An Enhanced Adaptive Learning System Based On Microservice Architecture,
2023
Helwan University
An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif
Future Computing and Informatics Journal
This study aims to enhance Adaptive Learning Systems (ALS) in Petroleum Sector in Egypt by using the Microservice Architecture and measure the impact of enhancing ALS by participating ALS users through a statistical study and questionnaire directed to them if they accept to apply the Cloud Computing Service “Microservices” to enhance the ALS performance, quality and cost value or not. The study also aims to confirm that there is a statistically significant relationship between ALS and Cloud Computing Service “Microservices” and prove the impact of enhancing the ALS by using Microservices in the cloud in Adaptive Learning in the Egyptian …
Visual Question Answering: A Survey,
2023
Future University in Egypt
Visual Question Answering: A Survey, Gehad Assem El-Naggar
Future Computing and Informatics Journal
Visual Question Answering (VQA) has been an emerging field in computer vision and natural language processing that aims to enable machines to understand the content of images and answer natural language questions about them. Recently, there has been increasing interest in integrating Semantic Web technologies into VQA systems to enhance their performance and scalability. In this context, knowledge graphs, which represent structured knowledge in the form of entities and their relationships, have shown great potential in providing rich semantic information for VQA. This paper provides an abstract overview of the state-of-the-art research on VQA using Semantic Web technologies, including knowledge …
Human-Machine Communication: Complete Volume. Volume 6,
2023
University of Central Florida
Human-Machine Communication: Complete Volume. Volume 6
Human-Machine Communication
his is the complete volume of HMC Volume 6.
Investigation Of Information Security Incidents In The Enterprise,
2023
TUIT named after Muhammad al-Khwarazmi, Address: 108, Amir Temur st., Tashkent city, Republic of Uzbekistan, E-mail: botirov_fz@mail.ru, Phone:+998-97-751-16-97.
Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov
Chemical Technology, Control and Management
This article analyzes the concept of investigating information security incidents and the processes of responsibility for their commission, checking the place where the incident occurred, collecting and storing their data, as well as organizing the investigation of information security incidents at the enterprise.
Security-Enhanced Serial Communications,
2023
University of South Florida
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
Blockchain Security: Double-Spending Attack And Prevention,
2023
Stephen F. Austin State University
Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii
Electronic Theses and Dissertations
This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.
Sensor Module Network For Monitoring Trace Gases In The International Space Station,
2023
Northern Illinois University
Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave
Honors Capstones
The Jet Propulsion Laboratory (JPL) of the National Aeronautics and Space Administration (NASA) aims to develop a sensor network for the International Space Station (ISS) to ensure a comprehensive understanding of air quality within the station. The accumulation of carbon dioxide (CO2) can lead to cognitive impairment, headaches, and potentially dangerous situations at high concentrations. Monitoring air content at the ISS is critical to maintaining a healthy environment for crew onboard. Exposure to harmful gases causes negative side effects that make crew sick, which may interfere with their responsibilities. CO2 is a gas that should be monitored …
Breast Tissue Tumor Detection Using Microstrip Patch Antenna With Defected Ground Structure,
2023
Prof. at Electronics and Communications Engineering Department, Faculty of Engineering, Mansoura University-
Breast Tissue Tumor Detection Using Microstrip Patch Antenna With Defected Ground Structure, Nihal F. F. Areed, Hamdi Ahmed El Mikati, Laila T. Rakha
Mansoura Engineering Journal
This work proposes a slotted microstrip patch antenna with an inset feed and defective ground structure (DGS). The proposed antenna is built with Roger-RT/5880 (Ԑr=2.2) as the substrate material for X-band application with a resonant frequency of 10 GHz. The proposed design has been simulated using Finite Element Method (FEM) and the results of bandwidth and gain read about 700MHz and 8dB; respectively. The suggested design is compared with previously published equivalent designs in light of the most recent research. The comparison reveal that that the suggested design with tuned dimensions offers higher gain and wider bandwidth than what has …
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy,
2023
University of South Florida
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
Operationalizing Deterrence By Denial In The Cyber Domain,
2023
University of South Florida
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Military Cyber Affairs
No abstract provided.
