期刊文献+
共找到55,103篇文章
< 1 2 250 >
每页显示 20 50 100
How to implement a knowledge graph completeness assessment with the guidance of user requirements
1
作者 ZHANG Ying XIAO Gang 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第3期679-688,共10页
In the context of big data, many large-scale knowledge graphs have emerged to effectively organize the explosive growth of web data on the Internet. To select suitable knowledge graphs for use from many knowledge grap... In the context of big data, many large-scale knowledge graphs have emerged to effectively organize the explosive growth of web data on the Internet. To select suitable knowledge graphs for use from many knowledge graphs, quality assessment is particularly important. As an important thing of quality assessment, completeness assessment generally refers to the ratio of the current data volume to the total data volume.When evaluating the completeness of a knowledge graph, it is often necessary to refine the completeness dimension by setting different completeness metrics to produce more complete and understandable evaluation results for the knowledge graph.However, lack of awareness of requirements is the most problematic quality issue. In the actual evaluation process, the existing completeness metrics need to consider the actual application. Therefore, to accurately recommend suitable knowledge graphs to many users, it is particularly important to develop relevant measurement metrics and formulate measurement schemes for completeness. In this paper, we will first clarify the concept of completeness, establish each metric of completeness, and finally design a measurement proposal for the completeness of knowledge graphs. 展开更多
关键词 knowledge graph completeness assessment relative completeness user requirement quality management
下载PDF
Requirements ranking based on crowd-sourcing high-end product USs
2
作者 MA Yufeng DOU Yajie +2 位作者 XU Xiangqian JIA Qingyang TAN Yuejin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期94-104,共11页
Based on the characteristics of high-end products,crowd-sourcing user stories can be seen as an effective means of gathering requirements,involving a large user base and generating a substantial amount of unstructured... Based on the characteristics of high-end products,crowd-sourcing user stories can be seen as an effective means of gathering requirements,involving a large user base and generating a substantial amount of unstructured feedback.The key challenge lies in transforming abstract user needs into specific ones,requiring integration and analysis.Therefore,we propose a topic mining-based approach to categorize,summarize,and rank product requirements from user stories.Specifically,after determining the number of story categories based on py LDAvis,we initially classify“I want to”phrases within user stories.Subsequently,classic topic models are applied to each category to generate their names,defining each post-classification user story category as a requirement.Furthermore,a weighted ranking function is devised to calculate the importance of each requirement.Finally,we validate the effectiveness and feasibility of the proposed method using 2966 crowd-sourced user stories related to smart home systems. 展开更多
关键词 high-end product complex system crowd-sourcing user stories topic mining requirements ranking
下载PDF
Classification and Comprehension of Software Requirements Using Ensemble Learning
3
作者 Jalil Abbas Arshad Ahmad +4 位作者 Syed Muqsit Shaheed Rubia Fatima Sajid Shah Mohammad Elaffendi Gauhar Ali 《Computers, Materials & Continua》 SCIE EI 2024年第8期2839-2855,共17页
The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human re... The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes. 展开更多
关键词 Ensemble learning machine learning non-functional requirements requirement engineering accuracy sliding window
下载PDF
Hepatitis B Surface Antigen and Hepatitis C Virus Antibodies among Drug Users in Burkina Faso
4
作者 Sylvie Zida Kadari Cissé +13 位作者 Odette Ky-Zerbo Dinanibè Kambiré Serge Théophile Soubeiga Simon Tiendrebéogo Fatou Sissoko Issa Sory Célestine Ki-Toé Solange Dioma Djeneba Zorom Adama Ouédraogo Cedric Dimitri Axon Hien Mahamoudou Sanou Seni Kouanda Henri Gautier Ouédraogo 《Advances in Microbiology》 CAS 2024年第1期92-104,共13页
Introduction: The epidemiology of both hepatitis B virus (HBV) and hepatitis C virus (HCV) infections among drug users (DUs) is little known in West Africa. The study aimed to assess the prevalence of hepatitis B and ... Introduction: The epidemiology of both hepatitis B virus (HBV) and hepatitis C virus (HCV) infections among drug users (DUs) is little known in West Africa. The study aimed to assess the prevalence of hepatitis B and C viruses among drug users in Burkina Faso. Methodology: This was a cross-sectional biological and behavioral survey conducted between June and August 2022, among drug users in Ouagadougou and Bobo Dioulasso, the two main cities of Burkina Faso. A respondent-driven sampling (RDS) was used to recruit drug users. Hepatitis B surface antigen was determined using lateral flow rapid test kits and antibodies to hepatitis C virus in serum determined using an Enzyme-Linked