11 research outputs found
NLP-based Automated Compliance Checking of Data Processing Agreements against GDPR
Processing personal data is regulated in Europe by the General Data
Protection Regulation (GDPR) through data processing agreements (DPAs).
Checking the compliance of DPAs contributes to the compliance verification of
software systems as DPAs are an important source of requirements for software
development involving the processing of personal data. However, manually
checking whether a given DPA complies with GDPR is challenging as it requires
significant time and effort for understanding and identifying DPA-relevant
compliance requirements in GDPR and then verifying these requirements in the
DPA. In this paper, we propose an automated solution to check the compliance of
a given DPA against GDPR. In close interaction with legal experts, we first
built two artifacts: (i) the "shall" requirements extracted from the GDPR
provisions relevant to DPA compliance and (ii) a glossary table defining the
legal concepts in the requirements. Then, we developed an automated solution
that leverages natural language processing (NLP) technologies to check the
compliance of a given DPA against these "shall" requirements. Specifically, our
approach automatically generates phrasal-level representations for the textual
content of the DPA and compares it against predefined representations of the
"shall" requirements. Over a dataset of 30 actual DPAs, the approach correctly
finds 618 out of 750 genuine violations while raising 76 false violations, and
further correctly identifies 524 satisfied requirements. The approach has thus
an average precision of 89.1%, a recall of 82.4%, and an accuracy of 84.6%.
Compared to a baseline that relies on off-the-shelf NLP tools, our approach
provides an average accuracy gain of ~20 percentage points. The accuracy of our
approach can be improved to ~94% with limited manual verification effort.Comment: 24 pages, 5 figures, 10 tables, 1 Algorithm, TS
Deploying and Evaluating OF@TEIN Access Center and Its Feasibility for Access Federation
For the emerging software-defined infrastructure, to be orchestrated from so-called logically centralized DevOps Tower, the shared accessibility of distributed playground resources and the timely interaction among operators and developers are highly required. In this paper, by taking OF@TEIN SDN-Cloud playground as a target environment, we discuss an access center effort to address the above requirements. In providing the developer presence via the proposed access center, the inherent heterogeneity of internationally dispersed OF@TEIN resources is setting a unique challenge to cope with the broad spectrum of link bandwidths and round-trip delays. The access capability of deployed access center is experimentally verified against a wide range of access network conditions, which would be extended for futuristic access federation with appropriate identity management and resources abstraction for multiple developers and operators
An efficient modification to diagonal systematic sampling for finite populations
This paper presents a new modified diagonal systematic sampling method for the linear trend situation. For numerical illustration, data from the literature have been used to compare the proposed method's efficiency with some existing sampling schemes. The findings show that the proposed new systematic sampling method is more efficient than the existing sampling schemes. Moreover, the improvement in efficiency has also been shown in the case of a perfect linear trend. Mathematical conditions under which the new method is more efficient than the existing sampling schemes have been derived
Entropies of the Y-Junction Type Nanostructures
Recent research on nanostructures has demonstrated their importance and application in a variety of fields. Nanostructures are used directly or indirectly in drug delivery systems, medicine and pharmaceuticals, biological sensors, photodetectors, transistors, optical and electronic devices, and so on. The discovery of carbon nanotubes with Y-shaped junctions is motivated by the development of future advanced electronic devices. Because of their interactionwithY-junctions, electronic switches, amplifiers, and three-terminal transistors are of particular interest. Entropy is a concept that determines the uncertainty of a system or network. Entropy concepts are also used in biology, chemistry, and applied mathematics. Based on the requirements, entropy in the form of a graph can be classified into several types. In 1955, graph-based entropy was introduced. One of the types of entropy is edgeweighted entropy. We examined the abstract form of Y-shaped junctions in this study. Some edge-weight-based entropy formulas for the generic view of Y-shaped junctions were created, and some edge-weighted and topological index-based concepts for Y-shaped junctions were discussed in the present paper
Predicting Cotton Fibre Maturity by Using Artificial Neural Network
Cotton fibre maturity is the measure of cotton’s secondary cell wall thickness. Both immature and over-mature fibres are undesirable in textile industry due to the various problems caused during different manufacturing processes. The determination of cotton fibre maturity is of vital importance and various methods and techniques have been devised to measure or calculate it. Artificial neural networks have the power to model the complex relationships between the input and output variables. Therefore, a model was developed for the prediction of cotton fibre maturity using the fibre characteristics. The results of predictive modelling showed that mean absolute error of 0.0491 was observed between the actual and predicted values, which show a high degree of accuracy for neural network modelling. Moreover, the importance of input variables was also defined
Mobile IP Issues and Their Potential Solutions: An
A typical Internet protocol (IP)could not address the mobility of nodes and was only designed for fixed networks where the nodes were improbable to move from one location to other. An ever-increasing dependence on network computation makes the use of portable and handy devices,inevitable. Mobile IP protocol architecture was developed tomeet such needs and support mobility. Mobile IPlets the roving nodes to establish an uninterrupted connection towards internet without altering the IP address whilemoving to another network.However, Mobile IP goes through several issues like ingress filtering, triangle routing, handoff and Quality of service problems etc. In this paper we discuss few of those with their possible solutions. That resolves these problems, reduce the unnecessary load from the network and enhance the efficiency. Some security threats on mobile and their solutions are also focused to secure the communicationduring mobility