The issue related to the risk of identity impersonation, where one person can be replaced by another in online exam surveillance systems, poses challenges. This study focuses on the effectiveness of detecting attempts...The issue related to the risk of identity impersonation, where one person can be replaced by another in online exam surveillance systems, poses challenges. This study focuses on the effectiveness of detecting attempts of identity impersonation through face substitution during online exams, with the aim of ensuring the integrity of assessments. The goal is to develop facial recognition algorithms capable of precisely detecting these impersonations, training them on a tailored database rather than biased generic data. An original database of student faces has been created. An algorithm leveraging advanced deep learning techniques such as depthwise separable convolution has been developed and evaluated on this database. We achieved very high levels of precision, reaching an accuracy rate of 98% in face detection and recognition.展开更多
Internal control is a hot topic at present academics and for practitioners to explore. Especially under the background of China' s rapid integration into the global economy, the rapid establishment and improvement of...Internal control is a hot topic at present academics and for practitioners to explore. Especially under the background of China' s rapid integration into the global economy, the rapid establishment and improvement of the context of the modem enterprise system, the issue is of utmost importance. The internal accounting control system is the core part of internal control, which determines the extent of establishing the entire sound internal control system, With the progress of the time, the rapid development and wide application of Internet technology has changed the survival environment and management philosophy for business. The development of network technology achieves the online office, mobile office and decentralized offices, etc. Accounting entity is no longer subject to space limitations of traditional methods, thus a large number of accounting information is transmitted tbaough the network communication lines, so that accounting activities can be extended to every node in the world, which achieves the purpose of remote processing. Under the network environment, sources of information are of diversity and multi-channel. A large number of accounting information transmitted from the network communication lines is likely to be illegally intercepted, stolen and tampered by molecules or people with ulterior motives.展开更多
This paper describes the method by which roaming accounts transferred,with FTAM services in telecommunication systems. The functions of FTAM initiator entity and responder entity and realization system are di...This paper describes the method by which roaming accounts transferred,with FTAM services in telecommunication systems. The functions of FTAM initiator entity and responder entity and realization system are discussed.It also presented the way to use FTAM mechanisms by data roaming system in mobile communications.展开更多
Based on the analysis of developing target, function and constitution of research projects system for remote management, the virtual account system is established on 3 layers of B/S mode. The development process of vi...Based on the analysis of developing target, function and constitution of research projects system for remote management, the virtual account system is established on 3 layers of B/S mode. The development process of virtual account system is realized by JSP/Servlets development language and MySQL database under windows server 2003 platform. At the same time, network security module of the system has been realized to reduce the influence caused by network security incidents. The system is capable of updating the information of vertical and horizontal projects dynamically and assigning virtual funds on WWW. Also, it realizes the query, statistical analysis function and so on. Practical results show that the system is a successful system for analyzing the various projects index of different departments.展开更多
This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data cons...This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.展开更多
Enrollments in accounting programs and the demand for accounting graduates are increasing,but the number of candidates sitting for the CPA exam is decreasing.This study compares characteristics of students at a mid-si...Enrollments in accounting programs and the demand for accounting graduates are increasing,but the number of candidates sitting for the CPA exam is decreasing.This study compares characteristics of students at a mid-size regional university who plan to sit for the CPA exam with those who do not.In addition,reasons offered by students for their plans to take or not take the CPA exam are explored.The study finds that a student’s desired career path,as well as their mother’s educational level,is significantly related to their intention to sit for the exam.Career alignment or misalignments were the primary factors shaping a student’s plan to sit for the CPA exam.The proportion of students intending to sit for the CPA exam decreases with class level,and the majority of students intend to work outside of public accounting.This study will be of interest to the profession and public as the decline in CPA examination candidates coincides with a higher than average percentage of CPAs projected to retire in the next three years.展开更多
One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks ba...One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.展开更多
There are over 100 historically black colleges and universities (HBCUs) in the United States. The majority of these HBCUs are located in the southeast section of the United States. HBCUs are a major supplier of cert...There are over 100 historically black colleges and universities (HBCUs) in the United States. The majority of these HBCUs are located in the southeast section of the United States. HBCUs are a major supplier of certified public accountants (CPAs) to the profession. Therefore, the performance of candidates from HBCUs should be of interest to various constituents including educators, employers, parents, students, and other stakeholders. The purpose of this paper is to provide statistical performance on the 2011 CPA examination for large, middle, and small HBCUs based upon the number of testing events taken. Taking a testing event is not the same as passing a testing event. This was the dichotomy between quantity and quality of HBCUs' performances. For large HBCUs, Morehouse University, North Carolina Agricultural and Technical State University (NC A&T), and Tennessee State University (TSU) were cited. For middle HBCUs, Albany State University, Norfolk State University (NSU), and North Carolina Central University (NCCU) were cited. For small HBCUs, Alcorn State University, Fisk University, and University of Maryland Eastern Shore (UMES) were cited. The dichotomy between quantity and quality is real.展开更多
文摘The issue related to the risk of identity impersonation, where one person can be replaced by another in online exam surveillance systems, poses challenges. This study focuses on the effectiveness of detecting attempts of identity impersonation through face substitution during online exams, with the aim of ensuring the integrity of assessments. The goal is to develop facial recognition algorithms capable of precisely detecting these impersonations, training them on a tailored database rather than biased generic data. An original database of student faces has been created. An algorithm leveraging advanced deep learning techniques such as depthwise separable convolution has been developed and evaluated on this database. We achieved very high levels of precision, reaching an accuracy rate of 98% in face detection and recognition.
