{"title":"Logical Foundations for Reasoning in Cyber - Physical Systems","authors":"T. Gopal","doi":"10.13005/ojcst16.01.01","DOIUrl":"https://doi.org/10.13005/ojcst16.01.01","url":null,"abstract":"This paper aims at building the causal relations and event structures13 to study the complex and evolving cyber – physical systems with illustrations of the reasoning based on Robotics24 and Policy Analysis25 for Communication Systems. An empirical analysis points to the realism that network security is also a geometric theory with safety and authentication tending to geometric formulae that make the larger structures. Security is very much a matter of perception too. The proposed approach also factors the perceptual aspects of the human mind. This paper includes several interesting possibilities for using linear algebra, discrete mathematics, analysis, and topology in the domains such as economics, game theory, robotics and biology to mention a few.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114121318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Distancing Detection System with Distance Sensor for Covid-19 Prevention","authors":"Estifanos Tilahun Mihret","doi":"10.13005/ojcst16.01.05","DOIUrl":"https://doi.org/10.13005/ojcst16.01.05","url":null,"abstract":"COVID-19 is an ongoing pandemic and dangerous of coronavirus disease 2019. It caused by the transmission of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). COVID-19 spreads most often when people are physically close. And, it spreads very easily and sustainably through the air, primarily via small droplets or aerosols, as an infected person breaths, coughs, sneezes, sings or speaks. The recommended preventive measures include hand washing, covering one’s mouth when sneezing or coughing, physical distancing, wearing a face mask in public, ventilation and air-filtering, disinfecting surfaces, and monitoring and self-isolation for people exposed or symptomatic. Hence, this paper proposed the architecture of physical distancing detection system with distance sensor which deployed on UAV System with the help of BTS (2G/3G/4G/5G) to enrich the COVID-19 preventive measures, as well as I have also developed a few algorithms for distance sensor (on UAV System) operations which sensing, tagging and disseminating the current distance, position and waiting time of resident’s information, and forwarding schemes to respective infrastructures and suspected residents including the security forces.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"6 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126004493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Professor Gabriel Kabanda, Colletor Tendeukai Chipfumbu, Tinashe Chingoriwo
{"title":"A Reinforcement Learning Paradigm for Cybersecurity Education and Training","authors":"Professor Gabriel Kabanda, Colletor Tendeukai Chipfumbu, Tinashe Chingoriwo","doi":"10.13005/ojcst16.01.02","DOIUrl":"https://doi.org/10.13005/ojcst16.01.02","url":null,"abstract":"Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the environment to accomplish certain long-term objectives connected to the environmental condition. RL takes place when action sequences, observations, and rewards are used as inputs, and is hypothesis-based and goal-oriented. The key asynchronous RL algorithms are Asynchronous one-step Q learning, Asynchronous one-step SARSA, Asynchronous n-step Q-learning and Asynchronous Advantage Actor-Critic (A3C). The paper ascertains the Reinforcement Learning (RL) paradigm for cybersecurity education and training. The research was conducted using a largely positivism research philosophy, which focuses on quantitative approaches of determining the RL paradigm for cybersecurity education and training. The research design was an experiment that focused on implementing the RL Q-Learning and A3C algorithms using Python. The Asynchronous Advantage Actor-Critic (A3C) Algorithm is much faster, simpler, and scores higher on Deep Reinforcement Learning task. The research was descriptive, exploratory and explanatory in nature. A survey was conducted on the cybersecurity education and training as exemplified by Zimbabwean commercial banks. The study population encompassed employees and customers from five commercial banks in Zimbabwe, where the sample size was 370. Deep reinforcement learning (DRL) has been used to address a variety of issues in the Internet of Things. DRL heavily utilizes A3C algorithm with some Q-Learning, and this can be used to fight against intrusions into host computers or networks and fake data in IoT devices.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114817983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arduino Uno Based Child Tracking System Using GPS and GSM","authors":"Gopal Bhardwaj, Monika Dixit, Ginni Kumari, Khushi Kumari, Shreya Srivastava","doi":"10.13005/ojcst16.01.04","DOIUrl":"https://doi.org/10.13005/ojcst16.01.04","url":null,"abstract":"Wearable tracking gadget that school-age children can wear is the topic of this paper. It doesn't need any pricy technology to operate.. This technology is usable by persons of all educational levels. It has got two buttons one is alert button and another is panic button The major objective of this gadget is to ensure that the youngster may contact their parents in an emergency. The alert button allows the child to notify their parents of an emergency and provide their current location. For communication, the current technology includes Bluetooth, WI-FI, and RFID. It is hard to communicate across a great distance with these technologies because they only have a narrow range of coverage. Also they are not that accurate. This device solves the issue by utilizing GSM technology. Parents do not need to submit any special code to the device to determine the child's location's latitude and longitude. If a child is in any emergency situation and wants his/her parents to know their current exact location. If a child feels uneasy, there are two methods to let the parents know. The cell phone of the parents or guardian receives the alarm message via SMS by pressing alert button and if the child wants to communicate to parents immediately, a call can also be made via this device using the panic button and the child can talk to the parent in real time.