Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (19)
- Singapore Management University (15)
- Kansas State University Libraries (13)
- California Polytechnic State University, San Luis Obispo (12)
- Selected Works (5)
-
- Western University (5)
- Tennessee State University (4)
- University of Kentucky (3)
- University of Massachusetts Amherst (3)
- Claremont Colleges (2)
- Florida International University (2)
- Georgia Southern University (2)
- James Madison University (2)
- Kennesaw State University (2)
- Purdue University (2)
- Technological University Dublin (2)
- University of Nebraska - Lincoln (2)
- University of Pennsylvania Carey Law School (2)
- University of Tennessee, Knoxville (2)
- Air Force Institute of Technology (1)
- Edith Cowan University (1)
- Embry-Riddle Aeronautical University (1)
- La Salle University (1)
- Loyola Marymount University and Loyola Law School (1)
- Marquette University (1)
- Maurer School of Law: Indiana University (1)
- Morehead State University (1)
- Old Dominion University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- San Jose State University (1)
- Keyword
-
- Security (5)
- Android (3)
- Cloud Computing (3)
- Digital preservation (3)
- Networking (3)
-
- Arduino (2)
- Assessment (2)
- Bluetooth (2)
- Data mining (2)
- Digital collections (2)
- Digitization (2)
- Energy (2)
- IaaS (2)
- Internet (2)
- Internet of things (2)
- Iot (2)
- Key management (2)
- Localization (2)
- Low (2)
- Management (2)
- Mobile devices (2)
- Mobile sink (2)
- Network (2)
- Open source software (2)
- PaaS (2)
- Sensor (2)
- Servers (2)
- Smart Grid (2)
- Social Media (2)
- Ultrasound (2)
- Publication
-
- Journal of International Technology and Information Management (19)
- Research Collection School Of Computing and Information Systems (15)
- Central Plains Network for Digital Asset Management (12)
- Computer Engineering (9)
- Electronic Thesis and Dissertation Repository (5)
-
- Computer Science Faculty Research (4)
- Masters Theses (4)
- All Faculty Scholarship (2)
- Articles (2)
- FIU Electronic Theses and Dissertations (2)
- Master's Theses (2)
- Matt Schultz (2)
- ASA Multidisciplinary Research Symposium (1)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- CMC Senior Theses (1)
- Claremont-UC Undergraduate Research Conference on the European Union (1)
- Computer Science Faculty Publications (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Computer Science and Software Engineering (1)
- Doctoral Dissertations (1)
- Electronic Theses and Dissertations (1)
- Elinvo (Electronics, Informatics, and Vocational Education) (1)
- HON499 projects (1)
- Harold Herzog, PhD (1)
- Honors College Theses (1)
- Honors Thesis (1)
- Human Factors and Applied Psychology Student Conference (1)
- Independent Study Project (ISP) Collection (1)
- Indiana Law Journal (1)
- Information Science Faculty Publications (1)
- Publication Type
- File Type
Articles 91 - 120 of 120
Full-Text Articles in Computer Engineering
Improving The Sensitivity Of Unobtrusive Inactivity Detection In Sensor-Enabled Homes For The Elderly, Alvin C. Valera, Hwee-Pink Tan, Liming Bai
Improving The Sensitivity Of Unobtrusive Inactivity Detection In Sensor-Enabled Homes For The Elderly, Alvin C. Valera, Hwee-Pink Tan, Liming Bai
Research Collection School Of Computing and Information Systems
Unobtrusive in-home monitoring systems are gaining acceptability and are being deployed to enable relatives and caregivers to remotely monitor and provide timely care to their elderly loved ones or senior clients, respectively, who are living independently. Such systems can provide information about nonmovement or inactivity of the elderly resident. As prolonged inactivity could mean potential danger, several algorithms have been proposed to automatically detect unusually long durations of inactivity. Such schemes, however, suffer from low sensitivity due to their high detection latency. In this paper, we propose Dwell Time-enhanced Dynamic Threshold (DTDT), a scheme for computing adaptive alert thresholds that …
Development Of An Autonomous Robotic Mushroom Harvester, Nikita Alexeevich Kuchinskiy
Development Of An Autonomous Robotic Mushroom Harvester, Nikita Alexeevich Kuchinskiy
Electronic Thesis and Dissertation Repository
