Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

A Comprehensive Analysis Of Smart Ship Systems And Underlying Cybersecurity Issues, Dennis Bothur Jan 2020

A Comprehensive Analysis Of Smart Ship Systems And Underlying Cybersecurity Issues, Dennis Bothur

Theses : Honours

The maritime domain benefits greatly from advanced technology and ubiquitous connectivity. From “smart” sensors to “augmented reality”, the opportunities to save costs and improve safety are endless. The aim of this dissertation is to study the capabilities of smart ship systems in the context of Internet-of-Things and analyse the potential cybersecurity risks and challenges that smart technologies may introduce into this accelerating digital economy.

The first part of this work investigates the architecture of a “Smart Ship System” and the primary subsystems, including the integrated bridge, navigation and communication systems, networking, operational systems, and sensor networks. The mapping of the …


Iot-Mqtt Based Denial Of Service Attack Modelling And Detection, Naeem Firdous Syed Jan 2020

Iot-Mqtt Based Denial Of Service Attack Modelling And Detection, Naeem Firdous Syed

Theses: Doctorates and Masters

Internet of Things (IoT) is poised to transform the quality of life and provide new business opportunities with its wide range of applications. However, the bene_ts of this emerging paradigm are coupled with serious cyber security issues. The lack of strong cyber security measures in protecting IoT systems can result in cyber attacks targeting all the layers of IoT architecture which includes the IoT devices, the IoT communication protocols and the services accessing the IoT data. Various IoT malware such as Mirai, BASHLITE and BrickBot show an already rising IoT device based attacks as well as the usage of infected …


Local Binary Pattern Based Algorithms For The Discrimination And Detection Of Crops And Weeds With Similar Morphologies, Vi Nguyen Thanh Le Jan 2020

Local Binary Pattern Based Algorithms For The Discrimination And Detection Of Crops And Weeds With Similar Morphologies, Vi Nguyen Thanh Le

Theses: Doctorates and Masters

In cultivated agricultural fields, weeds are unwanted species that compete with the crop plants for nutrients, water, sunlight and soil, thus constraining their growth. Applying new real-time weed detection and spraying technologies to agriculture would enhance current farming practices, leading to higher crop yields and lower production costs. Various weed detection methods have been developed for Site-Specific Weed Management (SSWM) aimed at maximising the crop yield through efficient control of weeds. Blanket application of herbicide chemicals is currently the most popular weed eradication practice in weed management and weed invasion. However, the excessive use of herbicides has a detrimental impact …


Web Content Management System And Accessibility Awareness: A Comparative Study Of Novice Users And Accessibility Outcomes, Fatima Artiba Diaz Jan 2020

Web Content Management System And Accessibility Awareness: A Comparative Study Of Novice Users And Accessibility Outcomes, Fatima Artiba Diaz

Theses: Doctorates and Masters

Since its creation, the Web has progressively developed and become a vital source of information in every domain and for almost all people. It is crucial to guarantee that the information contained on the Web is available for everyone, especially for people with special needs. Removing accessibility barriers is fundamentally based on tools, skills and support of all contributors, particularly the content creators, to ensure information is navigable and usable in the context of the end users experience. Web Content Management Systems play a significant role in structuring, storing and provision content to the Web and have evolved to address …