Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 21 of 21

Full-Text Articles in Computer and Systems Architecture

Assessing Blockchain’S Potential To Ensure Data Integrity And Security For Ai And Machine Learning Applications, Aiasha Siddika Dec 2023

Assessing Blockchain’S Potential To Ensure Data Integrity And Security For Ai And Machine Learning Applications, Aiasha Siddika

Master of Science in Information Technology Theses

The increasing use of data-centric approaches in the fields of Machine Learning and Artificial Intelligence (ML/AI) has raised substantial issues over the security, integrity, and trustworthiness of data. In response to this challenge, Blockchain technology offered a promising and practical solution, as its inherent characteristics as a decentralized distributed ledger, coupled with cryptographic processes, offer an unprecedented level of data confidentiality and immutability. This study examines the mutually beneficial connection between Blockchain technology and ML/AI, using Blockchain's inherent capacity to protect against unauthorized alterations of data during the training phase of ML models. The method involves building valid blocks of …


Screensafefuture: A Parent-Empathetic And Practical Mhealth Application For Toddlers' Brain Development Addressing Screen-Addiction Challenges, Nafisa Anjum Nov 2023

Screensafefuture: A Parent-Empathetic And Practical Mhealth Application For Toddlers' Brain Development Addressing Screen-Addiction Challenges, Nafisa Anjum

Master of Science in Information Technology Theses

The surging incidents of infants and toddlers screen addiction in the United States are becoming a pressing concern due to its detrimental and compound impact on cognitive development, mental health, and physical growth. To address this era's critical child health and human development problem, we propose an innovative mHealth application-- ScreenSafeFuture-- in this paper. ScreenSafeFuture provides practical and parent-friendly solutions that seamlessly fit into parents' busy lifestyles, also acknowledging the effectiveness and convenience of smartphones as a healthcare tool. Our offering includes essential features designed to enhance the experience between parents and their children under 3 years old. With an …


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


A Social Profile-Based E-Learning Model, Xola Ntlangula Sep 2023

A Social Profile-Based E-Learning Model, Xola Ntlangula

African Conference on Information Systems and Technology

Many High Education Institutions (HEIs) have migrated to blended or complete online learning to cater for less interruption with learning. As such, there is a growing demand for personalized e-learning to accommodate the diversity of students' needs. Personalization can be achieved using recommendation systems powered by artificial intelligence. Although using student data to personalize learning is not a new concept, collecting and identifying appropriate data is necessary to determine the best recommendations for students. By reviewing the existing data collection capabilities of the e-learning platforms deployed by public universities in South Africa, we were able to establish the readiness of …


E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube Sep 2023

E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube

African Conference on Information Systems and Technology

Depletion of resources meant for both human and animal survival leads to competition for these. Human-wildlife conflict (HWC) occurs when these two parties compete for resources such as space, water, and food. If not properly managed, HWC can lead to loss of livelihoods and even loss of life. This paper discusses the design and development of an E-Wildlife Alert application that uses machine learning to detect dangerous animals. Using the Design Science Research method, a convolutional neural network is trained to build an artifact that detects five dangerous animals from an African context. The artifact is mounted on a robot …


A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen Sep 2023

A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen

African Conference on Information Systems and Technology

Rapid technological developments have enabled users to be supported and guided in decision-making. An example of this is the ability of tertiary students to use technology to explore different career options and make informed decisions about their future. Notwithstanding the increasing use of technology in general, the technology for career guidance and personalized career recommendations in South Africa is still limited. There are some limiting factors such as the ever-looming challenge of limited access to technology, language barriers and cultural differences that are prevalent in rural areas. With this premise, this study collected quantitative data from students at an Eastern …


Analysis Of The Adherence Of Mhealth Applications To Hipaa Technical Safeguards, Bilash Saha Apr 2023

Analysis Of The Adherence Of Mhealth Applications To Hipaa Technical Safeguards, Bilash Saha

