首页 > 最新文献

Oriental journal of computer science and technology最新文献

英文 中文
Logical Foundations for Reasoning in Cyber - Physical Systems 网络物理系统推理的逻辑基础
Pub Date : 2023-05-30 DOI: 10.13005/ojcst16.01.01
T. Gopal
This paper aims at building the causal relations and event structures13 to study the complex and evolving cyber – physical systems with illustrations of the reasoning based on Robotics24 and Policy Analysis25 for Communication Systems. An empirical analysis points to the realism that network security is also a geometric theory with safety and authentication tending to geometric formulae that make the larger structures. Security is very much a matter of perception too. The proposed approach also factors the perceptual aspects of the human mind. This paper includes several interesting possibilities for using linear algebra, discrete mathematics, analysis, and topology in the domains such as economics, game theory, robotics and biology to mention a few.
本文旨在建立因果关系和事件结构,以研究复杂和不断发展的网络物理系统,并举例说明基于机器人和通信系统政策分析的推理。实证分析表明,网络安全也是一种几何理论,安全性和认证倾向于几何公式,使结构更大。安全在很大程度上也是一个感知问题。提出的方法还考虑了人类思维的感知方面。本文包括几个有趣的可能性,使用线性代数、离散数学、分析和拓扑学领域,如经济学、博弈论、机器人和生物学等。
{"title":"Logical Foundations for Reasoning in Cyber - Physical Systems","authors":"T. Gopal","doi":"10.13005/ojcst16.01.01","DOIUrl":"https://doi.org/10.13005/ojcst16.01.01","url":null,"abstract":"This paper aims at building the causal relations and event structures13 to study the complex and evolving cyber – physical systems with illustrations of the reasoning based on Robotics24 and Policy Analysis25 for Communication Systems. An empirical analysis points to the realism that network security is also a geometric theory with safety and authentication tending to geometric formulae that make the larger structures. Security is very much a matter of perception too. The proposed approach also factors the perceptual aspects of the human mind. This paper includes several interesting possibilities for using linear algebra, discrete mathematics, analysis, and topology in the domains such as economics, game theory, robotics and biology to mention a few.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114121318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Distancing Detection System with Distance Sensor for Covid-19 Prevention 新型冠状病毒预防用距离传感器物理距离检测系统
Pub Date : 2023-05-30 DOI: 10.13005/ojcst16.01.05
Estifanos Tilahun Mihret
COVID-19 is an ongoing pandemic and dangerous of coronavirus disease 2019. It caused by the transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). COVID-19 spreads most often when people are physically close. And, it spreads very easily and sustainably through the air, primarily via small droplets or aerosols, as an infected person breaths, coughs, sneezes, sings or speaks. The recommended preventive measures include hand washing, covering one’s mouth when sneezing or coughing, physical distancing, wearing a face mask in public, ventilation and air-filtering, disinfecting surfaces, and monitoring and self-isolation for people exposed or symptomatic. Hence, this paper proposed the architecture of physical distancing detection system with distance sensor which deployed on UAV System with the help of BTS (2G/3G/4G/5G) to enrich the COVID-19 preventive measures, as well as I have also developed a few algorithms for distance sensor (on UAV System) operations which sensing, tagging and disseminating the current distance, position and waiting time of resident’s information, and forwarding schemes to respective infrastructures and suspected residents including the security forces.