文摘Internal control is a hot topic at present academics and for practitioners to explore. Especially under the background of China' s rapid integration into the global economy, the rapid establishment and improvement of the context of the modem enterprise system, the issue is of utmost importance. The internal accounting control system is the core part of internal control, which determines the extent of establishing the entire sound internal control system, With the progress of the time, the rapid development and wide application of Internet technology has changed the survival environment and management philosophy for business. The development of network technology achieves the online office, mobile office and decentralized offices, etc. Accounting entity is no longer subject to space limitations of traditional methods, thus a large number of accounting information is transmitted tbaough the network communication lines, so that accounting activities can be extended to every node in the world, which achieves the purpose of remote processing. Under the network environment, sources of information are of diversity and multi-channel. A large number of accounting information transmitted from the network communication lines is likely to be illegally intercepted, stolen and tampered by molecules or people with ulterior motives.
文摘This paper describes the method by which roaming accounts transferred,with FTAM services in telecommunication systems. The functions of FTAM initiator entity and responder entity and realization system are discussed.It also presented the way to use FTAM mechanisms by data roaming system in mobile communications.
基金This work is supported by Liaoning Province Doctoral Startup Grant 20031069 and China National "863"CI MS Foundation ( NO2003AA412030 9 ,2004AA412020 08)
文摘Based on the analysis of developing target, function and constitution of research projects system for remote management, the virtual account system is established on 3 layers of B/S mode. The development process of virtual account system is realized by JSP/Servlets development language and MySQL database under windows server 2003 platform. At the same time, network security module of the system has been realized to reduce the influence caused by network security incidents. The system is capable of updating the information of vertical and horizontal projects dynamically and assigning virtual funds on WWW. Also, it realizes the query, statistical analysis function and so on. Practical results show that the system is a successful system for analyzing the various projects index of different departments.
文摘This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.
文摘Enrollments in accounting programs and the demand for accounting graduates are increasing,but the number of candidates sitting for the CPA exam is decreasing.This study compares characteristics of students at a mid-size regional university who plan to sit for the CPA exam with those who do not.In addition,reasons offered by students for their plans to take or not take the CPA exam are explored.The study finds that a student’s desired career path,as well as their mother’s educational level,is significantly related to their intention to sit for the exam.Career alignment or misalignments were the primary factors shaping a student’s plan to sit for the CPA exam.The proportion of students intending to sit for the CPA exam decreases with class level,and the majority of students intend to work outside of public accounting.This study will be of interest to the profession and public as the decline in CPA examination candidates coincides with a higher than average percentage of CPAs projected to retire in the next three years.
文摘One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.
文摘There are over 100 historically black colleges and universities (HBCUs) in the United States. The majority of these HBCUs are located in the southeast section of the United States. HBCUs are a major supplier of certified public accountants (CPAs) to the profession. Therefore, the performance of candidates from HBCUs should be of interest to various constituents including educators, employers, parents, students, and other stakeholders. The purpose of this paper is to provide statistical performance on the 2011 CPA examination for large, middle, and small HBCUs based upon the number of testing events taken. Taking a testing event is not the same as passing a testing event. This was the dichotomy between quantity and quality of HBCUs' performances. For large HBCUs, Morehouse University, North Carolina Agricultural and Technical State University (NC A&T), and Tennessee State University (TSU) were cited. For middle HBCUs, Albany State University, Norfolk State University (NSU), and North Carolina Central University (NCCU) were cited. For small HBCUs, Alcorn State University, Fisk University, and University of Maryland Eastern Shore (UMES) were cited. The dichotomy between quantity and quality is real.