Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (5)
- Management Information Systems (5)
- Computer Sciences (4)
- Other Computer Engineering (4)
- Physical Sciences and Mathematics (4)
-
- Computer and Systems Architecture (3)
- Digital Communications and Networking (3)
- Education (3)
- Information Security (3)
- Technology and Innovation (3)
- Electrical and Computer Engineering (2)
- Art and Design (1)
- Arts and Humanities (1)
- Automotive Engineering (1)
- Communications Law (1)
- Computational Engineering (1)
- Computer Law (1)
- Controls and Control Theory (1)
- Educational Methods (1)
- Educational Technology (1)
- Electrical and Electronics (1)
- Elementary Education (1)
- Game Design (1)
- Intellectual Property Law (1)
- Internet Law (1)
- Law (1)
- Library and Information Science (1)
- Online and Distance Education (1)
- Keyword
-
- Technology (2)
- AI (1)
- Agriculture (1)
- Arduino (1)
- Artificial intelligence (1)
-
- Asynchronous file transfer (1)
- Audits (1)
- Augmented Reality (1)
- Automotive (1)
- Autonomous Vehicle (1)
- Boundary Resources (1)
- CAN (1)
- CAN BUS (1)
- Coding (1)
- Computer science (1)
- Controller Area Network (1)
- Controls (1)
- Cybersecurity (1)
- Cybersecurity Training and Education (1)
- Dairy Farming (1)
- Developing Countries (1)
- E-agriculture (1)
- Events (1)
- Extended Reality (1)
- File servers (1)
- File systems (1)
- File transfer (1)
- Generative Capacity (1)
- Health benefits of video games (1)
- Hour of code (1)
Articles 1 - 10 of 10
Full-Text Articles in Computer Engineering
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
The Future Of Artificial Intelligence, Alex Guerra
The Future Of Artificial Intelligence, Alex Guerra
Emerging Writers
Whether we like it or not Artificial Intelligence (AI) is coming, and we are not ready for it. AI has unimaginable potential and will revolutionize the world over the next few decades, but with this great potential we are faced with choices that could prove detrimental to humanity. This article examines the challenges AI presents and explores possible solutions to make AI align with human interests.
The Health Benefits Of Video Games, Zachary Shanks
The Health Benefits Of Video Games, Zachary Shanks
Emerging Writers
This paper seeks to evaluate if video games are useful as more than just entertainment. The research shows that they can be utilized in the educational, medical, and business fields. Video Games have been shown to benefit the physical, emotional, and mental health of players, as well as create more efficient learning and working environments. The article argues that video games are no longer just a source of entertainment, as they are now becoming useful tools in society.
News - Screven-Jenkins Regional Library, Sharon Blank
News - Screven-Jenkins Regional Library, Sharon Blank
Georgia Library Quarterly
No abstract provided.
Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska
Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska
The African Journal of Information Systems
Software ecosystems provide an effective way through which software solutions can be constructed by composing software components, typically applications, developed by internal and external developers on top of a software platform. Third party development increases the potential of a software ecosystem to effectively and quickly respond to context-specific software requirements. The boundary resources model gives a theoretical account for cultivation of third party development premised on the role of platform boundary resources such as application programming interfaces (API). However, from a longitudinal case study of the DHIS2 software ecosystem, this paper observes that no matter how good the boundary resources …
The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki
The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki
The African Journal of Information Systems
Despite the growing interest in e-agriculture research in South Africa, academic studies have not sufficiently and deeply investigated the current e-agriculture research trends in the South African context. It is unclear how primary e-agriculture research in South Africa will aid both current and future generations to create new and better ways to transform agricultural development using this modern technology. This study sought to determine the current status of e-agriculture research in the South African context. A systematic literature review was used to gather and analyze data. The results indicate that 17 papers (26.5%) were published during the first two years …
Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin Mcfall
Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin Mcfall
The Kennesaw Journal of Undergraduate Research
The standard method for speed control is the cruise control system built into most modern vehicles. These systems employ a PID controller which actuates the accelerator thus, in turn, maintains the desired vehicle speed. The main drawback of such a system is that typically the cruise control will only engage above 25 mph. The goal of this paper is to describe a system which we used to control vehicle speed from a stop to any desired speed using an Arduino microcontroller and a CAN BUS shield, from where autonomous features can be built upon. With this system, we were able …
A Model For Designing M-Agriculture Applications For Dairy Farming, Amos Gichamba, Ismail A. Lukandu
A Model For Designing M-Agriculture Applications For Dairy Farming, Amos Gichamba, Ismail A. Lukandu
The African Journal of Information Systems
In the recent past, developing countries have experienced major technological advancements including high mobile phone penetration. With the implementation of innovative technological solutions (e.g. mobile-based systems in key economic activities such as agriculture), there is need to develop models that software developers and researchers can use to design solutions. This paper aims to study the implementation of mobile systems in agriculture and presents a model for designing such applications. This study shows that models exist for general mobile applications design and development, although none specifically suits mobile agriculture applications. A model for designing and implementing M-Agriculture applications is presented. The …