COVID-19是一种持续的大流行,具有2019年冠状病毒病的危险性。它是由严重急性呼吸综合征冠状病毒2 (SARS-CoV-2)传播引起的。COVID-19最常在人们身体接近时传播。而且,当感染者呼吸、咳嗽、打喷嚏、唱歌或说话时,它很容易通过空气传播,主要通过小飞沫或气溶胶传播。建议的预防措施包括洗手、打喷嚏或咳嗽时捂住嘴、保持身体距离、在公共场合戴口罩、通风和空气过滤、表面消毒,以及对接触者或有症状者进行监测和自我隔离。因此,本文提出了利用BTS (2G/3G/4G/5G)技术部署在无人机系统上的距离传感器物理距离检测系统架构,以丰富新型冠状病毒肺炎的预防措施,并开发了一些用于无人机系统上的距离传感器操作的算法,对当前居民信息的距离、位置和等待时间进行感知、标记和传播。并将计划转发给各自的基础设施和可疑居民,包括安全部队。
{"title":"Physical Distancing Detection System with Distance Sensor for Covid-19 Prevention","authors":"Estifanos Tilahun Mihret","doi":"10.13005/ojcst16.01.05","DOIUrl":"https://doi.org/10.13005/ojcst16.01.05","url":null,"abstract":"COVID-19 is an ongoing pandemic and dangerous of coronavirus disease 2019. It caused by the transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). COVID-19 spreads most often when people are physically close. And, it spreads very easily and sustainably through the air, primarily via small droplets or aerosols, as an infected person breaths, coughs, sneezes, sings or speaks. The recommended preventive measures include hand washing, covering one’s mouth when sneezing or coughing, physical distancing, wearing a face mask in public, ventilation and air-filtering, disinfecting surfaces, and monitoring and self-isolation for people exposed or symptomatic. Hence, this paper proposed the architecture of physical distancing detection system with distance sensor which deployed on UAV System with the help of BTS (2G/3G/4G/5G) to enrich the COVID-19 preventive measures, as well as I have also developed a few algorithms for distance sensor (on UAV System) operations which sensing, tagging and disseminating the current distance, position and waiting time of resident’s information, and forwarding schemes to respective infrastructures and suspected residents including the security forces.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"6 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126004493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reinforcement Learning Paradigm for Cybersecurity Education and Training 网络安全教育与培训的强化学习范式
Pub Date : 2023-05-30 DOI: 10.13005/ojcst16.01.02
Professor Gabriel Kabanda, Colletor Tendeukai Chipfumbu, Tinashe Chingoriwo
Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the environment to accomplish certain long-term objectives connected to the environmental condition. RL takes place when action sequences, observations, and rewards are used as inputs, and is hypothesis-based and goal-oriented. The key asynchronous RL algorithms are Asynchronous one-step Q learning, Asynchronous one-step SARSA, Asynchronous n-step Q-learning and Asynchronous Advantage Actor-Critic (A3C). The paper ascertains the Reinforcement Learning (RL) paradigm for cybersecurity education and training. The research was conducted using a largely positivism research philosophy, which focuses on quantitative approaches of determining the RL paradigm for cybersecurity education and training. The research design was an experiment that focused on implementing the RL Q-Learning and A3C algorithms using Python. The Asynchronous Advantage Actor-Critic (A3C) Algorithm is much faster, simpler, and scores higher on Deep Reinforcement Learning task. The research was descriptive, exploratory and explanatory in nature. A survey was conducted on the cybersecurity education and training as exemplified by Zimbabwean commercial banks. The study population encompassed employees and customers from five commercial banks in Zimbabwe, where the sample size was 370. Deep reinforcement learning (DRL) has been used to address a variety of issues in the Internet of Things. DRL heavily utilizes A3C algorithm with some Q-Learning, and this can be used to fight against intrusions into host computers or networks and fake data in IoT devices.
强化学习(RL)是一种机器学习,它涉及从与环境的相互作用中学习,以实现与环境条件相关的某些长期目标。强化学习发生在行动序列、观察和奖励被用作输入时,它是基于假设和目标导向的。异步强化学习算法主要有异步一步Q学习算法、异步一步SARSA算法、异步n步Q学习算法和异步优势Actor-Critic算法(A3C)。本文确定了网络安全教育与培训的强化学习(RL)范式。该研究主要采用实证主义研究哲学,侧重于确定网络安全教育和培训的RL范式的定量方法。研究设计是一个实验,重点是使用Python实现RL Q-Learning和A3C算法。异步优势Actor-Critic (A3C)算法在深度强化学习任务上更快、更简单、得分更高。该研究具有描述性、探索性和解释性。以津巴布韦商业银行为例,对网络安全教育培训进行了调查。研究对象包括津巴布韦五家商业银行的员工和客户,样本量为370人。深度强化学习(DRL)已被用于解决物联网中的各种问题。DRL大量利用A3C算法和一些Q-Learning,这可以用来对抗入侵主机或网络以及物联网设备中的虚假数据。
{"title":"A Reinforcement Learning Paradigm for Cybersecurity Education and Training","authors":"Professor Gabriel Kabanda, Colletor Tendeukai Chipfumbu, Tinashe Chingoriwo","doi":"10.13005/ojcst16.01.02","DOIUrl":"https://doi.org/10.13005/ojcst16.01.02","url":null,"abstract":"Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the environment to accomplish certain long-term objectives connected to the environmental condition. RL takes place when action sequences, observations, and rewards are used as inputs, and is hypothesis-based and goal-oriented. The key asynchronous RL algorithms are Asynchronous one-step Q learning, Asynchronous one-step SARSA, Asynchronous n-step Q-learning and Asynchronous Advantage Actor-Critic (A3C). The paper ascertains