What Senior U.S. Leaders Say We Should Know About Cyber,
2023
National Defense University, College of Information and Cyberspace
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
Military Cyber Affairs
On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure,
2023
University of Nebraska at Omaha
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant
Theses/Capstones/Creative Projects
The Michigan Army National Guard DCOE is hoping to increase their understanding of the physical, electrical, protocol, and logical topography of internet service. In order to understand the infrastructure of the internet, information must be collected on its pieces. By studying, describing, and illustrating the infrastructure of the global internet we can develop hardening tactics, improve user training, and develop contingency plans in the case of an attack. The research is focused on where data lives, locating data centers in the region, identifying global infrastructure and who owns it, and potential for hardening. An interactive map has been created in …
Preserving User Data Privacy Through The Development Of An Android Solid Library,
2023
University of Arkansas, Fayetteville
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Computer Science and Computer Engineering Undergraduate Honors Theses
In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …
The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising,
2023
Liberty University
The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob
Senior Honors Theses
Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …
Bridging The Gap Between Public Organizaions And Cybersecurity,
2023
California State University, San Bernardino
Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros
Electronic Theses, Projects, and Dissertations
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization agencies face and how those crimes can be mitigated. The goal of this paper is to understand how public organization agencies have prepared for cyberattacks and discuss additional suggestions to improve their current systems with the current research available This research provides an analysis of current cyber security systems, new technologies that can be implemented, roadblocks public agencies face before and during …
Vanet Applications Under Loss Scenarios & Evolving Wireless Technology,
2023
Clemson University
Vanet Applications Under Loss Scenarios & Evolving Wireless Technology, Adil Alsuhaim
All Dissertations
In this work we study the impact of wireless network impairment on the performance of VANET applications such as Cooperative Adaptive Cruise Control (CACC), and other VANET applications that periodically broadcast messages. We also study the future of VANET application in light of the evolution of radio access technologies (RAT) that are used to exchange messages. Previous work in the literature proposed fallback strategies that utilizes on-board sensors to recover in case of wireless network impairment, those methods assume a fixed time headway value, and do not achieve string stability. In this work, we study the string stability of a …
Enabling High Throughput And Reliable Low Latency Communication Over Vehicular Mobility In Next-Generation Cellular Networks,
2023
Clemson University
Enabling High Throughput And Reliable Low Latency Communication Over Vehicular Mobility In Next-Generation Cellular Networks, Snigdhaswin Kar
All Dissertations
The fifth-generation (5G) networks and beyond need paradigm shifts to realize the exponentially increasing demands of next-generation services for high throughputs, low latencies, and reliable communication under various mobility scenarios. However, these promising features have critical gaps that need to be filled before they can be fully implemented for mobile applications in complex environments like smart cities. Although the sub-6 GHz bands can provide reliable and larger coverage, they cannot provide high data rates with low latencies due to a scarcity of spectrum available in these bands. Millimeter wave (mmWave) communication is a key enabler for a significant increase in …
Critical Infrastructure Workforce Development Pods For Teaching Cybersecurity Using Netlab+,
2023
University of Arkansas, Fayetteville
Critical Infrastructure Workforce Development Pods For Teaching Cybersecurity Using Netlab+, Gideon Sutterfield
Computer Science and Computer Engineering Undergraduate Honors Theses
As digital automation for Industrial Control Systems has grown, so has its
vulnerability to cyberattacks. The world of industry has responded effectively to this, but the world of academia is still lagging as its emphasis is still almost entirely on information technology. Considering this, we created a workforce development pod that serves as a hands-on learning module for teaching students key cybersecurity ideas surrounding operational technology using the NETLAB+ platform. A pod serves as the virtual environment where the learning exercise takes place. This project’s implementation involved the creation of a segmented network within the pod where a student starts …
Iot Health Devices: Exploring Security Risks In The Connected Landscape,
2023
University of Tartu
Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer
School of Cybersecurity Faculty Publications
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …
Enhanced Mobile Networking Using Multi-Connectivity And Packet Duplication In Next-Generation Cellular Networks,
2023
Clemson University
Enhanced Mobile Networking Using Multi-Connectivity And Packet Duplication In Next-Generation Cellular Networks, Prabodh Mishra
All Dissertations
Modern cellular communication systems need to handle an enormous number of users and large amounts of data, including both users as well as system-oriented data. 5G is the fifth-generation mobile network and a new global wireless standard that follows 4G/LTE networks. The uptake of 5G is expected to be faster than any previous cellular generation, with high expectations of its future impact on the global economy. The next-generation 5G networks are designed to be flexible enough to adapt to modern use cases and be highly modular such that operators would have the flexibility to provide selective features based on user …