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130547743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Audu Lovingkindness Edward, H. Suru, Mustapha Abubakar Giro
{"title":"A Comparison Between Position-Based and Image-Based Multi-Layer Graphical user Authentication System","authors":"Audu Lovingkindness Edward, H. Suru, Mustapha Abubakar Giro","doi":"10.13005/ojcst16.01.03","DOIUrl":"https://doi.org/10.13005/ojcst16.01.03","url":null,"abstract":"System security is very important, especially in the age that we live in. One of the ways to secure data is by creating a password that makes it difficult for unauthorized user to gain access to the system. However, what makes it difficult for the system to be attacked is directly dependent on approach used to create it, and how secured it is. Text based approach is the oldest authentication approach. It requires that the user supplies textual password in order to gain access to the system. However, this approach has shown a significant drawback and several vulnerabilities, one of which is the difficulty in recalling or remembering textual passwords. Several other attacks that textual passwords are vulnerable to include brute force attacks, shoulder spying, dictionary attacks etc. The introduction of graphical schemes made things a lot better. Graphical passwords make use of images. However, most graphical schemes are vulnerable to shoulder surfing attacks. In this research work, we developed two systems; A position-based multi-layer graphical user authentication system and an Image-based multi-layer graphical user authentication system. The reason behind this research work is to compare the two systems, and evaluate them based on three major performance metrics: (1) Security, (2) Reliability (3) Individual preference.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126695109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Factors that Affect Service Quality Management on Arabic Public Sector","authors":"Y. Alsultanny","doi":"10.13005/ojcst15.010203.02","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.02","url":null,"abstract":"Quality of queuing service management is the aim of any organization providing its services to customers. The purpose of this paper is to evaluate the factors affecting the quality of service provided by the public sector depending on waiting lines. For this purpose, a questionnaire survey was conducted on a sample of 394 to collect data relating to customer satisfaction. The questionnaire consists of five factors: process, tangible, responsiveness, reliability, and empathy. The results showed that the degree of agreement of the factors; process, tangible, reliability, responsiveness, empathy, and service quality gain a neutral category, and all the factors have statistically significant effects on quality of service except the empathy factor. For the demographic information, the results showed that there are statistically significant differences for most of the demographic information. This paper extends the previous research that investigates factors affecting e-recruitment. The author extends the results of previous research related to the transparency of e-recruitment. The study recommended the service departments should make more effort in the way of providing services to improve the level of service quality management.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115254369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Bhambri, Manpreet Singh, Inderjit Singh Dhanoa, Mrityunjay Kumar
{"title":"Deployment of ROBOT for HVAC Duct and Disaster","authors":"P. Bhambri, Manpreet Singh, Inderjit Singh Dhanoa, Mrityunjay Kumar","doi":"10.13005/ojcst15.010203.01","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.01","url":null,"abstract":"The SBM Robot is a manually operated robot focused on the Internet of Things and the robot operating system. The system is focused on washing and maintenance. The robot is controlled by an android app that uses the Google Real Time Firebase database to control the robot. HVAC duct is small in size and cleaning and repairing the duct is a very difficult task for humans, but it's easy to robot, robot goes inside the duct, and inspects and cleans the duct. Like similar, ships use fuel, oils, sludge, sewage, water and other fluids stored in tanks.