

Agent Based Modeling for Comparing the Performances of Hyperbolic and Zeng and Martinez Activations Functions |
Pages: 250-257 (8) | [Full Text] PDF (667 KB) |
MA Azim, S Sathasivam, SAS Alzaeemi, M Mahmood |
School of Mathematical Sciences, Universiti Sains Malaysia, 11800 USM, Penang Malaysia |
Abstract - Agent based modeling is widely emerging phenomenon used for comparing the performances of activation functions. There are many customary activation functions which we are using with neural networks (NNs). The appearance of activation functions for artificial neural networks (ANNs) is used as system functions in research and technology. The most common way for the use of this demand were its boundedness in the unit interval, the functions, and its derivatives fast computability, and a number of amenable mathematical properties in the realm of approximation theory. The sole reason of this research paper is to develop the most effective activation function in doing logic programming in the background of Hopfield network. A correlation is carried out between hyperbolic tangent activation functions and (Zeng & Martinez) function based on Wan Abdullah method. These evaluations are done on the basis of global minima ratio, hamming distance and computational time. Moreover computer simulations using software NETLOGO 5.3.1 are carried out to compare the effectiveness of these two activations functions. |
Index Terms - Logic Programming Hopfield network, Wan Abdullahs method, Zeng and Martinez function, Hyperbolic Tangent activations function |
C itation - MA Azim, S Sathasivam, SAS Alzaeemi, M Mahmood. "Agent Based Modeling for Comparing the Performances of Hyperbolic and Zeng and Martinez Activations Functions." International Journal of Computer Networks and Communications Security 7, no. 12 (2019): 250-257. |
The Effect of Tax Knowledge, Service Quality, and Tax Sanctions on Taxpayers Land and Building Tax Compliance |
Pages: 258-265 (8) | [Full Text] PDF (325 KB) |
RHDP Sari, I Kusumawardhani |
Accounting Department, Economic and Business Faculty, Universitas Pembangunan Nasional Veteran JakartaAccounting Department, Economic and Business Faculty, Universitas Pembangunan Nasional “Veteran” Yogyakarta |
Abstract - Land and Building tax is one source of local revenues that drives regional development. For this reason, it is necessary to raise public awareness, especially among taxpayers, for the importance of increasing local government tax revenues. This study examines whether tax knowledge, service quality, and tax sanctions affect taxpayer compliance. The results showed that tax knowledge affects taxpayer compliance. Conversely, service quality and tax sanctions do not affect tax compliance. |
Index Terms - Land and Building Tax, Tax Compliance, Tax Knowledge, Service Quality, Tax Sanction |
C itation - RHDP Sari, I Kusumawardhani. "The Effect of Tax Knowledge, Service Quality, and Tax Sanctions on Taxpayers Land and Building Tax Compliance." International Journal of Computer Networks and Communications Security 7, no. 12 (2019): 258-265. |
Examining the Network & Security Infrastructure of Skype Mobile Application |
Pages: 266-271 (6) | [Full Text] PDF (404 KB) |
S ABDULLAHI |
Department of Mathematics and Computer Sciences, Faculty of Natural and Applied Sciences, Al-Qalam University, Katsina, P.M.B. 2137 Dutsinma Road, Katsina |
Abstract - Nowadays computer systems and other networking devices face sophisticated attackers who combine multiple vulnerabilities to penetrates networks with devastating impact. The overall security of a network cannot be determined by simply counting the number of vulnerabilities. To accurately assess the security of networked systems, one must understand how vulnerabilities can be combined to stage an attack. From this, risk mitigation options can be devised in terms of maximizing security in the networked environment as well as in on devices and minimizing cost in practice, vulnerabilities often remain in a network, even after they are discovered. Vendors may be slow to release software patches, or deployment may be delayed because of excessive cost or effort. Attackers often leverage even correctly functioning network services to gain new capabilities. An organization will often trade security risk for availability of services. Removing attack paths reduces options for an attacker, but at what cost to individual or organization? This paper describes various network and internet vulnerabilities/attacks and their mitigation techniques as they apply to modern packet transfer. This will help individuals and organizations in understanding how vulnerable or otherwise their data and information is to the attackers and decides on the most cost effective mitigation method (s) that suits them as individuals or organizations as they intend to send data from one devise to another via internet or network connectivity. |
Index Terms - Network Security, Security Infrastructure, Mobile Application Security, SKYPE Mobile Application, Risk Mitigation Options |
C itation - S ABDULLAHI. "Examining the Network & Security Infrastructure of Skype Mobile Application." International Journal of Computer Networks and Communications Security 7, no. 12 (2019): 266-271. |