internet : Advanced Persistent Threat

Advanced Persistent Threat Organizations are under constant attack no matter how large their companies are. Attackers indiscriminately target organizations as large as Governments to as small as Internet start-ups using a method known as the Advanced Persistent Threat...

internet

internet The Internet is a powerful interconnection of computers, servers, and other peripheral devices. The connection of these devices allows information to be stored, shared, and used faster than at any point in history. As the Internet grows, the types of devices...

Power System Simulation Toolbox (PSST)

Power System Simulation Toolbox (PSST) Power System Simulation Toolbox (PSST) in Python is a collection of functions developed for rapid, fast-iterative design of models for power systems. It provides a wrapper over Pyomo for SCUC/SCED formulations. PSST allows...

ROBOT OPERATING SYSTEM

ROBOT OPERATING SYSTEM It is a robotic platform for running simulations. ROS can be defined as a open source meta operating system that provides features similar to an operating system. These features include physical layer abstraction, low level device control,...

MULTISENSOR FUSION

MULTISENSOR FUSION Sensor fusion involves combining data from several sensors to obtain better information for perception. Humans and animals process multiple sensory data to reason and act and the same principle is applied in multi-sensor data fusion. Multisensor...

Space Data Link Security – Extended Procedures

Space Data Link Security – Extended Procedures “The purpose of the SDLS Extended Procedures is to provide a standardized set of auxiliary services that are necessary to operate an implementation of the SDLS protocol.” The three types of services are detailed in the...

Espionage in Action

Espionage in Action a.Chaos Communication Camp At Chaos Communication Camp, in 2015, organizers distributed rad1o badges, shown in Figure 1. These devices are approximately the same size as a Raspberry Pi and include an antenna, allowing the user to intercept traffic...

Cryptographic

Cryptographic Principles “Confidentiality is defined as the assurance that information is not disclosed to unauthorized entities or processes.” As spacecraft require a radio frequency (RF) space link, the only means to achieve confidentiality is through encryption....

Support Vector Machine

Support Vector Machine (SVM) Support Vector Machine (SVM) is a very popular machine learning technique known for its accuracy, ease of application and versatility. This research does only apply SVM on the available feature set, so we try to explain only the basics...

Inertial Systems

Inertial Systems Inertial motion capture systems use miniature sensors and sensor fusion algorithms. Oftentimes, prototypes for these systems include accelerometers, gyroscopes, and magnetometers. In most cases, the data are transmitted wirelessly to a computer where...

Optical systems

Optical systems To obtain reliable data and measurements, gait laboratories often use OMCS. Different techniques and technologies are available, each with their advantages and limitations; however, their common goal is to capture movement data in order to examine and...

State-Corporate Crime In The Digital Age:

Introduction Problem Statement This thesis utilizes a state-corporate crime framework  to assess whether government surveillance of citizens violates personal privacy as protected under U.S. law, or whether surveillance occurs in ways that are legal, but nevertheless,...

Earned Value Management System (EVMS)

Earned Value Management System (EVMS) The ANSI/ELA-748 Standard for Earned Value Management Systems was developed in 1996 as part of the Department of Defense (DoD) acquisition reform initiative that adapted commercial management control best practices. The U.S....

Linking Cost Of Quality (COQ)

Linking Cost Of Quality (COQ) According to the U.S. Government Accountability Office (GAO), “Every two years at the start of a new Congress, GAO calls attention to agencies and program areas that are high risk due to their vulnerabilities to fraud, waste, abuse, and...

Operational Impact

Operational Impact An operational impact of a cyber-attack is measured the same as maintenance, power outage, or any other cause when the system becomes unusable or unavailable. Cyber-attacks are complex and dynamic in nature. Attacks, once successful, allow hackers...

Potential Infrastructure Breach Points

Potential Infrastructure Breach Points Airlines have public-facing websites that allow customers to book their reservations. The web servers, if not correctly updated and patched, can leave holes for a cyber-attack. Karen A. Forcht, professor in the Department of...

Challenges With Passenger Data Breach

Challenges With Passenger Data Breach The airlines reservation system holds all the passengers’ information including the date of birth, address, and form of payment (International Civil Aviation Organization, 2012). Travelers who become potential passengers on...

Improvement of surgery duration estimation

Improvement of surgery duration estimation The United States health care industry currently faces numerous challenges. In an era of changes, the system faces rising costs and increased demand for its services. This is a result of an aging population  and the newly...

