Oriental journal of computer science and technology最新文献

筛选
英文 中文
Logical Foundations for Reasoning in Cyber - Physical Systems 网络物理系统推理的逻辑基础
Oriental journal of computer science and technology Pub Date : 2023-05-30 DOI: 10.13005/ojcst16.01.01
T. Gopal
{"title":"Logical Foundations for Reasoning in Cyber - Physical Systems","authors":"T. Gopal","doi":"10.13005/ojcst16.01.01","DOIUrl":"https://doi.org/10.13005/ojcst16.01.01","url":null,"abstract":"This paper aims at building the causal relations and event structures13 to study the complex and evolving cyber – physical systems with illustrations of the reasoning based on Robotics24 and Policy Analysis25 for Communication Systems. An empirical analysis points to the realism that network security is also a geometric theory with safety and authentication tending to geometric formulae that make the larger structures. Security is very much a matter of perception too. The proposed approach also factors the perceptual aspects of the human mind. This paper includes several interesting possibilities for using linear algebra, discrete mathematics, analysis, and topology in the domains such as economics, game theory, robotics and biology to mention a few.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114121318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Distancing Detection System with Distance Sensor for Covid-19 Prevention 新型冠状病毒预防用距离传感器物理距离检测系统
Oriental journal of computer science and technology Pub Date : 2023-05-30 DOI: 10.13005/ojcst16.01.05
Estifanos Tilahun Mihret
{"title":"Physical Distancing Detection System with Distance Sensor for Covid-19 Prevention","authors":"Estifanos Tilahun Mihret","doi":"10.13005/ojcst16.01.05","DOIUrl":"https://doi.org/10.13005/ojcst16.01.05","url":null,"abstract":"COVID-19 is an ongoing pandemic and dangerous of coronavirus disease 2019. It caused by the transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). COVID-19 spreads most often when people are physically close. And, it spreads very easily and sustainably through the air, primarily via small droplets or aerosols, as an infected person breaths, coughs, sneezes, sings or speaks. The recommended preventive measures include hand washing, covering one’s mouth when sneezing or coughing, physical distancing, wearing a face mask in public, ventilation and air-filtering, disinfecting surfaces, and monitoring and self-isolation for people exposed or symptomatic. Hence, this paper proposed the architecture of physical distancing detection system with distance sensor which deployed on UAV System with the help of BTS (2G/3G/4G/5G) to enrich the COVID-19 preventive measures, as well as I have also developed a few algorithms for distance sensor (on UAV System) operations which sensing, tagging and disseminating the current distance, position and waiting time of resident’s information, and forwarding schemes to respective infrastructures and suspected residents including the security forces.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"6 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126004493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reinforcement Learning Paradigm for Cybersecurity Education and Training 网络安全教育与培训的强化学习范式
Oriental journal of computer science and technology Pub Date : 2023-05-30 DOI: 10.13005/ojcst16.01.02
Professor Gabriel Kabanda, Colletor Tendeukai Chipfumbu, Tinashe Chingoriwo
{"title":"A Reinforcement Learning Paradigm for Cybersecurity Education and Training","authors":"Professor Gabriel Kabanda, Colletor Tendeukai Chipfumbu, Tinashe Chingoriwo","doi":"10.13005/ojcst16.01.02","DOIUrl":"https://doi.org/10.13005/ojcst16.01.02","url":null,"abstract":"Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the environment to accomplish certain long-term objectives connected to the environmental condition. RL takes place when action sequences, observations, and rewards are used as inputs, and is hypothesis-based and goal-oriented. The key asynchronous RL algorithms are Asynchronous one-step Q learning, Asynchronous one-step SARSA, Asynchronous n-step Q-learning and Asynchronous Advantage Actor-Critic (A3C). The paper ascertains the Reinforcement Learning (RL) paradigm for cybersecurity education and training. The research was conducted using a largely positivism research philosophy, which focuses on quantitative approaches of determining the RL paradigm for cybersecurity education and training. The research design was an experiment that focused on implementing the RL Q-Learning and A3C algorithms using Python. The Asynchronous Advantage Actor-Critic (A3C) Algorithm is much faster, simpler, and scores higher on Deep Reinforcement Learning task. The research was descriptive, exploratory and explanatory in nature. A survey was conducted on the cybersecurity education and training as exemplified by Zimbabwean commercial banks. The study population encompassed employees and customers from five commercial banks in Zimbabwe, where the sample size was 370. Deep reinforcement learning (DRL) has been used to address a variety of issues in the Internet of Things. DRL heavily utilizes A3C algorithm with some Q-Learning, and this can be used to fight against intrusions into host computers or networks and fake data in IoT devices.