11 research outputs found

    NLP-based Automated Compliance Checking of Data Processing Agreements against GDPR

    Get PDF
    Processing personal data is regulated in Europe by the General Data Protection Regulation (GDPR) through data processing agreements (DPAs). Checking the compliance of DPAs contributes to the compliance verification of software systems as DPAs are an important source of requirements for software development involving the processing of personal data. However, manually checking whether a given DPA complies with GDPR is challenging as it requires significant time and effort for understanding and identifying DPA-relevant compliance requirements in GDPR and then verifying these requirements in the DPA. In this paper, we propose an automated solution to check the compliance of a given DPA against GDPR. In close interaction with legal experts, we first built two artifacts: (i) the "shall" requirements extracted from the GDPR provisions relevant to DPA compliance and (ii) a glossary table defining the legal concepts in the requirements. Then, we developed an automated solution that leverages natural language processing (NLP) technologies to check the compliance of a given DPA against these "shall" requirements. Specifically, our approach automatically generates phrasal-level representations for the textual content of the DPA and compares it against predefined representations of the "shall" requirements. Over a dataset of 30 actual DPAs, the approach correctly finds 618 out of 750 genuine violations while raising 76 false violations, and further correctly identifies 524 satisfied requirements. The approach has thus an average precision of 89.1%, a recall of 82.4%, and an accuracy of 84.6%. Compared to a baseline that relies on off-the-shelf NLP tools, our approach provides an average accuracy gain of ~20 percentage points. The accuracy of our approach can be improved to ~94% with limited manual verification effort.Comment: 24 pages, 5 figures, 10 tables, 1 Algorithm, TS

    Deploying and Evaluating OF@TEIN Access Center and Its Feasibility for Access Federation

    Get PDF
    For the emerging software-defined infrastructure, to be orchestrated from so-called logically centralized DevOps Tower, the shared accessibility of distributed playground resources and the timely interaction among operators and developers are highly required. In this paper, by taking OF@TEIN SDN-Cloud playground as a target environment, we discuss an access center effort to address the above requirements. In providing the developer presence via the proposed access center, the inherent heterogeneity of internationally dispersed OF@TEIN resources is setting a unique challenge to cope with the broad spectrum of link bandwidths and round-trip delays. The access capability of deployed access center is experimentally verified against a wide range of access network conditions, which would be extended for futuristic access federation with appropriate identity management and resources abstraction for multiple developers and operators

    An efficient modification to diagonal systematic sampling for finite populations

    No full text
    This paper presents a new modified diagonal systematic sampling method for the linear trend situation. For numerical illustration, data from the literature have been used to compare the proposed method's efficiency with some existing sampling schemes. The findings show that the proposed new systematic sampling method is more efficient than the existing sampling schemes. Moreover, the improvement in efficiency has also been shown in the case of a perfect linear trend. Mathematical conditions under which the new method is more efficient than the existing sampling schemes have been derived

    Entropies of the Y-Junction Type Nanostructures

    No full text
    Recent research on nanostructures has demonstrated their importance and application in a variety of fields. Nanostructures are used directly or indirectly in drug delivery systems, medicine and pharmaceuticals, biological sensors, photodetectors, transistors, optical and electronic devices, and so on. The discovery of carbon nanotubes with Y-shaped junctions is motivated by the development of future advanced electronic devices. Because of their interactionwithY-junctions, electronic switches, amplifiers, and three-terminal transistors are of particular interest. Entropy is a concept that determines the uncertainty of a system or network. Entropy concepts are also used in biology, chemistry, and applied mathematics. Based on the requirements, entropy in the form of a graph can be classified into several types. In 1955, graph-based entropy was introduced. One of the types of entropy is edgeweighted entropy. We examined the abstract form of Y-shaped junctions in this study. Some edge-weight-based entropy formulas for the generic view of Y-shaped junctions were created, and some edge-weighted and topological index-based concepts for Y-shaped junctions were discussed in the present paper

    Predicting Cotton Fibre Maturity by Using Artificial Neural Network

    No full text
    Cotton fibre maturity is the measure of cotton’s secondary cell wall thickness. Both immature and over-mature fibres are undesirable in textile industry due to the various problems caused during different manufacturing processes. The determination of cotton fibre maturity is of vital importance and various methods and techniques have been devised to measure or calculate it. Artificial neural networks have the power to model the complex relationships between the input and output variables. Therefore, a model was developed for the prediction of cotton fibre maturity using the fibre characteristics. The results of predictive modelling showed that mean absolute error of 0.0491 was observed between the actual and predicted values, which show a high degree of accuracy for neural network modelling. Moreover, the importance of input variables was also defined

    Mobile IP Issues and Their Potential Solutions: An

    No full text
    A typical Internet protocol (IP)could not address the mobility of nodes and was only designed for fixed networks where the nodes were improbable to move from one location to other. An ever-increasing dependence on network computation makes the use of portable and handy devices,inevitable. Mobile IP protocol architecture was developed tomeet such needs and support mobility. Mobile IPlets the roving nodes to establish an uninterrupted connection towards internet without altering the IP address whilemoving to another network.However, Mobile IP goes through several issues like ingress filtering, triangle routing, handoff and Quality of service problems etc. In this paper we discuss few of those with their possible solutions. That resolves these problems, reduce the unnecessary load from the network and enhance the efficiency. Some security threats on mobile and their solutions are also focused to secure the communicationduring mobility
    corecore