the Reinforcement Learning (RL) paradigm for cybersecurity education and training. The research was conducted using a largely positivism research philosophy, which focuses on quantitative approaches of determining the RL paradigm for cybersecurity education and training. The research design was an experiment that focused on implementing the RL Q-Learning and A3C algorithms using Python. The Asynchronous Advantage Actor-Critic (A3C) Algorithm is much faster, simpler, and scores higher on Deep Reinforcement Learning task. The research was descriptive, exploratory and explanatory in nature. A survey was conducted on the cybersecurity education and training as exemplified by Zimbabwean commercial banks. The study population encompassed employees and customers from five commercial banks in Zimbabwe, where the sample size was 370. Deep reinforcement learning (DRL) has been used to address a variety of issues in the Internet of Things. DRL heavily utilizes A3C algorithm with some Q-Learning, and this can be used to fight against intrusions into host computers or networks and fake data in IoT devices.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114817983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arduino Uno Based Child Tracking System Using GPS and GSM 基于Arduino Uno的基于GPS和GSM的儿童跟踪系统
Pub Date : 2023-05-30 DOI: 10.13005/ojcst16.01.04
Gopal Bhardwaj, Monika Dixit, Ginni Kumari, Khushi Kumari, Shreya Srivastava
Wearable tracking gadget that school-age children can wear is the topic of this paper. It doesn't need any pricy technology to operate.. This technology is usable by persons of all educational levels. It has got two buttons one is alert button and another is panic button The major objective of this gadget is to ensure that the youngster may contact their parents in an emergency. The alert button allows the child to notify their parents of an emergency and provide their current location. For communication, the current technology includes Bluetooth, WI-FI, and RFID. It is hard to communicate across a great distance with these technologies because they only have a narrow range of coverage. Also they are not that accurate. This device solves the issue by utilizing GSM technology. Parents do not need to submit any special code to the device to determine the child's location's latitude and longitude. If a child is in any emergency situation and wants his/her parents to know their current exact location. If a child feels uneasy, there are two methods to let the parents know. The cell phone of the parents or guardian receives the alarm message via SMS by pressing alert button and if the child wants to communicate to parents immediately, a call can also be made via this device using the panic button and the child can talk to the parent in real time.
本文研究的是一种适合学龄儿童穿戴的可穿戴跟踪装置。它不需要任何昂贵的技术来运行…这项技术适用于各种教育水平的人。它有两个按钮,一个是警报按钮,另一个是紧急按钮,这个小工具的主要目的是确保孩子在紧急情况下可以联系父母。警报按钮允许孩子通知他们的父母的紧急情况,并提供他们的当前位置。在通信方面,目前的技术包括蓝牙、WI-FI和RFID。使用这些技术很难进行远距离通信,因为它们的覆盖范围很窄。而且它们也不那么准确。该设备利用GSM技术解决了这一问题。父母不需要向设备提交任何特殊代码来确定孩子所在的纬度和经度。如果孩子在任何紧急情况下,希望他/她的父母知道他们目前的确切位置。如果孩子感到不安,有两种方法可以让父母知道。家长或监护人的手机通过按下警报按钮收到短信报警信息,如果孩子想要立即与父母沟通,也可以使用紧急按钮通过该设备拨打电话,孩子可以实时与父母交谈。
{"title":"Arduino Uno Based Child Tracking System Using GPS and GSM","authors":"Gopal Bhardwaj, Monika Dixit, Ginni Kumari, Khushi Kumari, Shreya Srivastava","doi":"10.13005/ojcst16.01.04","DOIUrl":"https://doi.org/10.13005/ojcst16.01.04","url":null,"abstract":"Wearable tracking gadget that school-age children can wear is the topic of this paper. It doesn't need any pricy technology to operate.. This technology is usable by persons of all educational levels. It has got two buttons one is alert button and another is panic button The major objective of this gadget is to ensure that the youngster may contact their parents in an emergency. The alert button allows the child to notify their parents of an emergency and provide their current location. For communication, the current technology includes Bluetooth, WI-FI, and RFID. It is hard to communicate across a great distance with these technologies because they only have a narrow range of coverage. Also they are not that accurate. This device solves the issue by utilizing GSM technology. Parents do not need to submit any special code to the device to determine the child's location's latitude and longitude. If a child is in any emergency situation and wants his/her parents to know their current exact location. If a child feels uneasy, there are two methods to let the parents know. The cell phone of the parents or guardian receives the alarm message via SMS by pressing alert button and if the child wants to communicate to parents immediately, a call can also be made via this device using the panic button and the child can talk to the parent in real time.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130547743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparison Between Position-Based and Image-Based Multi-Layer Graphical user Authentication System 基于位置和基于图像的多层图形用户认证系统的比较
