Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Physical Sciences and Mathematics

A Smart Chatbot System For Digitizing Service Management To Improve Business Continuity, Asraa Mohammed Albeshr Nov 2023

A Smart Chatbot System For Digitizing Service Management To Improve Business Continuity, Asraa Mohammed Albeshr

Theses

Chatbots, also called digital systems that require a natural language-based interface for user interaction, are increasingly being integrated into our daily lives. These chatbots respond intelligently to voice and text and function as sophisticated entities. Its functioning includes the recognition of multiple human languages through the application of Natural Language Processing (NLP) techniques. These chatbots find applications in various areas such as e-commerce services, medical assistance, recommendation systems, and educational purposes. This reflects the versatility and widespread adoption of this technology. AI chatbots play a crucial role in improving IT support in IT Service Management (ITSM) for better business continuity. …


An Efficient Strategy For Deploying Deception Technology, Noora Abdulla Alhosani Jun 2023

An Efficient Strategy For Deploying Deception Technology, Noora Abdulla Alhosani

Theses

Implementations of deception technology is crucial in discovering attacks by creating a controlled and monitored environment for detecting malicious activity. This technology involves the deployment of decoys, traps, and honeypots that mimic natural systems and network assets to attract and identify attackers. The use of deception technology provides an early warning system for detecting cyber-attacks, allowing organizations to respond quickly and mitigate damage. This article proposed a framework that focuses on maximizing the efficiency of deception technology in detecting sophisticated attacks. The framework employs multi-layered deception techniques at various levels of the network, system, and application to provide comprehensive coverage …


Digital Transformation In Local Governments: A Case Study Of Abu Dhabi Municipality Transport Department, Alia Sahmi Al Ahbabi Jun 2023

Digital Transformation In Local Governments: A Case Study Of Abu Dhabi Municipality Transport Department, Alia Sahmi Al Ahbabi

Theses

The new generation is rapidly adapting to the digital era, where government and private services are being transformed into electronic services, commonly known as Eservices. Cities are leveraging digitalization to streamline their business processes and business services. This digitalization has improved service delivery time and quality for individuals. With digitalization, business processes align with technology, enhancing performance and customer satisfaction. However, there are challenges associated with digitalization, particularly people working in various municipality departments who find it challenging to adapt to digitization. Employees may take time to adjust to the new techniques and technologies, which may hamper the actions of …


A Comparative Study On Microchip Implants In Humans And Wearable Devices, Ltifa Mohammed Almansoori Apr 2023

A Comparative Study On Microchip Implants In Humans And Wearable Devices, Ltifa Mohammed Almansoori

Theses

After the tragic covid pandemic in 2020, many things changed in the world, from learning physically all the way to e-learning, as the whole world was forced to switch digitally. It is expected that a lot of people will be more willing to invest in new technologies that aid in human development and among them are human microchip implants. The emerging technology of human microchip implants is slowly catching the attention of various countries around the world after the sudden surge of adoption in Europe. With the introduction of Biohax microchip implants in the UAE by Etisalat it is most …


Cheating Detection In Online Exams Based On Captured Video Using Deep Learning, Aysha Sultan Alkalbani Apr 2023

Cheating Detection In Online Exams Based On Captured Video Using Deep Learning, Aysha Sultan Alkalbani

Theses

Today, e-learning has become a reality and a global trend imposed and accelerated by the COVID-19 pandemic. However, there are many risks and challenges related to the credibility of online exams which are of widespread concern to educational institutions around the world. Online exam system continues to gain popularity, particularly during the pandemic, due to the rapid expansion of digitalization and globalization. To protect the integrity of the examination and provide objective and fair results, cheating detection and prevention in examination systems is a must. Therefore, the main objective of this thesis is to develop an effective way of detection …


A Blockchain Based Policy Framework For The Management Of Electronic Health Record (Ehrs), Aysha Ali Mohammed Murad Qambar Nov 2022

A Blockchain Based Policy Framework For The Management Of Electronic Health Record (Ehrs), Aysha Ali Mohammed Murad Qambar

Theses

The rapid development of information technology during the last decade has greatly influenced all aspects of society, including individuals and enterprise organizations. Adopting new technologies by individuals and organizations depends on several factors, such as usability, available resources, support needed for adoption benefits, and return on investment, to mention a few. When it comes to the adoption of new technologies, one of the main challenges faced by organizations is the ability to effectively incorporate such technologies into their enterprise solutions to maximize the expected benefits. For the last several years, Blockchain technology has become a popular trend in a variety …


Authenticated Key Establishment Protocol For Constrained Smart Healthcare Systems Based On Physical Unclonable Function, Abdalla Saleh Elkushli Apr 2022

Authenticated Key Establishment Protocol For Constrained Smart Healthcare Systems Based On Physical Unclonable Function, Abdalla Saleh Elkushli