Immunosorbent Assay. Data were entered and analyzed using Stata 17 software. Weighted binary logistic regression was used to identify the associated factors of hepatitis B and C infections and a p-value Results: A total of 323 drug users were recruited with 97.5% males. The mean age was 32.7 years old. The inhaled or smoked mode was the most used by drug users. The adjusted hepatitis B and hepatitis C prevalence among study participants were 11.1% and 2.3% respectively. The marital status (p = 0.001), and the nationality (p = 0.011) were significantly associated with hepatitis B infection. The type of drug used was not significantly associated with hepatitis B infection or hepatitis C infection. Conclusion: The prevalence of HBsAg and anti-HCV antibodies among DUs are comparable to those reported in the general population in Burkina Faso. This result suggests that the main routes of contamination by HBV and HCV among DUs are similar to those in the population, and could be explained by the low use of the injectable route by DUs in Burkina Faso. 展开更多
关键词 Drug users Hepatitis C Hepatitis B PREVALENCE Burkina Faso
下载PDF
An Investigation on Open-RAN Specifications:Use Cases,Security Threats,Requirements,Discussions
5
作者 Heejae Park Tri-HaiNguyen Laihyuk Park 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期13-41,共29页
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece... The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security. 展开更多
关键词 O-RAN ARCHITECTURE use cases security issues security requirements security discussions
下载PDF
Autoantibodies against beta cells to predict early insulin requirements in pediatric patients with clinically diagnosed type 2 diabetes
6
作者 Jorge M Molina Patricia G Medina +4 位作者 Rita A Gomez Julia R Herrera Nancy L Martínez Brenda Hernández Yesenia García 《World Journal of Diabetes》 SCIE 2024年第8期1717-1725,共9页
BACKGROUND Autoimmunity has emerged as a probable disease modifier in patients with clinically diagnosed type 2 diabetes mellitus(T2DM),that is,patients who have insulin resistance,obesity,and other cardiovascular ris... BACKGROUND Autoimmunity has emerged as a probable disease modifier in patients with clinically diagnosed type 2 diabetes mellitus(T2DM),that is,patients who have insulin resistance,obesity,and other cardiovascular risk factors,suggesting that the presence of glutamic acid decarboxylase(anti-GAD65),islet antigen 2(anti-IA2),and zinc transporter 8(anti-Zn8T)antibodies could have deleterious effects on beta cell function,causing failure and earlier requirement for insulin treatment.AIM To evaluate anti-GAD65,anti-IA2 and anti-Zn8T as predictors of early insulin requirement in adolescents with a clinical diagnosis of T2DM.METHODS This was a case–control study in patients with clinically diagnosed with T2DM(68 cases and 64 controls with and without early insulin dependence respectively),male and female,aged 12–18 years.Somatometry,blood pressure,glucose,insulin,C-peptide,glycated hemoglobin A1c,and lipid profiles were assessed.ELISA was used to measure anti-GAD65,anti-IA2,and anti-Zn8T antibodies.Descriptive statistics,Pearson'sχ2 test,Student's t test,and logistic regression was performed.P<0.05 was considered statistically significant.RESULTS There were 132 patients(53.8%female),with a mean age was 15.9±1.3 years,and there was a disease evolution time of 4.49±0.88 years.The presence of anti-GAD65,anti-IA2,and anti-Zn8T positivity was found in 29.5%,18.2%,and 15.9%,respectively.Dividing the groups by early or no insulin dependence showed that the group with insulin had a higher frequency of antibody positivity:anti-GAD65 odds ratio(OR):2.42(1.112–5.303,P=0.026);anti-IA2:OR:1.55(0.859–2.818,P=0.105);and anti-Zn8T:OR:7.32(2.039–26.279,P=0.002).CONCLUSION Anti-GAD65 positivity was high in our study.Anti-GAD65 and anti-Zn8T positivity showed a significantly depleted beta cell reserve phenotype,leading to an increased risk of early insulin dependence. 展开更多
关键词 DIABETES OBESITY Adolescents AUTOIMMUNITY Beta cell Insulin requirements
下载PDF
Research Progress on Nutritional Requirements of Carp
7
作者 Yina LU 《Asian Agricultural Research》 2024年第1期37-39,43,共4页
Carp is a temperate freshwater fish native to Asia,distributed in all regions of the world except Australia and South America.With the improvement of comprehensive and healthy breeding technology of carp,the unit yiel... Carp is a temperate freshwater fish native to Asia,distributed in all regions of the world except Australia and South America.With the improvement of comprehensive and healthy breeding technology of carp,the unit yield has been greatly increased mainly due to the exten-sive use of compound feed.In this study,the nutritional requirements of carp were summarized from the aspects of protein,amino acids,fat,carbohydrate,calcium and phosphorus,vitamins and taurine.This study provides a certain theoretical reference for scientific formula of carp feed. 展开更多
关键词 CARP Nutritional requirements Foreground
下载PDF
Evaluation of an Autonomous Vehicle User Interface for Sensory Impaired Users
8
作者 Elena Angeleska Linda Lüchtrath Paolo Pretto 《Journal of Transportation Technologies》 2024年第4期570-589,共20页
Autonomous vehicles (AVs) hold immense promises in revolutionizing transportation, and their potential benefits extend to individuals with impairments, particularly those with vision and hearing impairments. However, ... Autonomous vehicles (AVs) hold immense promises in revolutionizing transportation, and their potential benefits extend to individuals with impairments, particularly those with vision and hearing impairments. However, the accommodation of these individuals in AVs requires developing advanced user interfaces. This paper describes an explorative study of a multimodal user interface for autonomous vehicles, specifically developed for passengers with sensory (vision and/or hearing) impairments. In a driving simulator, 32 volunteers with simulated sensory impairments, were exposed to multiple drives in an autonomous vehicle while freely interacting with standard and inclusive variants of the infotainment and navigation system interface. The two user interfaces differed in graphical layout and voice messages, which adopted inclusive design principles for the inclusive variant. Questionnaires and structured interviews were conducted to collect participants’ impressions. The data analysis reports positive user experiences, but also identifies technical challenges. Verified guidelines are provided for further development of inclusive user interface solutions. 展开更多
关键词 Autonomous Vehicles user Interface Inclusive Design Wizard of Oz Simulation
下载PDF
Reform of the Irrigation Sector and Creation of Functional and Sustainable Irrigation Water Users Associations (AUEI) in Niger: Capitalization of the Experience of the Konni AHA
9
作者 Saidou Abdoulkarimou Illou Mahamadou 《Agricultural Sciences》 2024年第2期209-229,共21页
During the 1980s, as part of a policy of liberalization, following budgetary cuts linked to the implementation of structural adjustment programs, management responsibilities for AHAs were transferred from ONAHA to coo... During the 1980s, as part of a policy of liberalization, following budgetary cuts linked to the implementation of structural adjustment programs, management responsibilities for AHAs were transferred from ONAHA to cooperatives concerned. Due to lack of financial resources, but also because of poor management, everywhere in Niger we are witnessing an accelerated deterioration of the irrigation infrastructure of hydro-agricultural developments. Institutional studies carried out on this situation led the State of Niger to initiate a reform of the governance of hydro-agricultural developments, by streng-thening the status of ONAHA, by creating an Association of Irrigation Water Users (AUEI) and by restructuring the old cooperatives. Indeed, this research aims to analyze the creation of functional and sustainable Irrigation Water User Associations (AUEI) in Niger in a context of reform of the irrigation sector, and based on the experience of the Konni AHA. It is based on a methodological approach which takes into account documentary research and the collection of data from 115 farmers, selected by reasoned choice and directly concerned by the management of the irrigated area. The data collected was analyzed and the results were analyzed using the systemic approach and the diagnostic process. The results show that the main mission of the AUEI is to ensure better management of water, hydraulic equipment and infrastructure on the hydro-agricultural developments of Konni. The creation of the Konni AUEI was possible thanks to massive support from the populations and authorities in the implementation process. After its establishment, the AUEI experienced a certain lethargy for some time due to the rehabilitation work of the AHA but currently it is functional and operational in terms of associative life and governance. Thus, the constraints linked to the legal system, the delay in the completion of the work, the uncertainties of access to irrigation water but also the problems linked to the change in mentality of certain ONAHA agents constitute the challenges that must be resolved in the short term for the operationalization of the Konni AUEI. 展开更多
关键词 Konni (Niger) Hydro-Agricultural Developments Association of Irrigation Water users GOVERNANCE
下载PDF
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
10
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHALLENGES Internet of Things(IoT) privacy and security security requirements solar insecticidal lamps(SIL)
下载PDF
Design Method for Optimizing the Interactive Interface of Live Broadcasting Platform for the Elderly Users
11
作者 WEI Bi-ze FAN Wei DUAN Ying-ke 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第4期167-178,共12页