Pub Date : 2023-05-30 DOI: 10.13005/ojcst16.01.03
Audu Lovingkindness Edward, H. Suru, Mustapha Abubakar Giro­
System security is very important, especially in the age that we live in. One of the ways to secure data is by creating a password that makes it difficult for unauthorized user to gain access to the system. However, what makes it difficult for the system to be attacked is directly dependent on approach used to create it, and how secured it is. Text based approach is the oldest authentication approach. It requires that the user supplies textual password in order to gain access to the system. However, this approach has shown a significant drawback and several vulnerabilities, one of which is the difficulty in recalling or remembering textual passwords. Several other attacks that textual passwords are vulnerable to include brute force attacks, shoulder spying, dictionary attacks etc. The introduction of graphical schemes made things a lot better. Graphical passwords make use of images. However, most graphical schemes are vulnerable to shoulder surfing attacks. In this research work, we developed two systems; A position-based multi-layer graphical user authentication system and an Image-based multi-layer graphical user authentication system. The reason behind this research work is to compare the two systems, and evaluate them based on three major performance metrics: (1) Security, (2) Reliability (3) Individual preference.
系统安全是非常重要的,尤其是在我们生活的这个时代。保护数据安全的方法之一是创建密码,使未经授权的用户难以访问系统。然而,系统难以被攻击的原因直接取决于创建系统的方法,以及系统的安全程度。基于文本的身份验证方法是最古老的身份验证方法。它要求用户提供文本密码才能访问系统。然而,这种方法有一个明显的缺点和几个漏洞,其中之一是难以回忆或记住文本密码。文本密码容易受到的其他几种攻击包括暴力破解攻击、肩部间谍攻击、字典攻击等。图形方案的引入让事情变得更好。图形密码使用图像。然而,大多数图形方案容易受到肩部冲浪攻击。在本研究工作中,我们开发了两个系统;基于位置的多层图形用户认证系统和基于图像的多层图形用户认证系统。这项研究工作背后的原因是比较两个系统,并基于三个主要性能指标来评估它们:(1)安全性,(2)可靠性,(3)个人偏好。
{"title":"A Comparison Between Position-Based and Image-Based Multi-Layer Graphical user Authentication System","authors":"Audu Lovingkindness Edward, H. Suru, Mustapha Abubakar Giro­","doi":"10.13005/ojcst16.01.03","DOIUrl":"https://doi.org/10.13005/ojcst16.01.03","url":null,"abstract":"System security is very important, especially in the age that we live in. One of the ways to secure data is by creating a password that makes it difficult for unauthorized user to gain access to the system. However, what makes it difficult for the system to be attacked is directly dependent on approach used to create it, and how secured it is. Text based approach is the oldest authentication approach. It requires that the user supplies textual password in order to gain access to the system. However, this approach has shown a significant drawback and several vulnerabilities, one of which is the difficulty in recalling or remembering textual passwords. Several other attacks that textual passwords are vulnerable to include brute force attacks, shoulder spying, dictionary attacks etc. The introduction of graphical schemes made things a lot better. Graphical passwords make use of images. However, most graphical schemes are vulnerable to shoulder surfing attacks. In this research work, we developed two systems; A position-based multi-layer graphical user authentication system and an Image-based multi-layer graphical user authentication system. The reason behind this research work is to compare the two systems, and evaluate them based on three major performance metrics: (1) Security, (2) Reliability (3) Individual preference.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126695109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Factors that Affect Service Quality Management on Arabic Public Sector 影响阿拉伯国家公共部门服务质量管理的因素评价
Pub Date : 2022-12-31 DOI: 10.13005/ojcst15.010203.02
Y. Alsultanny
Quality of queuing service management is the aim of any organization providing its services to customers. The purpose of this paper is to evaluate the factors affecting the quality of service provided by the public sector depending on waiting lines. For this purpose, a questionnaire survey was conducted on a sample of 394 to collect data relating to customer satisfaction. The questionnaire consists of five factors: process, tangible, responsiveness, reliability, and empathy. The results showed that the degree of agreement of the factors; process, tangible, reliability, responsiveness, empathy, and service quality gain a neutral category, and all the factors have statistically significant effects on quality of service except the empathy factor. For the demographic information, the results showed that there are statistically significant differences for most of the demographic information. This paper extends the previous research that investigates factors affecting e-recruitment. The author extends the results of previous research related to the transparency of e-recruitment. The study recommended the service departments should make more effort in the way of providing services to improve the level of service quality management.
排队服务的质量管理是任何组织向顾客提供服务的目的。本文的目的是评估影响公共部门提供的服务质量的因素取决于等待线。为此,对394个样本进行了问卷调查,以收集与客户满意度有关的数据。问卷由五个因素组成:过程性、有形性、响应性、可靠性和同理心。结果表明:各因素的一致程度;过程性、有形性、可靠性、响应性、共情性和服务质量获得中性范畴,除共情因素外,其他因素对服务质量均有统计学显著影响。对于人口统计信息,结果显示大多数人口统计信息存在统计学显著差异。本文扩展了前人对网络招聘影响因素的研究。本文对前人关于电子招聘透明度的研究成果进行了拓展。研究建议,服务部门应在提供服务的方式上作出更多努力,以提高服务质量管理水平。
{"title":"Evaluating the Factors that Affect Service Quality Management on Arabic Public Sector","authors":"Y. Alsultanny","doi":"10.13005/ojcst15.010203.02","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.02","url":null,"abstract":"Quality of queuing service management is the aim of any organization providing its services to customers. The purpose of this paper is to evaluate the factors affecting the quality of service provided by the public sector depending on waiting lines. For this purpose, a questionnaire survey was conducted on a sample of 394 to collect data relating to customer satisfaction. The questionnaire consists of five factors: process, tangible, responsiveness, reliability, and empathy. The results showed that the degree of agreement of the factors; process, tangible, reliability, responsiveness, empathy, and service quality gain a neutral category, and all the factors have statistically significant effects on quality of service except the empathy factor. For the demographic information, the results showed that there are statistically significant differences for most of the demographic information. This paper extends the previous research that investigates factors affecting e-recruitment. The author extends the results of previous research related to the transparency of e-recruitment. The study recommended the service departments should make more effort in the way of providing services to improve the level of service quality management.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115254369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment of ROBOT for HVAC Duct and Disaster 机器人在暖通管道和灾害中的部署
Pub Date : 2022-12-31 DOI: 10.13005/ojcst15.010203.01
P. Bhambri, Manpreet Singh, Inderjit Singh Dhanoa, Mrityunjay Kumar
The SBM Robot is a manually operated robot focused on the Internet of Things and the robot operating system. The system is focused on washing and maintenance. The robot is controlled by an android app that uses the Google Real Time Firebase database to control the robot. HVAC duct is small in size and cleaning and repairing the duct is a very difficult task for humans, but it's easy to robot, robot goes inside the duct, and inspects and cleans the duct. Like similar, ships use fuel, oils, sludge, sewage, water and other fluids stored in tanks.
