Mobile security: Threats and best practices

P Weichbroth, Ł Łysik - Mobile Information Systems, 2020 - Wiley Online Library
Communicating mobile security threats and best practices has become a central objective
due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this …

Extractive document summarization using an adaptive, knowledge based cognitive model

M Rajangam, C Annamalai - Cognitive Systems Research, 2019 - Elsevier
Document summarization involves identifying the salient text in a document and creating a
representative summary. The event-index cognitive model describes the human cognitive …

A model of a tacit knowledge transformation for the service department in a manufacturing company: a case study

A Dudek, J Patalas-Maliszewska - Foundations of Management, 2016 - sciendo.com
This article elaborates on the development of a dedicated model of a tacit knowledge
transformation for the service department in a manufacturing company. The four main …

[HTML][HTML] Enhancing Word Embeddings for Improved Semantic Alignment

J Szymański, M Operlejn, P Weichbroth - Applied Sciences, 2024 - mdpi.com
This study introduces a method for the improvement of word vectors, addressing the
limitations of traditional approaches like Word2Vec or GloVe through introducing into …

Supporting investment decisions based on cognitive technology

P Oleksyk, M Hernes, B Nita, H Dudycz… - Towards Industry 4.0 …, 2020 - Springer
The aim of the chapter is to present the conception of the prediction module for supporting
investment decisions based on the cognitive technology. Managers must make investment …

Interval model of the user reactions to messages in thematic groups of social networks

M Dyvak, A Melnyk, Y Kedrin - 2022 IEEE 16th International …, 2022 - ieeexplore.ieee.org
Mathematical models of dynamics of efficiency of information social networks are considered
in the work. An approach to estimating model parameters is proposed. A number of …

A Method of Detecting Anomalies in IP Phone Traffic based on Ontology of Voip Messages

A Melnyk, R Shevchuk, I Romanets… - 2024 14th …, 2024 - ieeexplore.ieee.org
The increased use of VoIP technology heightens the potential threats to ordinary users. This
study examines the peculiarities of implementing corporate VoIP telephony systems …

[PDF][PDF] UML 2.0 based round trip engineering framework for the development of SPF based secure application

N Pathak - Journal of Engineering Science and Technology, 2018 - academia.edu
This research paper proposes the UML 2.0 based framework for round-trip engineering and
use of Security Performance Flexibility model to keep high security in web applications. This …

Business process changes on the implementation of artificial intelligence

OA Adorno - 2020 - teses.usp.br
The process of digital transformation will affect all organizations. In businesses that have
already started this process, artificial intelligence (AI) solutions have begun to appear. What …

[PDF][PDF] Single or Multi-document Summarization Techniques

M Bhide - vol, 2016 - academia.edu
The current age of information overload demands a need for text summarization. The aim of
automatic summarization is to create a compressed version of the source text while …