In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interact... In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interaction design mode used is still mainly based on the interaction mode for young groups,and is not designed for elderly users.Therefore,a design method for optimizing the interaction interface of live broadcasting platform for elderly users was proposed in this study.Firstly,the case study method and Delphi expert survey method were used to determine the design needs of elderly users and the design mode was analysed.Secondly,the orthogonal design principle was used to design a test sample of the interactive interface of live broadcasting platform applicable for the elderly users,and then a user evaluation system was established to calculate the weights of the design elements using hierarchical analysis,and then the predictive relationship between the design mode of the interactive interface of live broadcasting platform and the elderly users was established by Quantitative Theory I.Finally,Genetic Algorithm was applied to generate the optimized design scheme.The results showed that the design method based on the Genetic Algorithm and the combination of Quantitative Theory can scientifically and effectively optimize the design of the interactive interface of the live broadcasting platform for the elderly users,and improve the experience of the elderly users. 展开更多
关键词 Live broadcasting platform Interaction design Elderly users Genetic Algorithm Quantitative Theory I
下载PDF
Operational requirements analysis method based on question answering of WEKG
12
作者 ZHANG Zhiwei DOU Yajie +3 位作者 XU Xiangqian MA Yufeng JIANG Jiang TAN Yuejin 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期386-395,共10页
The weapon and equipment operational requirement analysis(WEORA) is a necessary condition to win a future war,among which the acquisition of knowledge about weapons and equipment is a great challenge. The main challen... The weapon and equipment operational requirement analysis(WEORA) is a necessary condition to win a future war,among which the acquisition of knowledge about weapons and equipment is a great challenge. The main challenge is that the existing weapons and equipment data fails to carry out structured knowledge representation, and knowledge navigation based on natural language cannot efficiently support the WEORA. To solve above problem, this research proposes a method based on question answering(QA) of weapons and equipment knowledge graph(WEKG) to construct and navigate the knowledge related to weapons and equipment in the WEORA. This method firstly constructs the WEKG, and builds a neutral network-based QA system over the WEKG by means of semantic parsing for knowledge navigation. Finally, the method is evaluated and a chatbot on the QA system is developed for the WEORA. Our proposed method has good performance in the accuracy and efficiency of searching target knowledge, and can well assist the WEORA. 展开更多
关键词 operational requirement analysis weapons and equipment knowledge graph(WEKG) question answering(QA) neutral network
下载PDF
Macroscopic Traversable Wormholes: Minimum Requirements
13
作者 Peter K. F. Kuhfittig 《International Journal of Astronomy and Astrophysics》 2024年第3期230-243,共14页
While wormholes are just as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. To allow for the possibility of interstellar travel, a macroscopic... While wormholes are just as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. To allow for the possibility of interstellar travel, a macroscopic wormhole would need to maintain sufficiently low radial tidal forces. It is proposed in this paper that the assumption of zero tidal forces, i.e., the limiting case, is sufficient for overcoming the restrictions from quantum field theory. The feasibility of this approach is subsequently discussed by 1) introducing the additional conditions needed to ensure that the radial tidal forces can indeed be sufficiently low and 2) by viewing traversable wormholes as emergent phenomena, thereby increasing the likelihood of their existence. 展开更多
关键词 Morris-Thorne Wormholes Traversability Minimum requirements STABILITY Compatibility with Quantum Field Theory
下载PDF
The Customer Requirements Analysis Method of Engineering Products Based on Multiple Preference Information
14
作者 Guo Mao 《Proceedings of Business and Economic Studies》 2024年第1期204-209,共6页
To effectively evaluate the fuzziness of the market environment in product planning,a customer requirements analysis method based on multiple preference information is proposed.Firstly,decision-makers use a preferred ... To effectively evaluate the fuzziness of the market environment in product planning,a customer requirements analysis method based on multiple preference information is proposed.Firstly,decision-makers use a preferred information form to evaluate the importance of each customer requirement.Secondly,a transfer function is employed to unify various forms of preference information into a fuzzy complementary judgment matrix.The ranking vector is then calculated using row and normalization methods,and the initial importance of customer requirements is obtained by aggregating the weights of decision members.Finally,the correction coefficients of initial importance and each demand are synthesized,and the importance of customer requirements is determined through normalization.The development example of the PE jaw crusher demonstrates the effectiveness and feasibility of the proposed method. 展开更多
关键词 Product planning Customer requirements Importance ratings Multi-format information
下载PDF
A Study on Aligning Nursing Curriculum with Hospital Clinical Competency Requirements