Master of Science in Information Technology Theses

The proliferation of mobile health technology, or mHealth apps, has made it essential to protect individual health details. People now have easy access to digital platforms that allow them to save, share, and access their medical data and treatment information as well as easily monitor and manage health-related issues. It is crucial to make sure that protected health information (PHI) is effectively and securely transmitted, received, created, and maintained in accordance with the rules outlined by the Health Insurance Portability and Accountability Act (HIPAA), as the use of mHealth apps increases. Unfortunately, many mobile app developers, particularly those of mHealth …


A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li Dec 2022

A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li

Master of Science in Software Engineering Theses

Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …


Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss Nov 2022

Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss

KSU Proceedings on Cybersecurity Education, Research and Practice

Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …


Using Design Science Research To Create A Virtual Environment For Nursing Students, Benjamin Botha, Lizette De Wet Aug 2022

Using Design Science Research To Create A Virtual Environment For Nursing Students, Benjamin Botha, Lizette De Wet

African Conference on Information Systems and Technology

This paper aims to provide insight into the design science research approach followed during a transdisciplinary research study between computer scientists and professional nurses. The researchers used a design science research approach to create a virtual environment where nursing students could practice managing a patient with a foreign object in the right lung. The virtual environment underwent multiple changes as it progressed through the different cycles of design science research. Within these cycles, namely the relevance, design, and rigor cycle, various iterations of each of the cycles took place. Presented in this paper the design science approach followed will be …


Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore Apr 2022

Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore

Symposium of Student Scholars

Climate change is happening, and many countries are already facing devastating consequences. Populations worldwide are adapting to the season's unpredictability they relay to lands for agriculture. Our first research was to develop an IoT Clusters Platform for Data Collection, analysis, and visualization. The platform comprises hardware parts with Raspberry Pi and Arduino's clusters connected to multiple sensors. The clusters transmit data collected in real-time to microservices-based servers where the data can be accessed and processed. Our objectives in developing this platform were to create an efficient data collection system, relatively cheap to implement and easy to deploy in any part …


Ehr Data Management: Hyperledger Fabric-Based Health Data Storing And Sharing, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero Nov 2021

Ehr Data Management: Hyperledger Fabric-Based Health Data Storing And Sharing, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero

Symposium of Student Scholars

Despite the type of industry, data sharing has always been a concern across the globe within the conventional database model; particularly in the healthcare industry, where the lack of data interoperability in existing applications creates not only security and transparency issues in EHR but also cost-related concerns that impact the quality of patient care. Without adopting novel and emerging technologies that allow patients to store and share EHR data within a tamper-evident, immutable, and secure data storing and sharing network, this current problem could not be resolved. Emerging Hyperledger Fabric-based Blockchain technology can be an ideal solution to address these …


Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, Soin Abdoul Kassif Traore May 2021

Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, Soin Abdoul Kassif Traore

Symposium of Student Scholars

Design and Implementation of a Microservices Web-based Architecture for CodeDeployment and Testing

Many tech stars like Netflix, Amazon, PayPal, eBay, and Twitter are evolving from monolithic to a microservice architecture due to the benefits for Agile and DevOps teams. Microservices architecture can be applied to multiple industries, like IoT, using containerization. Virtual containers give an ideal environment for developing and testing of IoT technologies. Since the IoT industry has an exponential growth, it is the responsibility of universities to teach IoT with hands-on labs to minimize the gap between what the students learn and what is on-demand in the job …


Optimal Order Assignment With Minimum Wage Consideration (Ooamwc), Hakem Alazmi Dec 2020

