{"title":"Study of the Simulation and Application of the PEEC Method for Modeling the Prediction of Emissions Radiated by the Onboard Electronic Wiring System","authors":"Anthony Bassesuka Sandoka Nzao","doi":"10.5539/cis.v17n2p7","DOIUrl":"https://doi.org/10.5539/cis.v17n2p7","url":null,"abstract":"The coexistence of electronic power and control systems in the same box presents a serious threat to the proper functioning of electronic systems integrated into automobiles, aeronautics and space. Thus, managing the electromagnetic compatibility of these systems constitutes a challenge, particularly given electromagnetic phenomena. This paper describes a simulation study and application of the partial element equivalent circuit method to model the prediction of radiated emissions from the onboard electronic cable system. In this article, we first explain the use of the partial cell equivalent circuit modeling method, then describe its mathematical formulation and introduce the different electromagnetic phenomena it considers in connection with wiring, then propose radiation calculations electromagnetic as a function of the geometry of the discrete cells taking into account the increase in frequency. The goal is to get as close to the structure as possible. To balance the accuracy and speed of the proposed method, we replaced the partial capacities with the equivalent capacities so as to considerably minimize the number of capacities, the complexity of the system and the computational time requirement. This option adapts the partial element equivalent circuit method to the study of larger structures such as cable structures and provides an efficient and rapid way to simulate electromagnetic radiation. To achieve this objective, we have associated the physical laws of electromagnetic wave propagation with the method of modeling equivalent circuits using partial elements because it is easy to manipulate flat surfaces and cables. 2D simulations based on the proposed models were developed as well as the verification of the consistency of the different models, by comparing the fractal dimensions of the program results with those of the figures obtained experimentally.","PeriodicalId":511930,"journal":{"name":"Computer and Information Science","volume":"104 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141820845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model for Total Cost Determination in Open-Source Software Ownership: Case of Kenyan Universities’ Learning Management System","authors":"Duncan Kereu Kodhek, J. Kamau, F. Musyoka","doi":"10.5539/cis.v17n1p18","DOIUrl":"https://doi.org/10.5539/cis.v17n1p18","url":null,"abstract":"The adoption of open-source products is slowly increasing; the increase, however, is slower than expected, considering that most open-source products are freely available. Researchers and scholars have attributed the adoption levels to, among other things, a lack of know-how of the total cost of ownership of the open-source software. Thus, it is crucial for the cost of owning the software to be developed. While an ongoing endeavor to develop a model to determine the total cost of ownership of open-source software, the models have proved to be less accurate and do not capture essential elements. Moreover, there has been a rising call for organizations to adopt open-source software to lower the software costs incurred on proprietary software. If the cost of owning open-source software were known, it would be beneficial as several organizations and institutions could adopt it readily. The data was collected from Universities in Kiambu and Embu Counties. Linear regression analysis was done to help develop the model, and a mathematical model was developed. The proposed model was: total cost of open-source software ownership = direct + +indirect + hidden costs. To validate the model, it was subjected to expert validation. The model will be an outstanding contribution to information technology as it will make it possible to come up with the total cost of owning open-source software.","PeriodicalId":511930,"journal":{"name":"Computer and Information Science","volume":"104 S110","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140257054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Preventing and Mitigating Cache Based Side-Channel Attacks on AES System in Virtualized Environments","authors":"Abdullah Albalawi","doi":"10.5539/cis.v17n1p9","DOIUrl":"https://doi.org/10.5539/cis.v17n1p9","url":null,"abstract":"Cloud computing aims to cut costs through a reduction in spending on equipment, infrastructure, and software by applying the multi-tenancy feature. Despite all the benefits of multi-tenancy, it is still a source of risk in cloud computing. Cloud adoption may be hampered by security concerns if suitable cloud-based security solutions are not available. Moreover, virtualization that enables multi-tenancy, considered one of the main components of a cloud, introduces major security risks and does not offer appropriate isolation between different instances running on the same physical machine. In this paper, we present a preliminary idea that may support the development of new countermeasures for a particular type of threat, namely cache-based side-channel attacks that target cache memories in virtualized environments. Attackers specifically target virtual machines in this type of attack to create many side channels and gather sensitive data. Additionally, this research offers preliminary concepts to aid in developing of solutions or defenses that enable us to identify unusual activity that could point to attacks associated with multi-tenancy, as well as security measures that preserve the benefits of multi-tenancy while lowering security concerns.","PeriodicalId":511930,"journal":{"name":"Computer and Information Science","volume":"264 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140427964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrew McInnis Jr, Mohammad Alshibli, Ahmad Alzaghal, Samir Hamada
{"title":"Expanding the Breadth of Ability in Artificial Intelligence Systems with Decision Trees","authors":"Andrew McInnis Jr, Mohammad Alshibli, Ahmad Alzaghal, Samir Hamada","doi":"10.5539/cis.v17n1p1","DOIUrl":"https://doi.org/10.5539/cis.v17n1p1","url":null,"abstract":"This paper introduces a unique perspective. Rather than focusing on improving the already significant achievements of existing artificial intelligence algorithms, it investigates the potential of merging various algorithms to enhance their overall capabilities. Essential design aspects required for this integration are examined, and a prototype system is developed to demonstrate the practical application of these design principles. This method aims to broaden the range of capabilities accessible to a system, addressing the limitation of the narrow focus prevalent in contemporary artificial intelligence.","PeriodicalId":511930,"journal":{"name":"Computer and Information Science","volume":"115 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140475765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}