SBM机器人是专注于物联网和机器人操作系统的人工操作机器人。该系统的重点是清洗和维护。机器人由一个安卓应用程序控制,该应用程序使用谷歌实时Firebase数据库来控制机器人。暖通风管体积小,清洁和修复风管对人类来说是一项非常困难的任务,但机器人很容易,机器人进入风管内部,对风管进行检查和清洁。类似地,船舶使用燃料、油、污泥、污水、水和其他储存在罐中的液体。
{"title":"Deployment of ROBOT for HVAC Duct and Disaster","authors":"P. Bhambri, Manpreet Singh, Inderjit Singh Dhanoa, Mrityunjay Kumar","doi":"10.13005/ojcst15.010203.01","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.01","url":null,"abstract":"The SBM Robot is a manually operated robot focused on the Internet of Things and the robot operating system. The system is focused on washing and maintenance. The robot is controlled by an android app that uses the Google Real Time Firebase database to control the robot. HVAC duct is small in size and cleaning and repairing the duct is a very difficult task for humans, but it's easy to robot, robot goes inside the duct, and inspects and cleans the duct. Like similar, ships use fuel, oils, sludge, sewage, water and other fluids stored in tanks.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126342082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey of IoT- Based Cloud Computing Cyber Security 基于物联网的云计算网络安全综合研究
Pub Date : 2022-12-31 DOI: 10.13005/ojcst15.010203.04
S. Yadav, Keshao D. Kalaskar, Pankaj Dhumane
The flexible architecture offered by cloud computing allows for the dispersion of resources and data over numerous places, making it possible to access them from a variety of industrial settings. The use, storage, and sharing of resources such as data, services, and industrial applications have all changed as a result of cloud computing. In the past ten years, companies have quickly shifted to cloud computing in order to benefit from increased performance, lower costs, and more extensive access. Additionally, the internet of things (IoT) has significantly improved when cloud computing was incorporated. However, this quick shift to the cloud brought up a number of security concerns and challenges. Traditional security measures don't immediately apply to cloud-based systems and are occasionally inadequate. Despite the widespread use and proliferation of various cyber weapons, cloud platform issues and security concerns have been addressed over the last three years. Deep learning's (DL) quick development in the field of artificial intelligence (AI) has produced a number of advantages that can be used to cloud-based industrial security concerns. The following are some of the research's findings: We provide a detailed evaluation of the structure, services, configurations, and security fashions that enable cloud-primarily based IoT. We additionally classify cloud protection dangers in IoT into four foremost areas (records, network and carrier, programs, and gadgets). We discuss the technological issues raised in the literature before identifying key research gaps. In each class, describe the boundaries using a popular, artificial intelligence, and in-depth studying attitude. and security concerns relating to individuals), which are fully covered; we find and analyze the most recent cloud-primarily based IoT attack innovations; we identify, talk, and verify key safety challenges show the regulations from a standard, synthetic intelligence, and deep learning perspective in every class angle; we first present the technological difficulties identified in the literature before identifying IoT-based cloud infrastructure has significant research gaps which should be highlighted for future research orientations. Cloud computing and cyber security.
云计算提供的灵活架构允许将资源和数据分散到许多地方,从而可以从各种工业环境中访问它们。由于云计算,数据、服务和工业应用程序等资源的使用、存储和共享都发生了变化。在过去的十年中,为了从更高的性能、更低的成本和更广泛的访问中获益,公司已经迅速转向云计算。此外,当云计算被纳入时,物联网(IoT)得到了显着改善。然而,这种向云的快速转移带来了许多安全问题和挑战。传统的安全措施不能立即适用于基于云计算的系统,有时还不够。尽管各种网络武器的广泛使用和扩散,云平台问题和安全问题在过去三年中得到了解决。深度学习(DL)在人工智能(AI)领域的快速发展产生了许多优势,可用于基于云的工业安全问题。以下是一些研究结果:我们对基于云的物联网的结构、服务、配置和安全模式进行了详细的评估。我们还将物联网中的云保护风险分为四个主要领域(记录、网络和运营商、程序和设备)。在确定关键的研究差距之前,我们讨论了文献中提出的技术问题。在每节课上,用流行的、人工智能的、深入的学习态度来描述边界。以及与个人有关的安全问题),这些都得到了充分的保障;我们发现并分析了最新的基于云的物联网攻击创新;我们从标准、人工智能和深度学习的角度,从每个班级的角度,识别、讨论和验证关键的安全挑战;在确定基于物联网的云基础设施具有重大的研究差距之前,我们首先提出了文献中确定的技术困难,这些研究差距应该在未来的研究方向上得到强调。云计算与网络安全。