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126342082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Survey of IoT- Based Cloud Computing Cyber Security","authors":"S. Yadav, Keshao D. Kalaskar, Pankaj Dhumane","doi":"10.13005/ojcst15.010203.04","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.04","url":null,"abstract":"The flexible architecture offered by cloud computing allows for the dispersion of resources and data over numerous places, making it possible to access them from a variety of industrial settings. The use, storage, and sharing of resources such as data, services, and industrial applications have all changed as a result of cloud computing. In the past ten years, companies have quickly shifted to cloud computing in order to benefit from increased performance, lower costs, and more extensive access. Additionally, the internet of things (IoT) has significantly improved when cloud computing was incorporated. However, this quick shift to the cloud brought up a number of security concerns and challenges. Traditional security measures don't immediately apply to cloud-based systems and are occasionally inadequate. Despite the widespread use and proliferation of various cyber weapons, cloud platform issues and security concerns have been addressed over the last three years. Deep learning's (DL) quick development in the field of artificial intelligence (AI) has produced a number of advantages that can be used to cloud-based industrial security concerns. The following are some of the research's findings: We provide a detailed evaluation of the structure, services, configurations, and security fashions that enable cloud-primarily based IoT. We additionally classify cloud protection dangers in IoT into four foremost areas (records, network and carrier, programs, and gadgets). We discuss the technological issues raised in the literature before identifying key research gaps. In each class, describe the boundaries using a popular, artificial intelligence, and in-depth studying attitude. and security concerns relating to individuals), which are fully covered; we find and analyze the most recent cloud-primarily based IoT attack innovations; we identify, talk, and verify key safety challenges show the regulations from a standard, synthetic intelligence, and deep learning perspective in every class angle; we first present the technological difficulties identified in the literature before identifying IoT-based cloud infrastructure has significant research gaps which should be highlighted for future research orientations. Cloud computing and cyber security.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OpenCL Altera SDK v.14.0 vs. v. 13.1 Benchmarks Study","authors":"Abedalmuhdi Almomany, Amin Jarrah","doi":"10.13005/ojcst15.010203.03","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.03","url":null,"abstract":"Altera SDK for OpenCL allows programmers to write a simple code in OpenCL and abstracts all Field programmable gate array (FPGA) design complexity. The kernels are synthesized to equivalent circuits using the FPGA hardware recourses: Adaptive logic modules (ALMs), DSPs and Memory blocks. In this study, we developed a set of fifteen different benchmarks, each of which has its own characteristics. Benchmarks include with/without loop unrolling, have/have not atomic operations, have one/multiple kernels per single file, and in addition to one/more of these characteristics are combined. Altera OpenCL v14.0 adds more features compared with previous versions. A set of parameters chosen to compare the two OpenCL SDK versions: Logic utilization (in ALMs), total registers, RAM Blocks, total block memory bits, and clock frequency.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134348513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael G. Albino, Cyrel B. Alvarez, Shermaine B. Murillo, Aubrey Jaye S. Tuzon, Kris Danica P. Paña
{"title":"Automated Hotel Booking and Cancellation Web-Based Application: A Prototype","authors":"Michael G. Albino, Cyrel B. Alvarez, Shermaine B. Murillo, Aubrey Jaye S. Tuzon, Kris Danica P. Paña","doi":"10.13005/ojcst15.010203.05","DOIUrl":"https://doi.org/10.13005/ojcst15.010203.05","url":null,"abstract":"The purpose of this study is to provide new insights into the factors that influence cancellation behaviour with respect to hotel bookings. Cancellations of bookings are one of the most common concerns in the hotel sector. Before the specified arrival date, the client would cancel their reservation. The cancellation has had a major impact on hotel operations as well. The researchers developed a prototype system called Automated Hotel Booking Cancellation that can assist a hotel in better anticipating consumer cancellations and booking transactions. The researchers utilized a survey questionnaire following the ISO 25010 Software Quality Standard to assess the system's usefulness, functionality, accuracy, security, reliability, and maintainability. The results show \"strongly agree\" in all the domains with an overall mean = 3.46. IT Experts and respondents evaluated the proposed prototype and gained a \"Strongly Agree\" rating in all the domains under the survey. The domain on the usefulness of the system gained the highest mean = 3.89 with an interpretation of \"strongly agree,\" and the lowest was the domain of security with a mean = 3.15 or \"strongly agree,\" which ranked 6 in summary.\u0000\u0000The researchers concluded based on the findings that the developed prototype web-based system was useful and functional to the needs of the target users/beneficiaries. The user interface of the web-based system was user-friendly, representing an object-oriented user interface for the users. An improvement recommended on the cancellation to automatically predict cancellations that can be incorporated into the system using Machine Learning Algorithms to ease the process of cancellation were recommended for future researchers who want to pursue advanced studies about the topic.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}