15
作者 Xuemei Li Jarrent Tayag 《Journal of Contemporary Educational Research》 2024年第9期283-289,共7页
The purpose of this study is to coordinate the alignment between the nursing curriculum and hospital clinical competencies,identify the reasons for the gaps,evaluate the impact of these gaps on the nursing profession,... The purpose of this study is to coordinate the alignment between the nursing curriculum and hospital clinical competencies,identify the reasons for the gaps,evaluate the impact of these gaps on the nursing profession,and propose strategies to bridge these gaps.This study will help strengthen nursing education,improve nursing students’skills,and help students adapt to complex clinical environments. 展开更多
关键词 Nursing education Clinical competency Hospital requirements Curriculum alignment Gap analysis
下载PDF
Study of the Interior Design Based on Elderly People’s Psychological Behaviors and Requirements
16
作者 Yu-xin Jiang Ai-li Wang 《Journal of Architectural Research and Development》 2024年第6期70-75,共6页
Nowadays,the elderly have become an increasingly large group of people in China,but still many problems exist in their living space.This paper explores the physiological and psychological behavioral changes of the eld... Nowadays,the elderly have become an increasingly large group of people in China,but still many problems exist in their living space.This paper explores the physiological and psychological behavioral changes of the elderly,studies their living space requirements,and tries to put forward targeted design strategies in response.Therefore,making a better and more reasonable living space for the elderly as well as improving their living quality,finally helping the development of elderly-friendly design in China. 展开更多
关键词 Interior design Elderly-friendly design Elderly’s requirement
下载PDF
The Intersection of Privacy by Design and Behavioral Economics: Nudging Users towards Privacy-Friendly Choices
17
作者 Vivek Kumar Agarwal 《Journal of Information Security》 2024年第4期557-563,共7页
This paper conducts a comprehensive review of existing research on Privacy by Design (PbD) and behavioral economics, explores the intersection of Privacy by Design (PbD) and behavioral economics, and how designers can... This paper conducts a comprehensive review of existing research on Privacy by Design (PbD) and behavioral economics, explores the intersection of Privacy by Design (PbD) and behavioral economics, and how designers can leverage “nudges” to encourage users towards privacy-friendly choices. We analyze the limitations of rational choice in the context of privacy decision-making and identify key opportunities for integrating behavioral economics into PbD. We propose a user-centered design framework for integrating behavioral economics into PbD, which includes strategies for simplifying complex choices, making privacy visible, providing feedback and control, and testing and iterating. Our analysis highlights the need for a more nuanced understanding of user behavior and decision-making in the context of privacy, and demonstrates the potential of behavioral economics to inform the design of more effective PbD solutions. 展开更多
关键词 Privacy by Design Behavioral Economics Nudges user-Centric Design Data Protection Cognitive Biases HEURISTICS
下载PDF
Enable Excel-Based Basic Cybersecurity Features for End Users by Using Python-Excel Integration
18
作者 Mohamed Breik Osama Magdy +2 位作者 Essam Amin Tarek Aly Mervat Gheith 《Journal of Software Engineering and Applications》 2024年第6期522-529,共8页
In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously int... In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden. 展开更多
关键词 Python End-user Approach EXCEL Excel Add-In CYBERSECURITY URL Check API Virustotal API Encryption Decryption Vigenère Cipher Python-Excel Integration
下载PDF
Adjusting the information service strategies according to users' requirements—A survey of the library users' information requirements in the four library systems of Zhejiang province
19
作者 XU Puying 《Chinese Journal of Library and Information Science》 2009年第2期83-102,共20页
Based on a survey of the circumstances of the information requirements in social science from more than 3,800 library users in 48 libraries of the four major library systems in Zhejiang Province,this paper analyzes th... Based on a survey of the circumstances of the information requirements in social science from more than 3,800 library users in 48 libraries of the four major library systems in Zhejiang Province,this paper analyzes the present main characteristics of the users' requirements to the social science document information and puts forward some proposals for adjusting the document information service strategies for the library and information institutions. 展开更多
关键词 Zhejiang province LIBRARY Social science information service user survey Information service strategy
下载PDF
ICT eServices Requirements to Address Rural Users Expectations and Needs
20
作者 Nobert Rangarirai Jere Mamello Thinyane Alfredo Terzoli 《通讯和计算机(中英文版)》 2012年第3期285-296,共12页
关键词 信息通信技术 电子服务 农村用户 共享信息 期望 农村社区 技术专家 社会交往
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部