The process of development of a new robot is one of the modern technological arts. This process involves multiple complex steps and recursive approach. In this project, a solution for automatic harvesting of mushrooms is developed. In order to design an effective solution, it is necessary to explore and take into consideration the limitations of grasping very soft and fragile objects (particularly mushrooms). We will elaborate several strategies of picking and analyze each strategy to formulate the design requirements, develop a solution, and finally, evaluate the efficiency of the proposed solution in actual farm conditions for real mushrooms. The mushroom …
A Localization Method For Underwater Wireless Sensor Networks Based On Mobility Prediction And Particle Swarm Optimization Algorithms, Ying Zhang, Jixing Liang, Shengming Jiang, Wei Chen
A Localization Method For Underwater Wireless Sensor Networks Based On Mobility Prediction And Particle Swarm Optimization Algorithms, Ying Zhang, Jixing Liang, Shengming Jiang, Wei Chen
Computer Science Faculty Research
Due to their special environment, Underwater Wireless Sensor Networks (UWSNs) are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO) is proposed. In this method, the range-based PSO …
Ambient And Smartphone Sensor Assisted Adl Recognition In Multi-Inhabitant Smart Environments, Nirmalya Roy, Archan Misra, Diane Cook
Ambient And Smartphone Sensor Assisted Adl Recognition In Multi-Inhabitant Smart Environments, Nirmalya Roy, Archan Misra, Diane Cook
Research Collection School Of Computing and Information Systems
Activity recognition in smart environments is an evolving research problem due to the advancement and proliferation of sensing, monitoring and actuation technologies to make it possible for large scale and real deployment. While activities in smart home are interleaved, complex and volatile; the number of inhabitants in the environment is also dynamic. A key challenge in designing robust smart home activity recognition approaches is to exploit the users’ spatiotemporal behavior and location, focus on the availability of multitude of devices capable of providing different dimensions of information and fulfill the underpinning needs for scaling the system beyond a single user …
Key Management Scheme Based On Route Planning Of Mobile Sink In Wireless Sensor Networks, Ying Zhang, Jixing Liang, Bingxin Zheng, Shengming Jiang, Wei Chen
Key Management Scheme Based On Route Planning Of Mobile Sink In Wireless Sensor Networks, Ying Zhang, Jixing Liang, Bingxin Zheng, Shengming Jiang, Wei Chen
Computer Science Faculty Research
In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available …
Wireless Communication In Data Centers: A Survey, Abdelbaset S. Hamza, Jitender Deogun, Dennis R. Alexander
Wireless Communication In Data Centers: A Survey, Abdelbaset S. Hamza, Jitender Deogun, Dennis R. Alexander
School of Computing: Faculty Publications
Data centers (DCs) is becoming increasingly an integral part of the computing infrastructures of most enterprises. Therefore, the concept of DC networks (DCNs) is receiving an increased attention in the network research community. Most DCNs deployed today can be classified as wired DCNs as copper and optical fiber cables are used for intra- and inter-rack connections in the network. Despite recent advances, wired DCNs face two inevitable problems; cabling complexity and hotspots. To address these problems, recent research works suggest the incorporation of wireless communication technology into DCNs. Wireless links can be used to either augment conventional wired DCNs, or …
Enhanced Indoor Localization System Based On Inertial Navigation, Rasika Lakmal Hettiarachchige Don
Enhanced Indoor Localization System Based On Inertial Navigation, Rasika Lakmal Hettiarachchige Don
Electronic Thesis and Dissertation Repository
An algorithm for indoor localization of pedestrians using an improved Inertial Navigation system is presented for smartphone based applications. When using standard inertial navigation algorithm, errors in sensors due to random noise and bias result in a large drift from the actual location with time. Novel corrections are introduced for the basic system to increase the accuracy by counteracting the accumulation of this drift error, which are applied using a Kalman filter framework.
