Results for 'network security'

978 found
Order:
  1. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  32
    Attachment, Security, and Relational Networks.Stephanie Collins & Liam Shields - forthcoming - Journal of Value Inquiry.
    The philosophical literature on personal relationships is focused on dyads: close relationships between just two people. This paper aims to characterise the value of looser and larger relational networks, particularly from the perspective of liberal political theory. We focus on relational networks' value vis-a-vis the important good of felt security. We begin by characterising felt security and analysing how felt security is produced within dyads. We highlight the ambivalent nature of dyadic relationships as a source of felt (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  60
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. An Intelligent Tutoring System for Learning Computer Network CCNA.Izzeddin A. Alshawwa, Mohammed Al-Shawwa & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):28-36.
    Abstract: Networking is one of the most important areas currently used for data transfer and enterprise management. It also includes the security aspect that enables us to protect our network to prevent hackers from accessing the organization's data. In this paper, we would like to learn what the network is and how it works. And what are the basics of the network since its emergence and know the mechanism of action components. After reading this paper - (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its portability and heterogeneity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly follows (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  11.  32
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  22
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and Convolutional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  26
    Deep Neural Networks for Real-Time Plant Disease Diagnosis and Productivity Optimization.K. Usharani - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):645-652.
    The health of plants plays a crucial role in ensuring agricultural productivity and food security. Early detection of plant diseases can significantly reduce crop losses, leading to improved yields. This paper presents a novel approach for plant disease recognition using deep learning techniques. The proposed system automates the process of disease detection by analyzing leaf images, which are widely recognized as reliable indicators of plant health. By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web page phishing attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Power of Networks and Peer Pressure: An analysis of Slum Sanitation Program in Mumbai.Vivek Anand Asokan - 2017 - International Journal Sustainable Future for Human Security 5 (2):11-20.
    With the advent of the “Clean India” campaign in India, a renewed focus on cleanliness has started, with a special focus on sanitation. There have been efforts in the past to provide sanitation related services. However, there were several challenges in provisioning. Provision of sanitation is a public health imperative given increased instances of antimicrobial resistance in India. This paper focuses on sanitation provisioning in the city of Mumbai, especially in the slums of Mumbai. The paper compares and contrasts different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Centralized Information Security Log-Collection facility.Veda Reddy T. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-12.
    This paper extensively develops and thoroughly creates a highly centralized and extremely efficient log collection system utilizing and leveraging the robust syslog server and comprehensively collects and gathers log data from the numerous hosts residing within the network, meticulously analyses and scrutinizes the detailed log files and promptly sends and transmits a critical alert message to the central host through secure and reliable SMS. This paper thoroughly and comprehensively addresses and tackles the increasingly growing and rapidly expanding need for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Torture Pornopticon: (In)security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris. pp. 29-41.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films (including Captivity, Hunger, and Torture Room). Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities (see Haggerty, 2011), the panopticon remains a dominant paradigm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  5
    Using the Existing CCTV Network for Crowd Management, Crime Prevention, and Work Monitoring using AIML.N. M. S. Desai - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-12.
    Closed-Circuit Television (CCTV) systems are essential in modern security setups because they provide continuous surveillance, acting as both a deterrent and a critical tool for monitoring and evidence collection. Unlike human guards who can be limited by fatigue and blind spots, CCTV cameras offer consistent, 24/7 coverage of key areas. They fill gaps in the current security system by enabling real-time monitoring and recording incidents for later review, ensuring that potential security breaches are detected and addressed more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Holding “free and unfair elections”: the electoral containment strategies used by incumbent political parties in Albania to secure their grip on power.Gerti Sqapi & Klementin Mile - 2022 - Jus and Justicia 16 (1):78-92.
    The purpose of this article is to highlight the clientelistic strategies and informal practices that the ruling political parties in Albania use during the elections to ensure an unfair advantage in their favour over the opposition challengers. One of the main characteristics of the political developments of the transition period in Albania since 1991 has been the flourishing of informal practices and clientelist networks of political parties within state structures, which has produced an extreme politicization of these institutions. These strategies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation.Sally Serena Ramage - 2010 - Current Criminal Law 2 (3):2-7.
    Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation Pages 2-7 Current Criminal Law ISSN 1758-8405 Volume 2 Issue 3 March 2010 Author SALLY RAMAGE WIPO 900614 UK TM 2401827 USA TM 3,440.910 Orchid ID 0000-0002-8854-4293 Sally Ramage, BA (Hons), MBA, LLM, MPhil, MCIJ, MCMI, DA., ASLS, BAWP. Publisher & Managing Editor, Criminal Lawyer series [1980-2022](ISSN 2049-8047); Current Criminal Law series [2008-2022] (ISSN 1758-8405) and Criminal Law News series [2008-2022] (ISSN 1758-8421). Sweet & Maxwell (Thomson (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  48
    An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with Signature-Based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Sentiment analysis on online social network.Vijaya Abhinandan - forthcoming - International Journal of Computer Science, Information Technology, and Security.
    A large amount of data is maintained in every Social networking sites.The total data constantly gathered on these sites make it difficult for methods like use of field agents, clipping services and ad-hoc research to maintain social media data. This paper discusses the previous research on sentiment analysis.
    Download  
     
    Export citation  
     
    Bookmark  
  27. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...) of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Vectors of epistemic insecurity.Emily Sullivan & Mark Alfano - 2020 - In Ian James Kidd, Quassim Cassam & Heather Battaly (eds.), Vice Epistemology. New York, NY: Routledge.
    Epistemologists have addressed a variety of modal epistemic standings, such as sensitivity, safety, risk, and epistemic virtue. These concepts mark out the ways that beliefs can fail to track the truth, articulate the conditions needed for knowledge, and indicate ways to become a better epistemic agent. However, it is our contention that current ways of carving up epistemic modality ignore the complexities that emerge when individuals are embedded within a community and listening to a variety of sources, some of whom (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  4
    Efficient Enumeration of URLs of Active Hidden Servers over Anonymous Channel.S. Cherishma Sree - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-14.
    This project presents an innovative approach to the efficient enumeration of hidden service URLs (.onion) on the TOR network using a custom-built graphical user interface (GUI) application. The tool leverages web scraping techniques, targeting the Ahmia search engine, to retrieve and analyze active hidden server URLs. Through the integration of Python’s Tkinter library for GUI development and the use of requests and regular expressions for content mining, the application simplifies the process of discovering and visualizing .onion URLs. The tool (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Family and community inputs as predictors of students’ overall, cognitive, affective and psychomotor learning outcomes in secondary schools.John Asuquo Ekpenyong, Valentine Joseph Owan, Usen Friday Mbon & Stephen Bepeh Undie - 2023 - Journal of Pedagogical Research 7 (1):103-127.
    There are contradictory results regarding how students' learning outcomes can be predicted by various family and community inputs among previous studies, creating an evidence gap. Furthermore, previous studies have mostly concentrated on the cognitive aspect of students' learning outcomes, ignoring the affective and psychomotor dimensions, creating key knowledge gaps. Bridging these gaps, this predictive correlational study was conducted to understand how cultural capital, parental involvement (family inputs), support for schools, security network and school reforms (community inputs) jointly and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Policing Uncertainty: On Suspicious Activity Reporting.Meg Stalcup - 2015 - In Rabinow Simimian-Darash (ed.), Modes of Uncertainty: Anthropological Cases. University of Chicago. pp. 69-87.
    A number of the men who would become the 9/11 hijackers were stopped for minor traffic violations. They were pulled over by police officers for speeding or caught by random inspection without a driver’s license. For United States government commissions and the press, these brushes with the law were missed opportunities. For some police officers though, they were of personal and professional significance. These officers replayed the incidents of contact with the 19 men, which lay bare the uncertainty of every (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  95
    Stakeholders’ Evaluation of a Farmer-Herder Conflict Research Project in the Ashanti Region of Ghana.Suhiyini Alhassan - 2024 - Sustainable Agriculture Research 13 (2):84-100.
    There has been growing interest in the evaluation of research projects in Africa because of the quantum of funding devoted to research by governmental and non-governmental organizations. One area that has received a lot of research funding is farmer-herder conflicts due to its high impact on peace, security and development on the continent. This paper evaluates a Danida-funded research project in the Ashanti Region of Ghana dubbed “Access-Authority Nexus in Farmer-Herder Conflicts (AAN Project)”. Primary data was collected from 46 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  62
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  63
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  59
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Compound Metric Assisted Trust Aware Routing for Internet of Things through Firefly Algorithm.Mohammad Osman, Kaleem Fatima & P. Naveen Kumar - 2023 - International Journal of Intelligent Engineering and Systems 16 (3):280-291.
    Security and privacy are the major concerns in the internet of things (IoT) which are uncertain and unpredictable. Trust aware routing is one of the recent and effective strategies which ensure better resilience for IoT nodes from different security threats. Towards such concern, this paper proposes a new strategy called independent onlooker withstanding trust aware routing (IOWTAR) for IoT. IOWTAR introduced a new compound trust metric by combining three individual metrics namely independent trust, onlooker trust, and withstanding trust (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. The Modern Origins & Sources of China’s Techtransfer.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):18-25.
    The research identified the key element on P. R. China’s incentives in modern history on techtransfer practices. With reviewing on the state funding surrogacy in the natural sciences, the author identified the key militant coercive contracting clauses in the document of the National Natural Science Foundation of China. With its combined workings with the statutory & martial laws, the analysis takes a com- parative culture approach that partially counteracts the work of the “United Front Working Group of the CPC”, which (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  39.  26
    Automated Plant Disease Detection through Deep Learning for Enhanced Agricultural Productivity.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):640-650.
    he health of plants plays a crucial role in ensuring agricultural productivity and food security. Early detection of plant diseases can significantly reduce crop losses, leading to improved yields. This paper presents a novel approach for plant disease recognition using deep learning techniques. The proposed system automates the process of disease detection by analyzing leaf images, which are widely recognized as reliable indicators of plant health. By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Ideas as Infections: Introduction to the Problematics of Cognitive Metaparasitism.Oleg Gurov - 2023 - Epistema 1 (1).
    The article deals with the concept of metaparasite in the cultural and communicative sphere. Relying on the memetic theory of R. Dawkins and the cognitive framework proposed by K. Anokhin, the authors explore the dynamics of metaparasitism and the ability of the metaparasite to change its environment beyond the original context. The article also considers the challenges that have emerged in the post-truth era, embodied in such phenomena as fake news, etc., and emphasizes the need to find effective responses to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object.Samy S. Abu Naser, Wadee W. Alamawi & Mostafa F. Alfarra - 2016 - International Journal of Information Technology and Electrical Engineering 5 (6):26-33.
    There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs. Thus the demand on Wi-Fi connections increased rapidly. Rule Based System is an essential method in helping using the human expertise in many challenging fields. In this paper, a Rule Based System was designed and developed for diagnosing the wireless connection problems and (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  42. Type of Tomato Classification Using Deep Learning.Mahmoud A. Alajrami & Samy S. Abu-Naser - 2020 - International Journal of Academic Pedagogical Research (IJAPR) 3 (12):21-25.
    Abstract: Tomatoes are part of the major crops in food security. Tomatoes are plants grown in temperate and hot regions of South American origin from Peru, and then spread to most countries of the world. Tomatoes contain a lot of vitamin C and mineral salts, and are recommended for people with constipation, diabetes and patients with heart and body diseases. Studies and scientific studies have proven the importance of eating tomato juice in reducing the activity of platelets in diabetics, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  26
    Digital Inheritance in Web3: A Case Study of Soulbound Tokens and the Social Recovery Pallet within the Polkadot and Kusama Ecosystems.Justin Goldston, Tomer Jordi Chaffer, Justyna Osowska & Charles von Goins Ii - manuscript
    In recent years discussions centered around digital inheritance have increased among social media users and across blockchain ecosystems. As a result digital assets such as social media content cryptocurrencies and non-fungible tokens have become increasingly valuable and widespread, leading to the need for clear and secure mechanisms for transferring these assets upon the testators death or incapacitation. This study proposes a framework for digital inheritance using soulbound tokens and the social recovery pallet as a use case in the Polkadot and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  56
    IT & C, Volumul 3, Numărul 3, Septembrie 2024.Nicolae Sfetcu - 2024 - It and C 3 (3).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Tools Used in AI Development – The Turing Test Instrumente utilizate în dezvoltarea IA – Testul Turing -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Trends in the Evolution of Artificial Intelligence – Intelligent Agents Tendințe în evoluția inteligenței artificiale – Agenți inteligenți -/- TELECOMUNICAȚII / TELECOMMUNICATIONS -/- Security in 5G Telecommunications Networks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Neither opaque nor transparent: A transdisciplinary methodology to investigate datafication at the EU borders.Ana Valdivia, Claudia Aradau, Tobias Blanke & Sarah Perret - 2022 - Big Data and Society 9 (2).
    In 2020, the European Union announced the award of the contract for the biometric part of the new database for border control, the Entry Exit System, to two companies: IDEMIA and Sopra Steria. Both companies had been previously involved in the development of databases for border and migration management. While there has been a growing amount of publicly available documents that show what kind of technologies are being implemented, for how much money, and by whom, there has been limited engagement (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  48
    Digital Citizen Participation in a Comparative Context: Co-Creating Cities through Hybrid Practices.Aline Suter, Pekka Tuominen, Asma Mehan, Paulina Polko, Kinga Kimic & Simone Tappert - 2024 - In Francesco Rotondo, Aleksandra Djukic, Preben Hansen, Edmond Manahasa, Mastoureh Fathi & Juan A. García-Esparza (eds.), Placemaking in Practice Volume 2: Engagement in Placemaking: Methods, Strategies, Approaches. Leiden, The Netherlands: Brill. pp. 156–180.
    Citizen participation today needs to be understood as both an empowerment practice to create urban futures as well as the perpetuation of entrepreneurial and neoliberal modes of planning. The exponential progress of technologies and the digitalisation of everyday life have led to a surge of innovation. Since hybridity has become a key factor, citizen participation now involves citizens and governments meeting online and offline in a multi-stakeholder setting to plan the city in parallel layers, often according to controversial or even (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Single Valued Neutrosophic HyperSoft Set based on VIKOR Method for 5G Architecture Selection.Florentin Smarandache, M. Ali Ahmed & Ahmed Abdelhafeez - 2024 - International Journal of Neutrosophic Science 23 (2):42-52.
    This work introduces the framework for selecting architecture in 5G networks, considering various technological, performance, economic, and operational factors. With the emergence of 5G technology, the architecture selection process has become pivotal in meeting diverse requirements for ultra-high-speed connectivity, low latency, scalability, and diverse service demands. The evaluation comprehensively analyses different architecture options, including centralized, distributed, cloud-based, and virtualized architectures. Factors such as network performance, scalability, cost-effectiveness, security, and compatibility are considered within a multi-criteria decision-making framework. Findings reveal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. A feeling for the algorithm: Diversity, expertise and artificial intelligence.Catherine Stinson & Sofie Vlaad - 2024 - Big Data and Society 11 (1).
    Diversity is often announced as a solution to ethical problems in artificial intelligence (AI), but what exactly is meant by diversity and how it can solve those problems is seldom spelled out. This lack of clarity is one hurdle to motivating diversity in AI. Another hurdle is that while the most common perceptions about what diversity is are too weak to do the work set out for them, stronger notions of diversity are often defended on normative grounds that fail to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Leading innovations and investments into the new energy technologies.Anetta Zielińska, Igor Britchenko & Piotr Jarosz - 2018 - Advances in Social Science, Education and Humanities Research. – Atlantis Press: Proceedings of the 2nd International Conference on Social, Economic and Academic Leadership (ICSEAL 2018) 217:320-324.
    This paper focuses on the novel and leading innovations and investments into the new energy technologies. Energy issues, including sustainability, energy security and energy dependency are probably one of the most crucial and critical issues that humanity must face at the moment. Recent global challenges, such as climate change and the rise of the “green” energy (represented by the increasing deployment of the renewable energy sources (RES)), as well as distributed energy generation and platform energy markets (e.g. peer-to-peer (P2P) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Where Dreams and Nightmares Are From: Creativity and Creative Economy.Diego Santos Vieira de Jesus - 2021 - Philosophy Study 11 (4):268-276.
    The aim is to examine the multiple meanings of creativity in creative economy. The meanings which reinforce the individual aspect stress that personal characteristics may unlock the wealth that lies within people. The definitions that reinforce the organizational and social aspects understand creativity as a process, which requires knowledge, networks, and technologies that interconnect novel ideas and contexts. The perspectives which reinforce the political aspect see that creativity took the status of a doctrine to secure collaboration between government and industry. (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 978