Optimal Order Assignment With Minimum Wage Consideration (Ooamwc), Hakem Alazmi

Master of Science in Computer Science Theses

While the application of crowdsourcing has increased over the years, the technology experiences various issues during implementation. Examples of some of the issues that affect crowdsourcing include task assignment, profit maximizations, as well as time window issues. In some instances addressing some of the issues results in the other issues being overlooked. An example is when assigning tasks to workers, the profits of the workers might not be considered and this ends up affecting the profit maximization aspect. Various algorithms have been proposed to address the task assignment, profit maximizations, and time window issues. However, these algorithms address the issues …


Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle Jul 2020

Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle

African Conference on Information Systems and Technology

Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For …


A Framework To Detect Presentation Attacks, Laeticia Etienne Apr 2020

A Framework To Detect Presentation Attacks, Laeticia Etienne

Master of Science in Information Technology Theses

Biometric-based authentication systems are becoming the preferred choice to replace password-based authentication systems. Among several variations of biometrics (e.g., face, eye, fingerprint), iris-based authentication is commonly used in every day applications. In iris-based authentication systems, iris images from legitimate users are captured and certain features are extracted to be used for matching during the authentication process. Literature works suggest that iris-based authentication systems can be subject to presentation attacks where an attacker obtains printed copy of the victim’s eye image and displays it in front of an authentication system to gain unauthorized access. Such attacks can be performed by displaying …


Document Layout Analysis And Recognition Systems, Sai Kosaraju Nov 2019

Document Layout Analysis And Recognition Systems, Sai Kosaraju

Master of Science in Computer Science Theses

Automatic extraction of relevant knowledge to domain-specific questions from Optical Character Recognition (OCR) documents is critical for developing intelligent systems, such as document search engines, sentiment analysis, and information retrieval, since hands-on knowledge extraction by a domain expert with a large volume of documents is intensive, unscalable, and time-consuming. There have been a number of studies that have automatically extracted relevant knowledge from OCR documents, such as ABBY and Sandford Natural Language Processing (NLP). Despite the progress, there are still limitations yet-to-be solved. For instance, NLP often fails to analyze a large document. In this thesis, we propose a knowledge …


Knn Optimization For Multi-Dimensional Data, Arialdis Japa Aug 2019

Knn Optimization For Multi-Dimensional Data, Arialdis Japa

Master of Science in Computer Science Theses

The K-Nearest Neighbors (KNN) algorithm is a simple but powerful technique used in the field of data analytics. It uses a distance metric to identify existing samples in a dataset which are similar to a new sample. The new sample can then be classified via a class majority voting of its most similar samples, i.e. nearest neighbors. The KNN algorithm can be applied in many fields, such as recommender systems where it can be used to group related products or predict user preferences. In most cases, the performance of the KNN algorithm tends to suffer as the size of the …


Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli Oct 2018

Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli

Master of Science in Computer Science Theses

With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices. We …


Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska Sep 2018

Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska

The African Journal of Information Systems

Software ecosystems provide an effective way through which software solutions can be constructed by composing software components, typically applications, developed by internal and external developers on top of a software platform. Third party development increases the potential of a software ecosystem to effectively and quickly respond to context-specific software requirements. The boundary resources model gives a theoretical account for cultivation of third party development premised on the role of platform boundary resources such as application programming interfaces (API). However, from a longitudinal case study of the DHIS2 software ecosystem, this paper observes that no matter how good the boundary resources …


A Model For Designing M-Agriculture Applications For Dairy Farming, Amos Gichamba, Ismail A. Lukandu Oct 2012

A Model For Designing M-Agriculture Applications For Dairy Farming, Amos Gichamba, Ismail A. Lukandu

The African Journal of Information Systems

In the recent past, developing countries have experienced major technological advancements including high mobile phone penetration. With the implementation of innovative technological solutions (e.g. mobile-based systems in key economic activities such as agriculture), there is need to develop models that software developers and researchers can use to design solutions. This paper aims to study the implementation of mobile systems in agriculture and presents a model for designing such applications. This study shows that models exist for general mobile applications design and development, although none specifically suits mobile agriculture applications. A model for designing and implementing M-Agriculture applications is presented. The …