neglected.展开更多
This paper reports the developed mobile application through the use of advanced technologies such as mobile computing, cloud computing and Global Positioning System (GPS) in order to solve the challenges. The purpose ...This paper reports the developed mobile application through the use of advanced technologies such as mobile computing, cloud computing and Global Positioning System (GPS) in order to solve the challenges. The purpose of this study is to find out how the recent advances and mass adoption of ICT by the public can best be leveraged to enhance the performance of Civil Society Organizations (CSOs) in East Africa. The data collection techniques used are through questionnaires, observations and conducting interviews with different stakeholders in the civil society arena i.e., the donors, the CSOs and the people in society that are given a voice by civil societies. In the system development phase, agile development methodology was used. Analysis of the data collected showed that there is a gap in the availability of a single or a centralized platform which can be easily accessed, user-friendly and reliable where different actors can readily get reliable and up-to-date information about the available CSOs they are interested in. To address this problem, an interactive online directory of CSOs has been developed. The platform is mobile based and enables CSOs to register and fill up their current details, thus ensuring that there is always correct and updated information. The platform is equipped with, among other features, a geo-mapping facility which enables users of the system to correctly geo-locate their civil societies of interest on a map view. The results of system evaluation showed that 88.125% of users were satisfied with the system basing on the evaluation criteria.展开更多
Solar cells made from perovskites have experienced rapid development as examples of third-generation solar cells in recent years. The traditional trial-and-error method is inefficient, and the search space is incredib...Solar cells made from perovskites have experienced rapid development as examples of third-generation solar cells in recent years. The traditional trial-and-error method is inefficient, and the search space is incredibly large. This makes developing advanced perovskite materials, as well as high conversion efficiencies and stability of perovskite solar cells (PSCs), a challenging task. A growing number of data-driven machine learning (ML) applications are being developed in the materials science field, due to the availability of large databases and increased computing power. There are many advantages associated with the use of machine learning to predict the properties of potential perovskite materials, as well as provide additional knowledge on how these materials work to fast-track their progress. Thus, the purpose of this paper is to develop a conceptual model to improve the efficiency of a perovskite solar cell using machine learning techniques in order to improve its performance. This study relies on the application of design science as a method to conduct the research as part of the study. The developed model consists of six phases: Data collection and preprocessing, feature selection and engineering, model training and evaluation, performance assessment, optimization and fine-tuning, and deployment and application. As a result of this model, there is a great deal of promise in advancing the field of perovskite solar cells as well as providing a basis for developing more efficient and cost-effective solar energy technologies in the future.展开更多
In recent years, there has been a revolution in the way that we transmit information through optical communication systems, allowing for fast and high-capacity data transmission using optical communication systems. Du...In recent years, there has been a revolution in the way that we transmit information through optical communication systems, allowing for fast and high-capacity data transmission using optical communication systems. Due to the growing demand for higher-capacity and faster networks, traditional optical communication systems are reaching their limits due to the increasing demand for faster and higher-capacity networks. The advent of machine learning and deep learning approaches has led to the emergence of powerful tools that can dramatically enhance the performance of optical communication systems with significant efficiency improvements. In this paper, we provide an overview of the role that machine learning (ML) and deep learning can play in enhancing the performance of various aspects of optical communication systems, including modulation techniques, channel modelling, equalization, and system optimization methods. The paper discusses the advantages of these approaches, such as improved spectral efficiency, reduced latency, and improved robustness to impairments in the channel, such as spectrum degradation. Additionally, a discussion is made regarding the potential challenges and limitations associated with using machine learning and deep learning in optical communication systems as well as their potential benefits. The purpose of this paper is to provide insight and highlight the potential of these approaches to improve optical communication in the future.展开更多
Saudi Arabian banks are deeply concerned about how to effectively monitor and control security threats. In recent years, the country has taken several steps towards restructuring its organizational security and, conse...Saudi Arabian banks are deeply concerned about how to effectively monitor and control security threats. In recent years, the country has taken several steps towards restructuring its organizational security and, consequently, protecting financial institutions and their clients. However, there are still several challenges left to be addressed. Accordingly, this article aims to address this problem by proposing an abstract framework based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework and International Organization for Standardization/International Electrotechnical Commission (ISO/IEC 27001). The framework proposed in this paper considers the following factors involved in the security policy of Saudi banks: safety, Saudi information bank, operations and security of Saudi banks, Saudi banks’ supplier relationships, risk assessment, risk mitigation, monitoring and detection, incident response, Saudi banks’ business continuity, compliance, education, and awareness about all factors contributing to the framework implementation. This way, the proposed framework provides a comprehensive, unified approach to managing bank security threats. Not only does the proposed framework provide effective guidance on how to identify, assess, and mitigate security threats, but it also instructs how to develop policy and procedure documents relating to security issues.展开更多
Security risk assessment refers to the process of identifying, analyzing, and evaluating potential security risks for an organization. An organization’s assets, personnel, and operations are protected through it as p...Security risk assessment refers to the process of identifying, analyzing, and evaluating potential security risks for an organization. An organization’s assets, personnel, and operations are protected through it as part of a comprehensive security program. Various security assessments models have been published in the literature to protect the Saudi organization’s assets, personnel, and operations. However, these models are redundant and were developed for specific purposes. Hence, the comprehensive security risk assessment model used to safeguard Saudi organizations’ assets, personnel, and operations is still omitted. Using a design science methodology, the objective of this study is to develop a comprehensive security risk assessment model called CSRAM to assess security risks in Saudi Arabian organizations based on the International Organization for Standardization and the International Electrotechnical Commission/Information security risk management (ISO/IEC 27005 ISRM) standard. CSRAM is made up of six stages: threat identification, vulnerability assessment, risk analysis, risk evaluation, risk treatment, and monitoring and review of the risk. The stages have many activities and tasks that need to be accomplished at each stage. Based on the results of the validation of the completeness of the CSRAM, we can say that the CSRAM covers the whole ISO/IEC 27005 ISRM standard, and it is complete.展开更多
Due to urban expansion,agriculture,and the long history of the cadastre in Finland,the cadastral index map has millions of border markers that have low spatial accuracy,incomplete feature properties or both.The low qu...Due to urban expansion,agriculture,and the long history of the cadastre in Finland,the cadastral index map has millions of border markers that have low spatial accuracy,incomplete feature properties or both.The low quality of the border markers creates issues,such as forest cutting machines cutting from the wrong side of the border.As it is unfeasible for the national mapping agency to remeasure all these border markers,crowdsourcing is seen as a solution.However,the task of locating and measuring border markers requires motivated citizens.Therefore,in this study,a gamified map-based artefact enabling citizens to refine the quality of border markers in the cadastral index map was created.The artefact was designed,developed,demonstrated,and evaluated following the design science research approach.This study demonstrated with high sample size that gamified crowdsourcing is viable for motivating citizens to perform even challenging tasks.Of the applied gamification affordances,progression,points,and leaderboard were the most motivating.It was also found that involving stakeholders early in the creation process and focusing on usability of the artefact resulted in a pleasing user experience for the citizens.The artefact even spun a self-organised mapping party during its demonstration.展开更多
基金financed in part by the Coordenacao de Aperfeicoamento de Pessoal de Nivel Superior-Brasil(CAPES)-Finance Code 001 and National Council for Scientific and Technological Development-CNPq.
文摘This article presents the scenario of programming use by architects and engineers,creating their own unique tools.The goal is to emulate and understand the phenomenon of Building Information Modeling(BIM)software customization by developing plug-ins that can explore the human-environment relationship.Demonstrate the process for building a plugin that seeks to equalize the theory of accessibility technical standards,visually impaired and architects.Use Design Science Research methodologies to guide the construction of artifacts for specific practical problems and the Collaborative Design/Co-design to understand and know the users’expertise.It is argued that the low quality of projects that include elements for the orientation of the visually impaired in Brazil is often related to an unstructured methodology in which important aspects such as the real needs of this group and the human-environment relationship are neglected.
文摘This paper reports the developed mobile application through the use of advanced technologies such as mobile computing, cloud computing and Global Positioning System (GPS) in order to solve the challenges. The purpose of this study is to find out how the recent advances and mass adoption of ICT by the public can best be leveraged to enhance the performance of Civil Society Organizations (CSOs) in East Africa. The data collection techniques used are through questionnaires, observations and conducting interviews with different stakeholders in the civil society arena i.e., the donors, the CSOs and the people in society that are given a voice by civil societies. In the system development phase, agile development methodology was used. Analysis of the data collected showed that there is a gap in the availability of a single or a centralized platform which can be easily accessed, user-friendly and reliable where different actors can readily get reliable and up-to-date information about the available CSOs they are interested in. To address this problem, an interactive online directory of CSOs has been developed. The platform is mobile based and enables CSOs to register and fill up their current details, thus ensuring that there is always correct and updated information. The platform is equipped with, among other features, a geo-mapping facility which enables users of the system to correctly geo-locate their civil societies of interest on a map view. The results of system evaluation showed that 88.125% of users were satisfied with the system basing on the evaluation criteria.
文摘Solar cells made from perovskites have experienced rapid development as examples of third-generation solar cells in recent years. The traditional trial-and-error method is inefficient, and the search space is incredibly large. This makes developing advanced perovskite materials, as well as high conversion efficiencies and stability of perovskite solar cells (PSCs), a challenging task. A growing number of data-driven machine learning (ML) applications are being developed in the materials science field, due to the availability of large databases and increased computing power. There are many advantages associated with the use of machine learning to predict the properties of potential perovskite materials, as well as provide additional knowledge on how these materials work to fast-track their progress. Thus, the purpose of this paper is to develop a conceptual model to improve the efficiency of a perovskite solar cell using machine learning techniques in order to improve its performance. This study relies on the application of design science as a method to conduct the research as part of the study. The developed model consists of six phases: Data collection and preprocessing, feature selection and engineering, model training and evaluation, performance assessment, optimization and fine-tuning, and deployment and application. As a result of this model, there is a great deal of promise in advancing the field of perovskite solar cells as well as providing a basis for developing more efficient and cost-effective solar energy technologies in the future.
文摘In recent years, there has been a revolution in the way that we transmit information through optical communication systems, allowing for fast and high-capacity data transmission using optical communication systems. Due to the growing demand for higher-capacity and faster networks, traditional optical communication systems are reaching their limits due to the increasing demand for faster and higher-capacity networks. The advent of machine learning and deep learning approaches has led to the emergence of powerful tools that can dramatically enhance the performance of optical communication systems with significant efficiency improvements. In this paper, we provide an overview of the role that machine learning (ML) and deep learning can play in enhancing the performance of various aspects of optical communication systems, including modulation techniques, channel modelling, equalization, and system optimization methods. The paper discusses the advantages of these approaches, such as improved spectral efficiency, reduced latency, and improved robustness to impairments in the channel, such as spectrum degradation. Additionally, a discussion is made regarding the potential challenges and limitations associated with using machine learning and deep learning in optical communication systems as well as their potential benefits. The purpose of this paper is to provide insight and highlight the potential of these approaches to improve optical communication in the future.
文摘Saudi Arabian banks are deeply concerned about how to effectively monitor and control security threats. In recent years, the country has taken several steps towards restructuring its organizational security and, consequently, protecting financial institutions and their clients. However, there are still several challenges left to be addressed. Accordingly, this article aims to address this problem by proposing an abstract framework based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework and International Organization for Standardization/International Electrotechnical Commission (ISO/IEC 27001). The framework proposed in this paper considers the following factors involved in the security policy of Saudi banks: safety, Saudi information bank, operations and security of Saudi banks, Saudi banks’ supplier relationships, risk assessment, risk mitigation, monitoring and detection, incident response, Saudi banks’ business continuity, compliance, education, and awareness about all factors contributing to the framework implementation. This way, the proposed framework provides a comprehensive, unified approach to managing bank security threats. Not only does the proposed framework provide effective guidance on how to identify, assess, and mitigate security threats, but it also instructs how to develop policy and procedure documents relating to security issues.
文摘Security risk assessment refers to the process of identifying, analyzing, and evaluating potential security risks for an organization. An organization’s assets, personnel, and operations are protected through it as part of a comprehensive security program. Various security assessments models have been published in the literature to protect the Saudi organization’s assets, personnel, and operations. However, these models are redundant and were developed for specific purposes. Hence, the comprehensive security risk assessment model used to safeguard Saudi organizations’ assets, personnel, and operations is still omitted. Using a design science methodology, the objective of this study is to develop a comprehensive security risk assessment model called CSRAM to assess security risks in Saudi Arabian organizations based on the International Organization for Standardization and the International Electrotechnical Commission/Information security risk management (ISO/IEC 27005 ISRM) standard. CSRAM is made up of six stages: threat identification, vulnerability assessment, risk analysis, risk evaluation, risk treatment, and monitoring and review of the risk. The stages have many activities and tasks that need to be accomplished at each stage. Based on the results of the validation of the completeness of the CSRAM, we can say that the CSRAM covers the whole ISO/IEC 27005 ISRM standard, and it is complete.
文摘Due to urban expansion,agriculture,and the long history of the cadastre in Finland,the cadastral index map has millions of border markers that have low spatial accuracy,incomplete feature properties or both.The low quality of the border markers creates issues,such as forest cutting machines cutting from the wrong side of the border.As it is unfeasible for the national mapping agency to remeasure all these border markers,crowdsourcing is seen as a solution.However,the task of locating and measuring border markers requires motivated citizens.Therefore,in this study,a gamified map-based artefact enabling citizens to refine the quality of border markers in the cadastral index map was created.The artefact was designed,developed,demonstrated,and evaluated following the design science research approach.This study demonstrated with high sample size that gamified crowdsourcing is viable for motivating citizens to perform even challenging tasks.Of the applied gamification affordances,progression,points,and leaderboard were the most motivating.It was also found that involving stakeholders early in the creation process and focusing on usability of the artefact resulted in a pleasing user experience for the citizens.The artefact even spun a self-organised mapping party during its demonstration.