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114817983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arduino Uno Based Child Tracking System Using GPS and GSM 基于Arduino Uno的基于GPS和GSM的儿童跟踪系统
Oriental journal of computer science and technology Pub Date : 2023-05-30 DOI: 10.13005/ojcst16.01.04
Gopal Bhardwaj, Monika Dixit, Ginni Kumari, Khushi Kumari, Shreya Srivastava
{"title":"Arduino Uno Based Child Tracking System Using GPS and GSM","authors":"Gopal Bhardwaj, Monika Dixit, Ginni Kumari, Khushi Kumari, Shreya Srivastava","doi":"10.13005/ojcst16.01.04","DOIUrl":"https://doi.org/10.13005/ojcst16.01.04","url":null,"abstract":"Wearable tracking gadget that school-age children can wear is the topic of this paper. It doesn't need any pricy technology to operate.. This technology is usable by persons of all educational levels. It has got two buttons one is alert button and another is panic button The major objective of this gadget is to ensure that the youngster may contact their parents in an emergency. The alert button allows the child to notify their parents of an emergency and provide their current location. For communication, the current technology includes Bluetooth, WI-FI, and RFID. It is hard to communicate across a great distance with these technologies because they only have a narrow range of coverage. Also they are not that accurate. This device solves the issue by utilizing GSM technology. Parents do not need to submit any special code to the device to determine the child's location's latitude and longitude. If a child is in any emergency situation and wants his/her parents to know their current exact location. If a child feels uneasy, there are two methods to let the parents know. The cell phone of the parents or guardian receives the alarm message via SMS by pressing alert button and if the child wants to communicate to parents immediately, a call can also be made via this device using the panic button and the child can talk to the parent in real time.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130547743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparison Between Position-Based and Image-Based Multi-Layer Graphical user Authentication System 基于位置和基于图像的多层图形用户认证系统的比较
Oriental journal of computer science and technology Pub Date : 2023-05-30 DOI: 10.13005/ojcst16.01.03
Audu Lovingkindness Edward, H. Suru, Mustapha Abubakar Giro­
{"title":"A Comparison Between Position-Based and Image-Based Multi-Layer Graphical user Authentication System","authors":"Audu Lovingkindness Edward, H. Suru, Mustapha Abubakar Giro­","doi":"10.13005/ojcst16.01.03","DOIUrl":"https://doi.org/10.13005/ojcst16.01.03","url":null,"abstract":"System security is very important, especially in the age that we live in. One of the ways to secure data is by creating a password that makes it difficult for unauthorized user to gain access to the system. However, what makes it difficult for the system to be attacked is directly dependent on approach used to create it, and how secured it is. Text based approach is the oldest authentication approach. It requires that the user supplies textual password in order to gain access to the system. However, this approach has shown a significant drawback and several vulnerabilities, one of which is the difficulty in recalling or remembering textual passwords. Several other attacks that textual passwords are vulnerable to include brute force attacks, shoulder spying, dictionary attacks etc. The introduction of graphical schemes made things a lot better. Graphical passwords make use of images. However, most graphical schemes are vulnerable to shoulder surfing attacks. In this research work, we developed two systems; A position-based multi-layer graphical user authentication system and an Image-based multi-layer graphical user authentication system. The reason behind this research work is to compare the two systems, and evaluate them based on three major performance metrics: (1) Security, (2) Reliability (3) Individual preference.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126695109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Factors that Affect Service Quality Management on Arabic Public Sector 影响阿拉伯国家公共部门服务质量管理的因素评价