Theses

Smart healthcare systems are one of the critical applications of the internet of things. They benefit many categories of the population and provide significant improvement to healthcare services. Smart healthcare systems are also susceptible to many threats and exploits because they run without supervision for long periods of time and communicate via open channels. Moreover, in many implementations, healthcare sensor nodes are implanted or miniaturized and are resource-constrained. The potential risks on patients/individuals’ life from the threats necessitate that securing the connections in these systems is of utmost importance. This thesis provides a solution to secure end-to-end communications in such …


Establishing Blockchain-Related Security Controls, Maitha Ali Mohammed Hamad Al Ketbi Nov 2020

Establishing Blockchain-Related Security Controls, Maitha Ali Mohammed Hamad Al Ketbi

Theses

Blockchain technology is a secure and relatively new technology of distributed digital ledgers which is based on interlinked blocks of transactions. There is a rapid growth in the adoption of the blockchain technology in different solutions and applications and within different industries throughout the world, such as but not limited to, finance, supply chain, digital identity, energy, healthcare, real estate and government. Blockchain technology has great benefits such as decentralization, transparency, immutability and automation. Like any other emerging technology, the blockchain technology has also several risks and threats associated with its expected benefits which in turns could have a negative …


Disruptive Bussiness Model For Higher Education, Aya Rizik Abushawish Jun 2020

Disruptive Bussiness Model For Higher Education, Aya Rizik Abushawish

Theses

A business model is a plan for the successful operation of a business, identifying the source of revenue, the intended customers, value proposition, key resources, activities, and financing. It describes how organizations create, deliver and capture value. The recent developments in information and communications technology (ICT) disrupted most business models in different industries. The higher education industry is no exception, where it witnessed enormous integration of information and communications technologies. E-learning in higher education has made a tremendous shift in students’ life and raised the expectations of higher education service quality. The main objective of this thesis to develop a …


Business-It Alignment In Higher Education Institutions: United Arab Emirates University Case Study, Nayla Salem Ali Al Khateri Nov 2017

Business-It Alignment In Higher Education Institutions: United Arab Emirates University Case Study, Nayla Salem Ali Al Khateri

Theses

This thesis addresses the importance of Business-IT alignment in higher education institutions. Business-IT alignment is defined as applying IT in a suitable and timely manner, in harmony with business strategies, goals and needs. Business- IT alignment is an ultimate goal of governmental and non-governmental organizations that requires close attention and continuous monitoring. UAE university has a well-defined business strategy augmented with a well-defined IT strategy. So, to get the most benefits of acquiring and using IT in the university, the IT need to be aligned with the core business and the supporting services. The main objective of this thesis is …


Mobile Big Data Analytics In Healthcare, Alramzana Nujum Navaz Apr 2017

Mobile Big Data Analytics In Healthcare, Alramzana Nujum Navaz

Theses

Mobile and ubiquitous devices are everywhere around us generating considerable amount of data. The concept of mobile computing and analytics is expanding due to the fact that we are using mobile devices day in and out without even realizing it. These mobile devices use Wi-Fi, Bluetooth or mobile data to be intermittently connected to the world, generating, sending and receiving data on the move. Latest mobile applications incorporating graphics, video and audio are main causes of loading the mobile devices by consuming battery, memory and processing power. Mobile Big data analytics includes for instance, big health data, big location data, …


Early Packet Rejection Using Dynamic Binary Decision Diagram, Vasiqullah Molvizadah Nov 2016

Early Packet Rejection Using Dynamic Binary Decision Diagram, Vasiqullah Molvizadah

Theses

A firewall is a hardware or software device that performs inspection on a given incoming/outgoing packets and decide whether to allow/deny the packet from entering/leaving the system. Firewall filters the packets by using a set of rules called firewall policies. The policies define what type of packets should be allowed or discarded. These policies describe the field values that the packet header must contain in order to match a policy in the firewall. The decision for any given packet is made by finding the first matching firewall policy, if any.

In a traditional firewall, the packet filter goes through each …


Biometrics-Based Dynamic Authentication For Secure Services, Saif Mohammed Saeed Abdulla Al Aryani Apr 2016

Biometrics-Based Dynamic Authentication For Secure Services, Saif Mohammed Saeed Abdulla Al Aryani

Theses

This thesis proposes a secure authentication protocol against physical session hijacking attacks. In client/server technology, users establish sessions to access the services offered by the servers. However, using physical session hijacking attacks, malicious users may physically take control of ongoing sessions. Malicious users also can establish sessions with servers using stolen passwords. In both cases, the server will be communicating with the wrong user who pretends to be the real user. The goal of this authentication protocol is to continuously and dynamically ensure that during an ongoing session the current session’s user is himself the real person that is known …


Cloud Practical Exam Invigilation Control Systems With The Objective Of Enhancing Quality Control For Online Exams, Gordon O'Reilly Jan 2016

Cloud Practical Exam Invigilation Control Systems With The Objective Of Enhancing Quality Control For Online Exams, Gordon O'Reilly

Theses

Online cloud computing courses are becoming more common place facilitating a student to study from home from anywhere in the world. Coupled with this trend is a need for educational institutions to facilitate students to take tests or exams online from home. It reduces the remote student’s time and cost of travel to an exam invigilation centre as well as reducing the educational institution’s test administration overhead. It does however introduce potential quality control concerns. A new industry called online proctoring has emerged that attempts to provide quality control in these online test scenarios.

This research provides an insight into …


Group Selection And Key Management Strategies For Ciphertext-Policy Attribute-Based Encryption, Russell F. Martin Dec 2013

Group Selection And Key Management Strategies For Ciphertext-Policy Attribute-Based Encryption, Russell F. Martin

Theses

Ciphertext-Policy Attribute-Based Encryption (CPABE) was introduced by Bethencourt, Sahai, and Waters, as an improvement of Identity Based Encryption, allowing fine grained control of access to encrypted files by restricting access to only users whose attributes match that of the monotonic access tree of the encrypted file. Through these modifications, encrypted files can be placed securely on an unsecure server, without fear of malicious users being able to access the files, while allowing each user to have a unique key, reducing the vulnerabilites associated with sharing a key between multiple users.

However, due to the fact that CPABE was designed for …


Rule-Based Conditional Trust With Openpgp., Andrew Jackson Nov 2013

Rule-Based Conditional Trust With Openpgp., Andrew Jackson

Theses

This thesis describes a new trust model for OpenPGP encryption. This trust model uses conditional rule-based trust to establish key validity and trust. This thesis describes "Trust Rules" that may be used to sort and categorize keys automatically without user interaction. "Trust Rules" are also capable of integrating key revocation status into its calculations so it too is automated. This thesis presents that conditional trust established through "Trust Rules" can enforce stricter security while reducing the burden of use and automating the process of key validity, trust, and revocation.


A Forensic Comparison: Windows 7 And Windows 8, Peter J. Wilson Nov 2013

A Forensic Comparison: Windows 7 And Windows 8, Peter J. Wilson

Theses

Whenever a new operating system or new version of an operating system is released, forensic investigators must re-examine the new operating system or new version. They do so to determine if there are significant differences that will impact and change the way they perform their investigations. With the release of Microsoft's latest operating system, Windows 8, and its update, Windows 8.1, understanding the similarities and differences between Windows 8 and previous operating systems such as Windows 7 is critical. This paper forensically examines Windows 7 and Windows 8 to determine those similarities and differences.


Segmentation And Model Generation For Large-Scale Cyber Attacks, Steven E. Strapp Aug 2013

Segmentation And Model Generation For Large-Scale Cyber Attacks, Steven E. Strapp

Theses

Raw Cyber attack traffic can present more questions than answers to security analysts. Especially with large-scale observables it is difficult to identify which packets are relevant and what attack behaviors are present. Many existing works in Host or Flow Clustering attempt to group similar behaviors to expedite analysis; these works often phrase the problem directly as offline unsupervised machine learning. This work proposes online processing to simultaneously model coordinating actors and segment traffic that is relevant to a target of interest, all while it is being received. The goal is not just to aggregate similar attack behaviors, but to provide …


Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann Jan 2008

Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann

Theses

Mobile technologies with limited resources, such as smart phones or PDAs, have increased dramatically in popularity. However, the level of security provided for these technologies has not kept pace with the value of the data that they contain or transmit.

Wireless networks usually provide some security, in the form of encryption. GSM and GPRS use different forms of the A5 algorithm, and Wi-Fi uses WEP or WPA. These encryption algorithms have proven weaknesses and in some cases have been efficiently cracked. To improve the security of wireless networks, stronger encryption algorithms need to be developed. One of the most attractive …


Security In Distributed Systems - A Framework For Different Application Types, Ingo Stengel Jan 2000

Security In Distributed Systems - A Framework For Different Application Types, Ingo Stengel

Theses

Security is a factor which decides upon the applicability of distributed applications. Therefore this thesis deals with security in distributed systems. The complexity of the existing distributed technologies makes it necessary to reduce the number of distributed technologies considered in this thesis, i.e. concentrating on: Java, Mobile Agents and CORBA, where only Java-based mobile agents will be considered.

After a short review of basic security principles including firewalls, existing security problems in the above mentioned distributed technologies are analysed. Additional generic problems in distributed systems are outlined.

Solutions are referring to two different areas: those regarding security problems with firewalls …