{"title":"A Comprehensive Survey of IoT- Based Cloud Computing Cyber Security","authors":"S. Yadav, Keshao D. Kalaskar, Pankaj Dhumane","doi":"10.13005/ojcst15.010203.04","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.04","url":null,"abstract":"The flexible architecture offered by cloud computing allows for the dispersion of resources and data over numerous places, making it possible to access them from a variety of industrial settings. The use, storage, and sharing of resources such as data, services, and industrial applications have all changed as a result of cloud computing. In the past ten years, companies have quickly shifted to cloud computing in order to benefit from increased performance, lower costs, and more extensive access. Additionally, the internet of things (IoT) has significantly improved when cloud computing was incorporated. However, this quick shift to the cloud brought up a number of security concerns and challenges. Traditional security measures don't immediately apply to cloud-based systems and are occasionally inadequate. Despite the widespread use and proliferation of various cyber weapons, cloud platform issues and security concerns have been addressed over the last three years. Deep learning's (DL) quick development in the field of artificial intelligence (AI) has produced a number of advantages that can be used to cloud-based industrial security concerns. The following are some of the research's findings: We provide a detailed evaluation of the structure, services, configurations, and security fashions that enable cloud-primarily based IoT. We additionally classify cloud protection dangers in IoT into four foremost areas (records, network and carrier, programs, and gadgets). We discuss the technological issues raised in the literature before identifying key research gaps. In each class, describe the boundaries using a popular, artificial intelligence, and in-depth studying attitude. and security concerns relating to individuals), which are fully covered; we find and analyze the most recent cloud-primarily based IoT attack innovations; we identify, talk, and verify key safety challenges show the regulations from a standard, synthetic intelligence, and deep learning perspective in every class angle; we first present the technological difficulties identified in the literature before identifying IoT-based cloud infrastructure has significant research gaps which should be highlighted for future research orientations. Cloud computing and cyber security.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OpenCL Altera SDK v.14.0 vs. v. 13.1 Benchmarks Study OpenCL Altera SDK v.14.0与v. 13.1的基准研究
Pub Date : 2022-12-31 DOI: 10.13005/ojcst15.010203.03
Abedalmuhdi Almomany, Amin Jarrah
Altera SDK for OpenCL allows programmers to write a simple code in OpenCL and abstracts all Field programmable gate array (FPGA) design complexity. The kernels are synthesized to equivalent circuits using the FPGA hardware recourses: Adaptive logic modules (ALMs), DSPs and Memory blocks. In this study, we developed a set of fifteen different benchmarks, each of which has its own characteristics. Benchmarks include with/without loop unrolling, have/have not atomic operations, have one/multiple kernels per single file, and in addition to one/more of these characteristics are combined. Altera OpenCL v14.0 adds more features compared with previous versions. A set of parameters chosen to compare the two OpenCL SDK versions: Logic utilization (in ALMs), total registers, RAM Blocks, total block memory bits, and clock frequency.
Altera OpenCL SDK允许程序员在OpenCL中编写简单的代码,并抽象出所有现场可编程门阵列(FPGA)设计的复杂性。利用FPGA硬件资源:自适应逻辑模块(alm)、dsp和内存块,将内核合成为等效电路。在这项研究中,我们开发了一组15个不同的基准,每个基准都有自己的特点。基准测试包括有/没有循环展开,有/没有原子操作,每个文件有一个/多个内核,此外还有一个/多个这些特征的组合。Altera OpenCL v14.0与以前的版本相比增加了更多的特性。用来比较两个OpenCL SDK版本的一组参数:逻辑利用率(在alm中)、总寄存器、RAM块、总块内存位和时钟频率。
{"title":"OpenCL Altera SDK v.14.0 vs. v. 13.1 Benchmarks Study","authors":"Abedalmuhdi Almomany, Amin Jarrah","doi":"10.13005/ojcst15.010203.03","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.03","url":null,"abstract":"Altera SDK for OpenCL allows programmers to write a simple code in OpenCL and abstracts all Field programmable gate array (FPGA) design complexity. The kernels are synthesized to equivalent circuits using the FPGA hardware recourses: Adaptive logic modules (ALMs), DSPs and Memory blocks. In this study, we developed a set of fifteen different benchmarks, each of which has its own characteristics. Benchmarks include with/without loop unrolling, have/have not atomic operations, have one/multiple kernels per single file, and in addition to one/more of these characteristics are combined. Altera OpenCL v14.0 adds more features compared with previous versions. A set of parameters chosen to compare the two OpenCL SDK versions: Logic utilization (in ALMs), total registers, RAM Blocks, total block memory bits, and clock frequency.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134348513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Hotel Booking and Cancellation Web-Based Application: A Prototype 基于web的自动酒店预订和取消应用程序:原型
Pub Date : 2022-12-31 DOI: 10.13005/ojcst15.010203.05
Michael G. Albino, Cyrel B. Alvarez, Shermaine B. Murillo, Aubrey Jaye S. Tuzon, Kris Danica P. Paña
The purpose of this study is to provide new insights into the factors that influence cancellation behaviour with respect to hotel bookings. Cancellations of bookings are one of the most common concerns in the hotel sector. Before the specified arrival date, the client would cancel their reservation. The cancellation has had a major impact on hotel operations as well. The researchers developed a prototype system called Automated Hotel Booking Cancellation that can assist a hotel in better anticipating consumer cancellations and booking transactions. The researchers utilized a survey questionnaire following the ISO 25010 Software Quality Standard to assess the system's usefulness, functionality, accuracy, security, reliability, and maintainability. The results show "strongly agree" in all the domains with an overall mean = 3.46. IT Experts and respondents evaluated the proposed prototype and gained a "Strongly Agree" rating in all the domains under the survey. The domain on the usefulness of the system gained the highest mean = 3.89 with an interpretation of "strongly agree," and the lowest was the domain of security with a mean = 3.15 or "strongly agree," which ranked 6 in summary.The researchers concluded based on the findings that the developed prototype web-based system was useful and functional to the needs of the target users/beneficiaries. The user interface of the web-based system was user-friendly, representing an object-oriented user interface for the users. An improvement recommended on the cancellation to automatically predict cancellations that can be incorporated into the system using Machine Learning Algorithms to ease the process of cancellation were recommended for future researchers who want to pursue advanced studies about the topic.
本研究的目的是为影响酒店预订取消行为的因素提供新的见解。取消预订是酒店行业最常见的问题之一。在指定的到达日期之前,客户将取消他们的预订。这一取消也对酒店的运营产生了重大影响。研究人员开发了一个名为“酒店预订自动取消”的原型系统,它可以帮助酒店更好地预测消费者取消预订和预订交易。研究人员根据ISO 25010软件质量标准使用调查问卷来评估系统的有用性、功能、准确性、安全性、可靠性和可维护性。结果显示,在所有领域“非常同意”,总体平均值= 3.46。IT专家和受访者对提议的原型进行了评估,并在调查的所有领域中获得了“非常同意”的评级。在系统的有用性领域获得了最高的平均值= 3.89,解释为“非常同意”,最低的是安全领域,平均值= 3.15或“非常同意”,在总结中排名第6。研究人员根据研究结果得出结论,开发的基于网络的原型系统对目标用户/受益者的需求是有用的和功能性的。基于web的系统的用户界面是用户友好的,代表了面向对象的用户界面。建议对取消进行改进,以自动预测取消,可以使用机器学习算法将其纳入系统,以简化取消过程,供未来想要对该主题进行高级研究的研究人员使用。
{"title":"Automated Hotel Booking and Cancellation Web-Based Application: A Prototype","authors":"Michael G. Albino, Cyrel B. Alvarez, Shermaine B. Murillo, Aubrey Jaye S. Tuzon, Kris Danica P. Paña","doi":"10.13005/ojcst15.010203.05","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.05","url":null,"abstract":"The purpose of this study is to provide new insights into the factors that influence cancellation behaviour with respect to hotel bookings. Cancellations of bookings are one of the most common concerns in the hotel sector. Before the specified arrival date, the client would cancel their reservation. The cancellation has had a major impact on hotel operations as well. The researchers developed a prototype system called Automated Hotel Booking Cancellation that can assist a hotel in better anticipating consumer cancellations and booking transactions. The researchers utilized a survey questionnaire following the ISO 25010 Software Quality Standard to assess the system's usefulness, functionality, accuracy, security, reliability, and maintainability. The results show \"strongly agree\" in all the domains with an overall mean = 3.46. IT Experts and respondents evaluated the proposed prototype and gained a \"Strongly Agree\" rating in all the domains under the survey. The domain on the usefulness of the system gained the highest mean = 3.89 with an interpretation of \"strongly agree,\" and the lowest was the domain of security with a mean = 3.15 or \"strongly agree,\" which ranked 6 in summary.\u0000\u0000The researchers concluded based on the findings that the developed prototype web-based system was useful and functional to the needs of the target users/beneficiaries. The user interface of the web-based system was user-friendly, representing an object-oriented user interface for the users. An improvement recommended on the cancellation to automatically predict cancellations that can be incorporated into the system using Machine Learning Algorithms to ease the process of cancellation were recommended for future researchers who want to pursue advanced studies about the topic.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Oriental journal of computer science and technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1