Oriental journal of computer science and technology Pub Date : 2022-12-31 DOI: 10.13005/ojcst15.010203.02
Y. Alsultanny
{"title":"Evaluating the Factors that Affect Service Quality Management on Arabic Public Sector","authors":"Y. Alsultanny","doi":"10.13005/ojcst15.010203.02","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.02","url":null,"abstract":"Quality of queuing service management is the aim of any organization providing its services to customers. The purpose of this paper is to evaluate the factors affecting the quality of service provided by the public sector depending on waiting lines. For this purpose, a questionnaire survey was conducted on a sample of 394 to collect data relating to customer satisfaction. The questionnaire consists of five factors: process, tangible, responsiveness, reliability, and empathy. The results showed that the degree of agreement of the factors; process, tangible, reliability, responsiveness, empathy, and service quality gain a neutral category, and all the factors have statistically significant effects on quality of service except the empathy factor. For the demographic information, the results showed that there are statistically significant differences for most of the demographic information. This paper extends the previous research that investigates factors affecting e-recruitment. The author extends the results of previous research related to the transparency of e-recruitment. The study recommended the service departments should make more effort in the way of providing services to improve the level of service quality management.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115254369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment of ROBOT for HVAC Duct and Disaster 机器人在暖通管道和灾害中的部署
Oriental journal of computer science and technology Pub Date : 2022-12-31 DOI: 10.13005/ojcst15.010203.01
P. Bhambri, Manpreet Singh, Inderjit Singh Dhanoa, Mrityunjay Kumar
{"title":"Deployment of ROBOT for HVAC Duct and Disaster","authors":"P. Bhambri, Manpreet Singh, Inderjit Singh Dhanoa, Mrityunjay Kumar","doi":"10.13005/ojcst15.010203.01","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.01","url":null,"abstract":"The SBM Robot is a manually operated robot focused on the Internet of Things and the robot operating system. The system is focused on washing and maintenance. The robot is controlled by an android app that uses the Google Real Time Firebase database to control the robot. HVAC duct is small in size and cleaning and repairing the duct is a very difficult task for humans, but it's easy to robot, robot goes inside the duct, and inspects and cleans the duct. Like similar, ships use fuel, oils, sludge, sewage, water and other fluids stored in tanks.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126342082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey of IoT- Based Cloud Computing Cyber Security 基于物联网的云计算网络安全综合研究
Oriental journal of computer science and technology Pub Date : 2022-12-31 DOI: 10.13005/ojcst15.010203.04
S. Yadav, Keshao D. Kalaskar, Pankaj Dhumane
{"title":"A Comprehensive Survey of IoT- Based Cloud Computing Cyber Security","authors":"S. Yadav, Keshao D. Kalaskar, Pankaj Dhumane","doi":"10.13005/ojcst15.010203.04","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.04","url":null,"abstract":"The flexible architecture offered by cloud computing allows for the dispersion of resources and data over numerous places, making it possible to access them from a variety of industrial settings. The use, storage, and sharing of resources such as data, services, and industrial applications have all changed as a result of cloud computing. In the past ten years, companies have quickly shifted to cloud computing in order to benefit from increased performance, lower costs, and more extensive access. Additionally, the internet of things (IoT) has significantly improved when cloud computing was incorporated. However, this quick shift to the cloud brought up a number of security concerns and challenges. Traditional security measures don't immediately apply to cloud-based systems and are occasionally inadequate. Despite the widespread use and proliferation of various cyber weapons, cloud platform issues and security concerns have been addressed over the last three years. Deep learning's (DL) quick development in the field of artificial intelligence (AI) has produced a number of advantages that can be used to cloud-based industrial security concerns. The following are some of the research's findings: We provide a detailed evaluation of the structure, services, configurations, and security fashions that enable cloud-primarily based IoT. We additionally classify cloud protection dangers in IoT into four foremost areas (records, network and carrier, programs, and gadgets). We discuss the technological issues raised in the literature before identifying key research gaps. In each class, describe the boundaries using a popular, artificial intelligence, and in-depth studying attitude. and security concerns relating to individuals), which are fully covered; we find and analyze the most recent cloud-primarily based IoT attack innovations; we identify, talk, and verify key safety challenges show the regulations from a standard, synthetic intelligence, and deep learning perspective in every class angle; we first present the technological difficulties identified in the literature before identifying IoT-based cloud infrastructure has significant research gaps which should be highlighted for future research orientations. Cloud computing and cyber security.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OpenCL Altera SDK v.14.0 vs. v. 13.1 Benchmarks Study OpenCL Altera SDK v.14.0与v. 13.1的基准研究
Oriental journal of computer science and technology Pub Date : 2022-12-31 DOI: 10.13005/ojcst15.010203.03
Abedalmuhdi Almomany, Amin Jarrah
{"title":"OpenCL Altera SDK v.14.0 vs. v. 13.1 Benchmarks Study","authors":"Abedalmuhdi Almomany, Amin Jarrah","doi":"10.13005/ojcst15.010203.03","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.03","url":null,"abstract":"Altera SDK for OpenCL allows programmers to write a simple code in OpenCL and abstracts all Field programmable gate array (FPGA) design complexity. The kernels are synthesized to equivalent circuits using the FPGA hardware recourses: Adaptive logic modules (ALMs), DSPs and Memory blocks. In this study, we developed a set of fifteen different benchmarks, each of which has its own characteristics. Benchmarks include with/without loop unrolling, have/have not atomic operations, have one/multiple kernels per single file, and in addition to one/more of these characteristics are combined. Altera OpenCL v14.0 adds more features compared with previous versions. A set of parameters chosen to compare the two OpenCL SDK versions: Logic utilization (in ALMs), total registers, RAM Blocks, total block memory bits, and clock frequency.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134348513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Hotel Booking and Cancellation Web-Based Application: A Prototype 基于web的自动酒店预订和取消应用程序:原型
Oriental journal of computer science and technology Pub Date : 2022-12-31 DOI: 10.13005/ojcst15.010203.05
Michael G. Albino, Cyrel B. Alvarez, Shermaine B. Murillo, Aubrey Jaye S. Tuzon, Kris Danica P. Paña
{"title":"Automated Hotel Booking and Cancellation Web-Based Application: A Prototype","authors":"Michael G. Albino, Cyrel B. Alvarez, Shermaine B. Murillo, Aubrey Jaye S. Tuzon, Kris Danica P. Paña","doi":"10.13005/ojcst15.010203.05","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.05","url":null,"abstract":"The purpose of this study is to provide new insights into the factors that influence cancellation behaviour with respect to hotel bookings. Cancellations of bookings are one of the most common concerns in the hotel sector. Before the specified arrival date, the client would cancel their reservation. The cancellation has had a major impact on hotel operations as well. The researchers developed a prototype system called Automated Hotel Booking Cancellation that can assist a hotel in better anticipating consumer cancellations and booking transactions. The researchers utilized a survey questionnaire following the ISO 25010 Software Quality Standard to assess the system's usefulness, functionality, accuracy, security, reliability, and maintainability. The results show \"strongly agree\" in all the domains with an overall mean = 3.46. IT Experts and respondents evaluated the proposed prototype and gained a \"Strongly Agree\" rating in all the domains under the survey. The domain on the usefulness of the system gained the highest mean = 3.89 with an interpretation of \"strongly agree,\" and the lowest was the domain of security with a mean = 3.15 or \"strongly agree,\" which ranked 6 in summary.\u0000\u0000The researchers concluded based on the findings that the developed prototype web-based system was useful and functional to the needs of the target users/beneficiaries. The user interface of the web-based system was user-friendly, representing an object-oriented user interface for the users. An improvement recommended on the cancellation to automatically predict cancellations that can be incorporated into the system using Machine Learning Algorithms to ease the process of cancellation were recommended for future researchers who want to pursue advanced studies about the topic.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信