Resilient Systems in Artificial Intelligence (AI)

Resilient Systems AI obstacle Two issues with advancing AI usage are the lack of extensive knowledge base capabilities, and the ability to learn. The element of complexity appears to be that an AI system must retain a vast spectrum of knowledge and traits that allow...

Typical security technology at Artificially Intelligent

Typical security technology Unlike a typical IT network, an ICS network does not need exceptional throughput. However, an ICS is far more time-critical, with each specific installation detailing tolerable levels of delay . Their need to remain self-sustaining is...

Mitigating Artificially Intelligent Vulnerabilities

Service vs. security The constructs of service before security led to the development of OPC-UA architecture. Business proficiency pushed improvement of the original design of Object Linking and Embedding (OLE). The development of OPC-UA came about for the provisional...

Artificially Intelligent Industrial Contorollers

Artificially Intelligent Industrial Contorollers The purpose of this research was to propose increased role for Artificial Intelligence (AI) for adaptive measures in cybersecurity for Industrial Controllers (IC) to provide Resilient Control Systems (RCS) and improve...

Solar Energy Utilization for Electric Generation

Solar Energy Utilization for Electric Generation The twenty first century is faced with great challenges and concerns regarding energy demand and supply . With the growing population, currently approximated around 7:3 billion, and in- creasing modernization and...

The fog architecture – from atom to Adam

The fog architecture – from atom to Adam As we further our discussion on the fog architecture, it is instructive to consider the whole picture. The goal of fog is to minimize the latency of the reaction of an application. It seems appropriate, then, to examine...

Telemedicine and in-home technologies

Telemedicine and in-home technologies WearUp is a study focusing on Parkinson’s Disease (PD), its interventions, and existing wearable technologies for movement disorders. Along with the advancements of smart textiles, this study looked into the design aspects of the...

What is Fog Computing

What is Fog Computing Fog is a system-level horizontal architecture that distributes resources and services of computing, storage, control and networking anywhere along the cloud-tothing continuum [Chiang et al. 2016]. In essence the fog is a middle man aimed at...

The Internet of Things (IoT)

The Internet of Things (IoT) The Internet of Things (IoT) is a network of devices, or things, connected to the Internet that can communicate their status, respond to events or even act autonomously. The IoT devices discussed in this thesis consist of sensors and...

END-USER AND POWER NETWORK MODELING USING DEx.py

END-USER AND POWER NETWORK MODELING USING DEx.py In the emerging Smart Grid, many new technologies are being introduced at the distribution-level . These new end-user assets, such as distributed PV solar, smart appliances, and smart heating, ventilation and air...

Python

Python The Python programming language is a valuable tool for scientific research. Python Natural Language Toolkit (NLTK) is one of the best packages for exploratory natural language parsing and understanding (Bird 2005). Python also supports modules and package and...

Classification

Classification Text classification is the task of classifying documents based on their contents (Kamruzzaman et al. 2005). Researchers have considered several approaches of text classification. Kamruzaman, Farhana Haider and Ahmed Ryadh Hassan (2005) used Naïve Bayes...

Types of CoS Descriptions

Types of CoS Descriptions The data shows that generally turkers described changes of state in one of three ways. (1) They describe the attribute directly, e.g. cut-cucumber: \The size of the cucumber changes”. (2) They describe the change of state with a...

Digital Forensics Artifacts

Digital Forensics Artifacts In modern society, “Mobile devices such as cell phones and smart phones have become an integral part of peoples’ daily lives, and as such, they are prone to facilitating criminal activity or otherwise being involved when crimes occur”...

Reasonable Expectation of Privacy

Reasonable Expectation of Privacy On the one hand, they have changed the way people communicate with one another. Mobile technology has enabled mobile users to leverage existing Internetenabled devices to stay connected with friends, family members, and colleagues;...

Encryption Software On Mobile Devices

Encryption Software On Mobile Devices According to Peroni (2014), end users have the options to apply encryption algorithms on their iPhones and Android-based smartphones since these devices are preconfigured with built-in encryption capabilities (setting passcodes on...

Common Encryption Methods

Common Encryption Methods According to Peroni (2014) who claimed that data encryption on mobile devices is critical: Data encryption is a necessary line of defense against hackers, and one that can make the difference between a breach and a mere close call. No phone...