Blockchain Security: Double-Spending Attack And Prevention,
2023
Stephen F. Austin State University
Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii
Electronic Theses and Dissertations
This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.
Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City.,
2023
CUNY New York City College of Technology
Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe
Publications and Research
Approximately one-fifth to one-quarter of American families have a family member with a mobility impairment, which poses challenges for many local communities, particularly in New York City Boroughs. To address this issue, Doorfront.org aims to make sidewalks and facilities, such as residential buildings and restaurants, more accessible to disabled residents of New York City. As a research assistant for Doorfront.org, I used NYC Open Data to accumulate data on inaccessible facilities, such as the NYC sidewalk polygons, building footprints, city hydrants, bus shelters, parking meters, street trees, pedestrian ramps, litter baskets, city benches, and newsstands.
I downloaded a non-geospatial CSV …
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure,
2023
University of Nebraska at Omaha
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant
Theses/Capstones/Creative Projects
The Michigan Army National Guard DCOE is hoping to increase their understanding of the physical, electrical, protocol, and logical topography of internet service. In order to understand the infrastructure of the internet, information must be collected on its pieces. By studying, describing, and illustrating the infrastructure of the global internet we can develop hardening tactics, improve user training, and develop contingency plans in the case of an attack. The research is focused on where data lives, locating data centers in the region, identifying global infrastructure and who owns it, and potential for hardening. An interactive map has been created in …
Preserving User Data Privacy Through The Development Of An Android Solid Library,
2023
University of Arkansas, Fayetteville
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Computer Science and Computer Engineering Undergraduate Honors Theses
In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …
Bridging The Gap Between Public Organizaions And Cybersecurity,
2023
California State University, San Bernardino
Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros
Electronic Theses, Projects, and Dissertations
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization agencies face and how those crimes can be mitigated. The goal of this paper is to understand how public organization agencies have prepared for cyberattacks and discuss additional suggestions to improve their current systems with the current research available This research provides an analysis of current cyber security systems, new technologies that can be implemented, roadblocks public agencies face before and during …
Iot Health Devices: Exploring Security Risks In The Connected Landscape,
2023
University of Tartu
Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer
School of Cybersecurity Faculty Publications
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …
Source Code Plagiarism Detection Using Jplag & Stack Overflow Data,
2023
Western Kentucky University
Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu
Masters Theses & Specialist Projects
Advancements in computer technology and internet services have led to the availability of vast amounts of information like videos, articles, research papers, and code samples. Free online information will increase the possibility of plagiarism and collusion among students. People can commit plagiarism in both text and code [1], as tools used to detect plagiarism between texts and between codes are distinct. Traditionally plagiarism in code is detected using manual inspection, which is a tedious process and misses to compare code from previous submissions and external sources. To overcome this issue, systems that can automatically detect plagiarism in code were developed …
Game Based Learning: Engaging Students And Measuring Their Progress,
2023
Southern Adventist University
Game Based Learning: Engaging Students And Measuring Their Progress, Jonathan Stover, Siegwart Mayr
Campus Research Day
Digital natives are constantly surrounded by technology. Therefore, traditional methods of teaching are becoming obsolete and increasingly creative solutions are required to keep students engaged. Among these solutions is a concept called game based learning. Game based learning is a unique educational experience that incorporates the engagement factors of video games with education. Even though it is still in an early stage of adoption, game based learning has been proven to be a surprisingly effective tool for providing students with a valuable educational experience. Even with this evidence in mind, current game based learning programs still hold the potential to …
Evolution And Enlightenment Of Us-Japan “Advanced Storage Research Consortium”,
2023
Institutes of Science and Development, Chinese Academy of Sciences, Beijing 100190, China
Evolution And Enlightenment Of Us-Japan “Advanced Storage Research Consortium”, Sumei Wang
Bulletin of Chinese Academy of Sciences (Chinese Version)
In the process of comprehensively promoting Chinese-style modernization, we must adhere to scientific and technological selfreliance and self-improvement as the strategic support for national development, and scientific and technological innovation is the main driving force for high-quality economic development. As one of the carriers, the innovation consortium formed by enterprises as main entities aims to realize the deep integration of innovation chain and industrial chain, accelerating the transformation of scientific and technological achievements into real productivity, and solving the problem of disconnection between scientific research activities and industrial demand. On the basis of reviewing and summarizing the evolution of the …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation,
2023
Central University of South Bihar, Panchanpur, Gaya, Bihar
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Shelfaware: Accelerating Collaborative Awareness With Shelf Crdt,
2023
California Polytechnic State University, San Luis Obispo
Shelfaware: Accelerating Collaborative Awareness With Shelf Crdt, John C. Waidhofer
Master's Theses
Collaboration has become a key feature of modern software, allowing teams to work together effectively in real-time while in different locations. In order for a user to communicate their intention to several distributed peers, computing devices must exchange high-frequency updates with transient metadata like mouse position, text range highlights, and temporary comments. Current peer-to-peer awareness solutions have high time and space complexity due to the ever-expanding logs that each client must maintain in order to ensure robust collaboration in eventually consistent environments. This paper proposes an awareness Conflict-Free Replicated Data Type (CRDT) library that provides the tooling to support an …
Cloud Computing For Supply Chain Management And Warehouse Automation: A Case Study Of Azure Cloud,
2023
University Of the Cumberlands, KY
Cloud Computing For Supply Chain Management And Warehouse Automation: A Case Study Of Azure Cloud, Pawankumar Sharma
International Journal of Smart Sensor and Adhoc Network
In recent times, organizations are examining the art training situation to improve the operation efficiency and the cost of warehouse retail distribution and supply chain management. Microsoft Azure emerges as an expressive technology that leads optimization by giving infrastructure, software, and platform resolutions for the whole warehouse retail distribution and supply chain management. Using Microsoft Azure as a cloud computing tool in retail warehouse distribution and supply manacle management contributes to active and monetary benefits. At the same time, potential limitations and risks should be considered by the retail warehouse distribution and the supply chain administration investors. In this research …
Data Integration Based Human Activity Recognition Using Deep Learning Models,
2023
Research Scholar, Department of Computer Science and Engineering, JSS Academy of Technical Education (affiliated to VTU), Bengaluru, India.
Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V
Karbala International Journal of Modern Science
Regular monitoring of physical activities such as walking, jogging, sitting, and standing will help reduce the risk of many diseases like cardiovascular complications, obesity, and diabetes. Recently, much research showed that the effective development of Human Activity Recognition (HAR) will help in monitoring the physical activities of people and aid in human healthcare. In this concern, deep learning models with a novel automated hyperparameter generator are proposed and implemented to predict human activities such as walking, jogging, walking upstairs, walking downstairs, sitting, and standing more precisely and robustly. Conventional HAR systems are unable to manage real-time changes in the surrounding …
Enhancing Query Processing On Stock Market Cloud-Based Database,
2023
Helwan Univesity
Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban
Future Computing and Informatics Journal
Cloud computing is rapidly expanding because it allows users to save the development and implementation time on their work. It also reduces the maintenance and operational costs of the used systems. Furthermore, it enables the elastic use of any resource rather than estimating workload, which may be inaccurate, as database systems can benefit from such a trend. In this paper, we propose an algorithm that allocates the materialized view over cloud-based replica sets to enhance the database system's performance in stock market using a Peer-to-Peer architecture. The results show that the proposed model improves the query processing time and network …
Blockchain Games: What On And Off-Chain Factors Affect The Volatility, Returns, And Liquidity Of Gaming Crypto Tokens,
2023
Claremont Colleges
Blockchain Games: What On And Off-Chain Factors Affect The Volatility, Returns, And Liquidity Of Gaming Crypto Tokens, Sumer Sareen
CMC Senior Theses
Blockchain games took the internet by storm as they offered a new way for users to play video games, own the assets in those games, and benefit monetarily from their efforts. Through Non-Fungible Tokens (NFTs) and cryptocurrencies, new, Web3 games ushered in a unique asset class for retail and institutional investors to diversify into and benefit from. This paper uses cross-sectional data from 30 blockchain gaming companies to identify on and off-chain factors that affect the company’s token volatility, returns, and liquidity. A multiple linear regression found the percentage of tokens dedicated to a company’s private sale and rewarding users, …
Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop,
2023
Arcadia University
Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes
Capstone Showcase
Our program collects vehicle data using an OBD-II device called Carloop that is plugged into the vehicle's diagnostic port. The device executes our code which then communicates with the vehicle's onboard computer to collect data such as engine RPM, vehicle speed, fuel level, and other diagnostic information. This data is then sent over WiFi to Particle’s Cloud, which is a platform for managing IoT devices.
Integrations set up on Particle take care of sending data to our InfluxDB Database, which is hosted on our own cloud-based machine. InfluxDB is a high-performance time-series database that is optimized for storing and querying …
Max Fit Event Management With Salesforce,
2023
California State University, San Bernardino
Max Fit Event Management With Salesforce, Akshay Dagwar
Electronic Theses, Projects, and Dissertations
MAX FIT Gym is looking for an event management software program to help manage activities very efficiently, along with attendees and environmental statistics. The event management program is developed and deployed using the Salesforce platform. MAX FIT can efficiently create, edit, and remove events and send email alerts to clients. This task operated on opportunities captured under MAX FIT, including all clients, and prepared information in the Salesforce cloud. This also includes product inventory with various varieties of protein products, and business owners can also add more products to their inventory. In the event management program, the event addresses within …
Database Design And Implementation,
2023
Arkansas Tech University
Database Design And Implementation, Weiru Chen
ATU Faculty Open Educational Resources
The book of Database Design and Implementation is a comprehensive guide that provides a thorough introduction to the principles, concepts, and best practices of database design and implementation. It covers the essential topics required to design, develop, and manage a database system, including data modeling, database normalization, SQL programming, and database administration.
The book is designed for students, database administrators, software developers, and anyone interested in learning how to design and implement a database system. It provides a step-by-step approach to database design and implementation, with clear explanations and practical examples. It also includes exercises and quizzes at the end …
Micro-Credentialing With Fuzzy Content Matching: An Educational Data-Mining Approach,
2023
University of Central Florida
Micro-Credentialing With Fuzzy Content Matching: An Educational Data-Mining Approach, Paul Amoruso
Electronic Theses and Dissertations, 2020-
There is a growing need to assess and issue micro-credentials within STEM curricula. Although one approach is to insert a free-standing academic activity into the students learning and degree path, herein the development and mechanism of an alternative approach rooted in leveraging responses on digitized quiz-based assessments is developed. An online assessment and remediation protocol with accompanying Python-based toolset was developed to engage undergraduate tutors who identify and fill knowledge gaps of at-risk learners. Digitized assessments, personalized tutoring, and automated micro-credentialing scripts for Canvas LMS are used to issue skill-specific badges which motivate the learner incrementally, while increasing self-efficacy. This …
Hybrid Life Cycles In Software Development,
2022
Grand Valley State University
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Culminating Experience Projects
This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …
