Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan Dec 2016

Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan

Information Technology Capstone Research Project Reports

The purpose of this project is to design a suitable network system for universities in developing countries. The aim was to design a network with high-quality security and low cost, in such a way that network devices of universities in developing countries, will meet standards associated with the universities in developed countries. This project will help to enhance education in developing countries. There are many devices that were used in designing the network, such as routers, switches, backup, firewall, and servers. All devices were connected to each other to make integration network system and configured by putting IP addresses to …


Ransomware In High-Risk Environments, Shallaw M. Aziz Dec 2016

Ransomware In High-Risk Environments, Shallaw M. Aziz

Information Technology Capstone Research Project Reports

In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems. These acts of cybercrime lead to huge damages in areas of business, healthcare systems, industry sectors, and other fields. Ransomware is considered as a high risk threat, which is designed to hijack the data. This paper is demonstrating the ransomware types, and how they are evolved from the malware and trojan codes, which is used to attack previous incidents, and explains the most common encryption algorithms …


Backend Challenges And Issues For Electronic Government, Salim Y. Alkindi May 2016

Backend Challenges And Issues For Electronic Government, Salim Y. Alkindi

Information Technology Master Theses

The term electronic government (also called e-government, or eGov) refers to multidisciplinary projects that are complex in nature. Since the beginning of the Internet revolution many countries have adopted e-government as a step toward enhancing the delivery of public or governmental services to citizens by what are called e-services. A typical request for a service is initiated and passes through an electronic service (“e-service”) portal, or a front office. The term front office application usually system can be defined as designates software seen and used directly by an end user. This software provides the capabilities needed to collect the user …


Enterprise Network Design And Implementation For Airports, Ashraf H. Ali Apr 2016

Enterprise Network Design And Implementation For Airports, Ashraf H. Ali

Information Technology Master Theses

The aim of this project was airports network design and implementation and the introduction of a suitable network for most airports around the world. The following project focused on three main parts: security, quality, and safety. The project has been provided with different utilities to introduce a network with a high security level for the airport. These utilities are hardware firewalls, an IP access control list, Mac address port security, a domain server and s proxy server. All of these utilities have been configured to provide a secure environment for the entire network and to prevent hackers from entering sensitive …


Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali Apr 2016

Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali

Information Technology Master Theses

In a technologically enabled world, local ideologically inspired warfare becomes global all too quickly, specifically terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to broadcast their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity. This study employs data mining tools to mine Twitter for …


Solar Thermal Decoupled Electrolysis: Reaction Mechanism Of Electrochemical Oxidation Of Coo/Co(Oh)2, William Prusinski Apr 2016

Solar Thermal Decoupled Electrolysis: Reaction Mechanism Of Electrochemical Oxidation Of Coo/Co(Oh)2, William Prusinski

Chemistry Honors Papers

A modified water electrolysis process has been developed to produce H2. The electrolysis cell oxidizes CoO to CoOOH and Co3O4 at the anode to decrease the amount of electric work needed to reduce water to H2. The reaction mechanism through which CoO becomes oxidized was investigated, and it was observed that the electron transfer occurred through both a species present in solution and a species adsorbed to the electrode surface. A preliminary mathematical model was established based only on the electron transfer to species in solution, and several kinetic parameters of the reaction were calculated. The average value of each …