A generalized velocity model was applied to correct the walking velocity and the accuracy of the algorithm was investigated with three different velocity models which were derived …
Diseño E Implementación De Un Sistema De Realidad Virtual Para Una Planta Pasteurizadora De Leche, Jose Adolfo Robayo Murillo
Diseño E Implementación De Un Sistema De Realidad Virtual Para Una Planta Pasteurizadora De Leche, Jose Adolfo Robayo Murillo
Ingeniería en Automatización
Este trabajo describe el procedimiento y diseño para realizar una plataforma de realidad virtual basada en una planta pasteurizadora de leche, incluyendo la interfaz de usuario mediante periféricos digitales y etapas del proceso en la industria alimenticia de la leche. Para llevar a cabo este proyecto, se realiza un estudio de los tipos de pasteurización de leche que se aplican hoy en día. Este proceso varía según la cantidad de materia prima a pasteurizar, y a su vez depende de la distribución de la planta y selección de la instrumentación de la misma, de acuerdo a las normativas industriales existentes …
Per-Pixel Calibration For Rgb-Depth Natural 3d Reconstruction On Gpu, Sen Li
Per-Pixel Calibration For Rgb-Depth Natural 3d Reconstruction On Gpu, Sen Li
Theses and Dissertations--Electrical and Computer Engineering
Ever since the Kinect brought low-cost depth cameras into consumer market, great interest has been invigorated into Red-Green-Blue-Depth (RGBD) sensors. Without calibration, a RGBD camera’s horizontal and vertical field of view (FoV) could help generate 3D reconstruction in camera space naturally on graphics processing unit (GPU), which however is badly deformed by the lens distortions and imperfect depth resolution (depth distortion). The camera’s calibration based on a pinhole-camera model and a high-order distortion removal model requires a lot of calculations in the fragment shader. In order to get rid of both the lens distortion and the depth distortion …
Modularity Theory And Internet Regulation, Christopher S. Yoo
Modularity Theory And Internet Regulation, Christopher S. Yoo
All Faculty Scholarship
Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.
The literature on innovation indicates that modules should be determined by the nature of …
Understanding Home Networks With Lightweight Privacy-Preserving Passive Measurement, Xuzi Zhou
Understanding Home Networks With Lightweight Privacy-Preserving Passive Measurement, Xuzi Zhou
Theses and Dissertations--Computer Science
Homes are involved in a significant fraction of Internet traffic. However, meaningful and comprehensive information on the structure and use of home networks is still hard to obtain. The two main challenges in collecting such information are the lack of measurement infrastructure in the home network environment and individuals’ concerns about information privacy.
To tackle these challenges, the dissertation introduces Home Network Flow Logger (HNFL) to bring lightweight privacy-preserving passive measurement to home networks. The core of HNFL is a Linux kernel module that runs on resource-constrained commodity home routers to collect network traffic data from raw packets. Unlike prior …
Monitoring Voip Speech Quality For Chopped And Clipped Speech, Andrew Hines, Jan Skoglund, Anil C. Kokaram, Naomi Harte
Monitoring Voip Speech Quality For Chopped And Clipped Speech, Andrew Hines, Jan Skoglund, Anil C. Kokaram, Naomi Harte
Articles
No abstract provided.
Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa
Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa
Journal of International Technology and Information Management
This article attempts to improve the performance of classification algorithms used in the bank customer marketing response prediction of an unnamed Portuguese bank using the Random Forest ensemble. A thorough exploratory data analysis (EDA) was conducted on the data in order to ascertain the presence of anomalies such as outliers and extreme values. The EDA revealed that the bank data had 45, 211 instances and 17 features, with 11.7% positive responses. This was in addition to the detection of outliers and extreme values. Classification algorithms used for modelling the bank dataset include; Logistic Regression, Decision Tree, Naïve Bayes and the …
Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu
Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu
Journal of International Technology and Information Management
To understand patient and physician behavior, researchers have investigated the determinants of using healthcare information systems. Although this stream of research has produced important findings, it has yet to appreciably advance our understanding of system-use behavior in healthcare. To fill this gap, the current paper employs a systematic review to synthesize past research, reveal the key determinants of healthcare system usage, and illuminate a deeper understanding of the topic. This study thus helps healthcare researchers expand their baseline knowledge of these core determinants and conduct more fruitful future research on system-use behavior in healthcare.
Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley
Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley
Research outputs 2014 to 2021
Fiber optic sensors have become a mainstream sensing technology within a large array of applications due to their inherent benefits. They are now used significantly in structural health monitoring, and are an essential solution for monitoring harsh environments. Since their first development over 30 years ago, they have also found promise in security applications. This paper reviews all of the optical fiber-based techniques used in physical intrusion detection systems. It details the different approaches used for sensing, interrogation, and networking, by research groups, attempting to secure both commercial and residential premises from physical security breaches. The advantages and the disadvantages …
Fog Computing With Go: A Comparative Study, Ellis H. Butterfield
Fog Computing With Go: A Comparative Study, Ellis H. Butterfield
CMC Senior Theses
The Internet of Things is a recent computing paradigm, de- fined by networks of highly connected things – sensors, actuators and smart objects – communicating across networks of homes, buildings, vehicles, and even people. The Internet of Things brings with it a host of new problems, from managing security on constrained devices to processing never before seen amounts of data. While cloud computing might be able to keep up with current data processing and computational demands, it is unclear whether it can be extended to the requirements brought forth by Internet of Things.
Fog computing provides an architectural solution to …
Novel H.265 Video Traffic Prediction Models Using Artificial Neural Networks, Collin Daly
Novel H.265 Video Traffic Prediction Models Using Artificial Neural Networks, Collin Daly
Honors College Theses
In this work, we propose the use of non-linear, autoregressive neural network models for predicting video frame sizes. This model utilizes H.265 encoded video traces as inputs and the predicted future frame sizes as outputs. This model is developed to predict ultra-high definition video frame encoded with H.265 within IP networks. The video I, P, and B frames are predicted separately to improve model prediction accuracy. This approach is verified in MATLAB using various H.265 video traces. The results indicate that the proposed models were able to predict the video traffic fairly accurately.
The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani
The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani
Journal of International Technology and Information Management
The objective of the research is to study the benefits of cloud computing perceived by adopters and examine the impact of moderating factors on the relationship between the type of cloud computing and the perceived benefit. The moderating factors include firm size and value-chain activities. A measurement instrument of a 5-point Likert scale was administered on businesses of different sizes in Taiwan. The benefit of cloud computing measured in the study were: cost reduction, improved capability and enhanced scalability. The results show that the perceived benefit of cloud computing varies depending on the type of cloud computing, the value chain …
Table Of Contents
Journal of International Technology and Information Management
Table of Contents for Volume 25 Number 4
Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor
Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor
Journal of International Technology and Information Management
This study examines factors valued by IS managers in deciding if COTS software is a viable alternative to proprietary software. The results indicate managers who anticipate increased usage of COTS packages in 5 years used the same top three factors in the formation of their decisions to adopt COTS as their colleagues who anticipated either zero change in COTS usage or an increased usage of proprietary software used in deciding not to adopt COTS software. Managers anticipating increased COTS usage had a statistically significant higher value for each of those items compared to managers not anticipating growth in COTS software.
Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith
Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith
Journal of International Technology and Information Management
Effective marketing has always been an important factor in business success. Without the ability to identify customers and convince them to purchase the product or service being offered, businesses would not survive. Recent advancements in technology have given rise to new opportunities to engage customers through the use of electronic marketing (e-marketing). E- marketing draws from traditional marketing principles, while also expanding the types of strategies available to companies. Websites, social media, and online marketplaces are just some examples of how businesses are leveraging e-marketing approaches to connect with potential customers. In formulating sound e-marketing strategies, it is important for …
Online Trust Cues: Perceptions And Application, Antonina A. Bauman
Online Trust Cues: Perceptions And Application, Antonina A. Bauman
Journal of International Technology and Information Management
This qualitative study analyzes perceptions of online trust cues as identified by shoppers from three countries: Germany, Russia, and the USA. A novel approach of the repertory grid method is used to study online trust cues in business-to-consumers commercial online transactions. This study resulted in the list of web site elements and features that consumers recognize as trust cues and use to evaluate e-vendor’s trustworthiness. Findings show that out of fourteen categories of online trust cues, identified by online shoppers, three categories of online trust cues are found to be common across three cultures while eleven categories are culture specific. …
Leveraging Heritrix And The Wayback Machine On A Corporate Intranet: A Case Study On Improving Corporate Archives, Justin F. Brunelle, Krista Ferrante, Eliot Wilczek, Michele C. Weigle, Michael L. Nelson
Leveraging Heritrix And The Wayback Machine On A Corporate Intranet: A Case Study On Improving Corporate Archives, Justin F. Brunelle, Krista Ferrante, Eliot Wilczek, Michele C. Weigle, Michael L. Nelson
Computer Science Faculty Publications
In this work, we present a case study in which we investigate using open-source, web-scale web archiving tools (i.e., Heritrix and the Wayback Machine installed on the MITRE Intranet) to automatically archive a corporate Intranet. We use this case study to outline the challenges of Intranet web archiving, identify situations in which the open source tools are not well suited for the needs of the corporate archivists, and make recommendations for future corporate archivists wishing to use such tools. We performed a crawl of 143,268 URIs (125 GB and 25 hours) to demonstrate that the crawlers are easy to set …
Home Networking With Enterprise Equipment, Alex Lowers
Home Networking With Enterprise Equipment, Alex Lowers
Williams Honors College, Honors Research Projects
This project tested various wired and wireless topologies and benchmarked download speeds and quality for various types of media. For music, topology had a negligible impact. High quality video streams were impacted by latency introduced in the wireless topologies. Likewise, video game streaming, especially games of high graphical fidelity, were negatively impacted when streamed over a wireless network. For all types of media, a fully wired topology is recommended.
Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley
Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley
Electronic Theses and Dissertations
Because of the inherent risks in today’s online activities, it becomes imperative to identify a malicious user masquerading as someone else. Incorporating biometric analysis enhances the confidence of authenticating valid users over the Internet while providing additional layers of security with no hindrance to the end user. Through the analysis of traffic patterns and HTTP Header analysis, the detection and early refusal of robot agents plays a great role in reducing fraudulent login attempts.
Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii
Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii
UNF Graduate Theses and Dissertations
Web designers are expected to perform the difficult task of adapting a site’s design to fit changing usage trends. Web analytics tools give designers a window into website usage patterns, but they must be analyzed and applied to a website's user interface design manually. A framework for marrying live analytics data with user interface design could allow for interfaces that adapt dynamically to usage patterns, with little or no action from the designers. The goal of this research is to create a framework that utilizes web analytics data to automatically update and enhance web user interfaces. In this research, we …
Applying Dijkstra Algorithm For Solving Neutrosophic Shortest Path Problem, Florentin Smarandache, Luige Vladareanu, Said Broumi, Assia Bakali, Muhammad Akram
Applying Dijkstra Algorithm For Solving Neutrosophic Shortest Path Problem, Florentin Smarandache, Luige Vladareanu, Said Broumi, Assia Bakali, Muhammad Akram
Branch Mathematics and Statistics Faculty and Staff Publications
The selection of shortest path problem is one the classic problems in graph theory. In literature, many algorithms have been developed to provide a solution for shortest path problem in a network. One of common algorithms in solving shortest path problem is Dijkstra’s algorithm. In this paper, Dijkstra’s algorithm has been redesigned to handle the case in which most of parameters of a network are uncertain and given in terms of neutrosophic numbers. Finally, a numerical example is given to explain the proposed algorithm.
We Can Hear You With Wi-Fi!, Guanhua Wang, Yongpan Zou, Zimu Zhou, Kaishun Wu, Lionel M. Ni
We Can Hear You With Wi-Fi!, Guanhua Wang, Yongpan Zou, Zimu Zhou, Kaishun Wu, Lionel M. Ni
Research Collection School Of Computing and Information Systems
Recent literature advances Wi-Fi signals to “see” people’s motions and locations. This paper asks the following question: Can Wi-Fi “hear” our talks? We present WiHear, which enables Wi-Fi signals to “hear” our talks without deploying any devices. To achieve this, WiHear needs to detect and analyze fine-grained radio reflections from mouth movements. WiHear solves this micro-movement detection problem by introducing Mouth Motion Profile that leverages partial multipath effects and wavelet packet transformation. Since Wi-Fi signals do not require line-of-sight, WiHear can “hear” people talks within the radio range. Further, WiHear can simultaneously “hear” multiple people’s talks leveraging MIMO technology. We …
Development Of Compressive Sensing Techniques For Wideband Spectrum Scanning In Cognitive Radio Networks, Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi
Development Of Compressive Sensing Techniques For Wideband Spectrum Scanning In Cognitive Radio Networks, Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi
fatima salahdine
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …