{"title":"Evaluation of Organic Materials for Promotion of Green Buildings by Reduction of use of Carbon Emitting Materials","authors":"Rupa Shrestha, Sailesh Adhikari","doi":"10.3126/jes2.v1i1.58431","DOIUrl":"https://doi.org/10.3126/jes2.v1i1.58431","url":null,"abstract":"Abstract available with the full text.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81429633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic-Static Var Compensation for Improving Power Factor","authors":"Biswash Basnet, Kishor Sapkota, Rabison Poudel, Sandip Kshetri, Ram Prasad Pandey","doi":"10.3126/jes2.v1i1.58400","DOIUrl":"https://doi.org/10.3126/jes2.v1i1.58400","url":null,"abstract":"Abstract available with the full text.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"23 1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89386007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling of PID-Fuzzy Controller for Speed Control of Brushless DC Motor to Improve Steady State Performances","authors":"Bigyan Pokharel, Bimal Pandey, Ajay K.C., Sangam Gouli, Sandeep Dhami","doi":"10.3126/jes2.v1i1.58455","DOIUrl":"https://doi.org/10.3126/jes2.v1i1.58455","url":null,"abstract":"Abstract available with the full text.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74385647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main objective of the present study is to investigate parents’ awareness of cybersecurity in Saudi Arabia. The era we live in imposes on all stakeholders to be aware of information systems regardless of their gender, age, or education level. Moreover, a lack of cybersecurity awareness can have a drastic impact on parents and their children, especially in terms of hacking, phishing, and blackmailing. Therefore, our study aims to investigate the extent to which parents are aware of cybersecurity. A sample of 558 parents, including 346 males and 212 females, was targeted through an online questionnaire. Descriptive statistics revealed that parents are, to a large extent, aware of the existence of cyber threats, and are willing to protect their family members against the latter. However, this knowledge needs to be put into practice by parents and governmental authorities by taking concrete measures.
{"title":"Parents’ Awareness of Cybersecurity","authors":"Abdulrahman Alghamdi","doi":"10.5455/jeas.2022110102","DOIUrl":"https://doi.org/10.5455/jeas.2022110102","url":null,"abstract":"The main objective of the present study is to investigate parents’ awareness of cybersecurity in Saudi Arabia. The era we live in imposes on all stakeholders to be aware of information systems regardless of their gender, age, or education level. Moreover, a lack of cybersecurity awareness can have a drastic impact on parents and their children, especially in terms of hacking, phishing, and blackmailing. Therefore, our study aims to investigate the extent to which parents are aware of cybersecurity. A sample of 558 parents, including 346 males and 212 females, was targeted through an online questionnaire. Descriptive statistics revealed that parents are, to a large extent, aware of the existence of cyber threats, and are willing to protect their family members against the latter. However, this knowledge needs to be put into practice by parents and governmental authorities by taking concrete measures.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86913976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.17582/journal.jeas/41.1.13.23
Samreen Fatima, Mudassir Uddin
{"title":"Comparing Forecasts of GARCH (1, 1)-M and GARCH (1, 1)-M-ANNs Model: A Study Based On Stock Market Data","authors":"Samreen Fatima, Mudassir Uddin","doi":"10.17582/journal.jeas/41.1.13.23","DOIUrl":"https://doi.org/10.17582/journal.jeas/41.1.13.23","url":null,"abstract":"","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"77 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73904651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cyberspace has dramatically expanded due to technological advancement. Nowadays, cyberspace is part of daily life experiences and socio-economical activities. Countries all over the world need to have their own National Cybersecurity Strategies (NCSS) to be protected from cyber risks and threats. NCSS states the strength of a given country’s cybersecurity strength concerning the objectives, aims, vision, and cybersecurity mission of a country in question. Previously, many researchers have conducted studies on NCSS by contrasting the National Cybersecurity Strategy between different nations primarily for intercontinental teamwork and coordination of cybersecurity challenges globally. Purposefully, one of the main objectives is to evaluate and assess policy frameworks in various countries to combat the prevailing cyber threats. As a result, from the comparison of many policy frameworks on NCSS of many countries, it was discovered that more effort should put into National Cybersecurity of Saudi Arabia. This paper compares the cybersecurity strategy of Saudi Arabia with the NCSS of other fifteen countries such as the United States of America, Singapore, India, Japan, Malaysia, Kuwait, Canada, UK, China, Egypt, Bahrain, Hong Kong, Russia, Korea, and France. Saudi Arabia rank in cybersecurity has risen to be in the second rank in 2020. Compared to other developed countries, the results found that Saudi Arabia appears to be on the right track in ensuring the safety of its cyberspace.
{"title":"A Comparative Analysis to Advancing the National Cybersecurity Strategy in Saudi Arabia","authors":"Abdulrahman Alghamdi","doi":"10.5455/jeas.2022050102","DOIUrl":"https://doi.org/10.5455/jeas.2022050102","url":null,"abstract":"Cyberspace has dramatically expanded due to technological advancement. Nowadays, cyberspace is part of daily life experiences and socio-economical activities. Countries all over the world need to have their own National Cybersecurity Strategies (NCSS) to be protected from cyber risks and threats. NCSS states the strength of a given country’s cybersecurity strength concerning the objectives, aims, vision, and cybersecurity mission of a country in question. Previously, many researchers have conducted studies on NCSS by contrasting the National Cybersecurity Strategy between different nations primarily for intercontinental teamwork and coordination of cybersecurity challenges globally. Purposefully, one of the main objectives is to evaluate and assess policy frameworks in various countries to combat the prevailing cyber threats. As a result, from the comparison of many policy frameworks on NCSS of many countries, it was discovered that more effort should put into National Cybersecurity of Saudi Arabia. This paper compares the cybersecurity strategy of Saudi Arabia with the NCSS of other fifteen countries such as the United States of America, Singapore, India, Japan, Malaysia, Kuwait, Canada, UK, China, Egypt, Bahrain, Hong Kong, Russia, Korea, and France. Saudi Arabia rank in cybersecurity has risen to be in the second rank in 2020. Compared to other developed countries, the results found that Saudi Arabia appears to be on the right track in ensuring the safety of its cyberspace.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83303851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public Private Partnership (PPP) as an Aid to Tertiary Institution Support for Internally Generated Revenue (IGR): A Case Study of Yaba College of Technology","authors":"Toriola-Coker Luqman Olalekan, Omokungbe Obafemi Owoseni, Alaka Hafiz, Owolabi Hakeem, Obisanya Adekunle Adedapo","doi":"10.11648/j.eas.20220703.12","DOIUrl":"https://doi.org/10.11648/j.eas.20220703.12","url":null,"abstract":"","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81059337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.17582/journal.jeas/41.1.33.43
N. Khan, Muhammad Sufyan Khan, T. Saeed, M. Ilyas, Hazrat Husaain
{"title":"The COVID-19 and its Impacts on Progressive Sectors of Pakistan","authors":"N. Khan, Muhammad Sufyan Khan, T. Saeed, M. Ilyas, Hazrat Husaain","doi":"10.17582/journal.jeas/41.1.33.43","DOIUrl":"https://doi.org/10.17582/journal.jeas/41.1.33.43","url":null,"abstract":"","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74920461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Technology in the recent years has dramatically invaded the education system and profoundly changed the classroom landscape, especially in modern universities. Internet of Things (IoT) devices, such as automated attendance tracker, interactive whiteboards, etc., are significantly utilized to create a positive and engaging classroom atmosphere. Unfortunately, some emerging universities deploy these smart tools before establishing an effective cybersecurity management system to protect critical characteristics of information, i.e., confidentiality, integrity, and availability. The cybersecurity management system in academic institutions is the most-targeted system for cyberattacks, which is growing rapidly and hits businesses worldwide every day. To shed lights on the impact of this critical problem, we introduce a cybersecurity management system designed specifically for academic institutions based on Saudi Arabia. The paper also looks closely at the best practices and the adoption of international information security management standards deployed in worldwide academic institutions.
{"title":"Developing Cost-effective Cybersecurity Management System for Academic Institutions in Saudi Arabia","authors":"T. Alharbi","doi":"10.5455/jeas.2022050105","DOIUrl":"https://doi.org/10.5455/jeas.2022050105","url":null,"abstract":"Technology in the recent years has dramatically invaded the education system and profoundly changed the classroom landscape, especially in modern universities. Internet of Things (IoT) devices, such as automated attendance tracker, interactive whiteboards, etc., are significantly utilized to create a positive and engaging classroom atmosphere. Unfortunately, some emerging universities deploy these smart tools before establishing an effective cybersecurity management system to protect critical characteristics of information, i.e., confidentiality, integrity, and availability. The cybersecurity management system in academic institutions is the most-targeted system for cyberattacks, which is growing rapidly and hits businesses worldwide every day. To shed lights on the impact of this critical problem, we introduce a cybersecurity management system designed specifically for academic institutions based on Saudi Arabia. The paper also looks closely at the best practices and the adoption of international information security management standards deployed in worldwide academic institutions.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90952665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.11648/j.eas.20220702.11
V. Murugesan, K. Chandramohan, Subash Ponnusamy, Y. Muthusamy
{"title":"Evaluation of Varicose Vein Prediction and Accumulation Reduction Using Artificial Pressure Generation","authors":"V. Murugesan, K. Chandramohan, Subash Ponnusamy, Y. Muthusamy","doi":"10.11648/j.eas.20220702.11","DOIUrl":"https://doi.org/10.11648/j.eas.20220702.11","url":null,"abstract":"","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91326035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}