sec Secret Kent By www.bbc.co.uk Published On :: Wed, 06 Nov 2024 09:40:22 GMT The story behind a pet cemetery on the A21. Full Article
sec Secret Cambridge By www.bbc.co.uk Published On :: Mon, 11 Nov 2024 10:00:00 GMT The long lost handwritten notes by Paradise Lost poet John Milton discovered in Arizona. Full Article
sec Secret Essex By www.bbc.co.uk Published On :: Fri, 08 Nov 2024 21:49:30 GMT In November 1918, more than 100 German U-Boats surrendered to the allied forces. Full Article
sec More secrets of Carlisle Citadel station tunnels By www.bbc.co.uk Published On :: Fri, 01 Nov 2024 15:10:17 GMT Andrew Carter explores more subterranean features and the abandoned station master's flat Full Article
sec Tax on second homes to fund affordable housing By www.bbc.com Published On :: Wed, 06 Nov 2024 07:58:53 GMT North Yorkshire councillors say £1m from the second homes tax premium will fund community-led plans. Full Article
sec Blackpool to host Birmingham in FA Cup second round By www.bbc.com Published On :: Sun, 03 Nov 2024 20:43:38 GMT Former Premier League sides Blackpool and Birmingham City are drawn together in the second round of the FA Cup. Full Article
sec Secret Wiltshire By www.bbc.co.uk Published On :: Tue, 01 Oct 2024 11:05:36 GMT Sophie Parker tells the story of Easy Company’s stay in a Wiltshire village. Full Article
sec Secret Wiltshire By www.bbc.co.uk Published On :: Tue, 01 Oct 2024 10:51:28 GMT Roger and Richard remember the day her statue arrived in Swindon. Full Article
sec Alpine must make up for 0.3-second deficit with 2025 chassis – Briatore | RaceFans Round-up By www.racefans.net Published On :: Wed, 13 Nov 2024 00:01:00 +0000 In the round-up: Alpine must make up for 0.3-second deficit with 2025 chassis - Briatore • Stolen Lauda helmet goes on display • Wittich 'has not resigned' Full Article RaceFans Round-up Alpine
sec The incredible secret of the London Overground rebranding By martinbelam.com Published On :: Tue, 29 Oct 2024 13:59:31 +0000 I am 100% on-board with the London Overground being split into six different lines with individual names. It is infuriating to see there are delays on the Overground and have no clear idea of whether they might be on a... Full Article Design
sec El brexit para los traductores jurados: ¿Qué consecuencias tiene? By www.traduccion-jurada-oficial.com Published On :: Tue, 25 Apr 2017 11:57:41 +0000 La posible y cada vez más anunciada salida de Reino Unido de la Unión Europea, el llamado brexit, tiene consecuencias en todos los ámbitos. Para algunos es una catástrofe. Para otros, la liberación. Independientemente... The post El brexit para los traductores jurados: ¿Qué consecuencias tiene? appeared first on El Blog del Traductor Jurado. Full Article General Marketing para traductores Normativa del traductor jurado brexit europa libra Londres normativa Reino Unido traduccion jurada Traductor jurado traductores jurados unión europea
sec Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes By www.jucs.org Published On :: 2011-07-08T12:30:07+02:00 This paper systematically discusses the security and privacy concerns for e-learning systems. A five-layer architecture of e-learning system is proposed. The security and privacy concerns are addressed respectively for five layers. This paper further examines the relationship among the security and privacy policy, the available security and privacy technology, and the degree of e-learning privacy and security. The digital identity attributes are introduced to e-learning portable devices to enhance the security and privacy of e-learning systems. This will provide significant contributions to the knowledge of e-learning security and privacy research communities and will generate more research interests. Full Article
sec Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS By www.jucs.org Published On :: 2011-07-04T16:04:45+02:00 Recently, IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX for short) has provided us with low-cost, high efficiency and high bandwidth network services. However, as with the WiFi, the radio wave transmission also makes the WiMAX face the wireless transmission security problem. To solve this problem, the IEEE802.16Std during its development stage defines the Privacy Key Management (PKM for short) authentication process which offers a one-way authentication. However, using a one-way authentication, an SS may connect to a fake BS. Mutual authentication, like that developed for PKMv2, can avoid this problem. Therefore, in this paper, we propose an authentication key management approach, called Diffie-Hellman-PKDS-based authentication method (DiHam for short), which employs a secret door asymmetric one-way function, Public Key Distribution System (PKDS for short), to improve current security level of facility authentication between WiMAX's BS and SS. We further integrate the PKMv1 and the DiHam into a system, called PKM-DiHam (P-DiHam for short), in which the PKMv1 acts as the authentication process, and the DiHam is responsible for key management and delivery. By transmitting securely protected and well-defined parameters for SS and BS, the two stations can mutually authenticate each other. Messages including those conveying user data and authentication parameters can be then more securely delivered. Full Article
sec Hierarchical Graph-Grammar Model for Secure and Efficient Handwritten Signatures Classification By www.jucs.org Published On :: 2011-07-04T16:04:47+02:00 One important subject associated with personal authentication capabilities is the analysis of handwritten signatures. Among the many known techniques, algorithms based on linguistic formalisms are also possible. However, such techniques require a number of algorithms for intelligent image analysis to be applied, allowing the development of new solutions in the field of personal authentication and building modern security systems based on the advanced recognition of such patterns. The article presents the approach based on the usage of syntactic methods for the static analysis of handwritten signatures. The graph linguistic formalisms applied, such as the IE graph and ETPL(k) grammar, are characterised by considerable descriptive strength and a polynomial membership problem of the syntactic analysis. For the purposes of representing the analysed handwritten signatures, new hierarchical (two-layer) HIE graph structures based on IE graphs have been defined. The two-layer graph description makes it possible to take into consideration both local and global features of the signature. The usage of attributed graphs enables the storage of additional semantic information describing the properties of individual signature strokes. The verification and recognition of a signature consists in analysing the affiliation of its graph description to the language describing the specimen database. Initial assessments display a precision of the method at a average level of under 75%. Full Article
sec Special counsel Jack Smith looking at stepping down before Trump takes office and is discussing how to end prosecutions - CNN By news.google.com Published On :: Wed, 13 Nov 2024 13:16:00 GMT Special counsel Jack Smith looking at stepping down before Trump takes office and is discussing how to end prosecutions CNN Full Article
sec Trump Taps Fox News Pundit to Be Secretary of Defense - Rolling Stone By news.google.com Published On :: Wed, 13 Nov 2024 01:07:03 GMT Trump Taps Fox News Pundit to Be Secretary of Defense Rolling StoneTrump's defence choice stuns the Pentagon and raises questions about the Fox News host's experience CTV NewsHow Pete Hegseth went from Fox News host to Trump’s Defense Secretary pick CNNTrump Puts Allies on Alert by Handing Pentagon to Fox News Host Hegseth BloombergHouse Democrat ‘very disturbed’ by Hegseth pick as Trump Defense secretary The Hill Full Article
sec The Impact of Physics Open Educational Resources (OER) on the Professional Development of Bhutanese Secondary School Physics Teachers By ijedict.dec.uwi.edu Published On :: Sat, 31 Aug 2024 09:44:41 -0400 Full Article Refereed Articles
sec Data dissemination and policy enforcement in multi-level secure multi-domain environments By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Several challenges exist in disseminating multi-level secure (MLS) data in multi-domain environments. First, the security domains participating in data dissemination generally use different MLS labels and lattice structures. Second, when MLS data objects are transferred across multiple domains, there is a need for an agreed security policy that must be properly applied, and correctly enforced for the data objects. Moreover, the data sender may not be able to predetermine the data recipients located beyond its trust boundary. To address these challenges, we propose a new framework that enables secure dissemination and access of the data as intended by the owner. Our novel framework leverages simple public key infrastructure and active bundle, and allows domains to securely disseminate data without the need to repackage it for each domain. Full Article
sec Robust and secure file transmission through video streaming using steganography and blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 File transfer is always handled by a separate service, sometimes it is a third-party service in videoconferencing. When sending files during a video session, file data flow and video stream are independent of each other. Encryption is a mature method to ensure file security. However, it still has the chance to leave footprints on the intermediate forwarding machines. These footprints can indicate that a file once passed through, some protocol-related logs give clues to the hackers' later investigation. This work proposes a file-sending scheme through the video stream using blockchain and steganography. Blockchain is used as a file slicing and linkage mechanism. Steganography is applied to embed file pieces into video frames that are continuously generated during the session. The scheme merges files into the video stream with no file transfer protocol use and no extra bandwidth consumed by the file to provide trackless file transmission during the video communication. Full Article
sec Secure digital academic certificate verification system using blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 At present, there is a need for an authentic and fast approach to certificate verification. Which verifies and authenticates the certificates to reduce the extent of duplicity and time. An academic certificate is significant for students, the government, universities, and employers. Academic credentials play a vital role in the career of students. A few people manipulate academic documents for their benefit. There are cases identified where people produced fake academic certificates for jobs or higher education admission. Various research works are developing a secure model to verify genuine academic credentials. This research article proposed a new security model which contains several security algorithms such as timestamps, hash function, digital signature, steganography, and blockchain. The proposed model issues secure digital academic certificates. It enhanced security measures and automated educational certificate verification using blockchain technology. The advantages of the proposed model are automated, cost-effective, secured, traceable, accurate, and time-saving. Full Article
sec International Journal of Information and Computer Security By www.inderscience.com Published On :: Full Article
sec The discussion of information security risk control in mobile banking By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The emergence of digital technology and the increasing prevalence of smartphones have promoted innovations in payment options available in finance and consumption markets. Banks providing mobile payment must ensure the information security. Inadequate security control leads to information leakage, which severely affects user rights and service providers' reputations. This study uses control objectives for Information and Related Technologies 4.1 as the mobile payment security control framework to examine the emergent field of mobile payment. A literature review is performed to compile studies on the safety risk, regulations, and operations of mobile payments. In addition, the Delphi questionnaire is distributed among experts to determine the practical perspectives, supplement research gaps in the literature, and revise the prototype framework. According to the experts' opinions, 59 control objectives from the four domains of COBIT 4.1 are selected. The plan and organise, acquire and implement, deliver and support, and monitor and evaluate four domains comprised 2, 5, 10, and 2 control objectives that had mean importance scores of > 4.50. Thus, these are considered the most important objectives by the experts, respectively. The results of this study can serve as a reference for banks to construct secure frameworks in mobile payment services. Full Article
sec Multi-agent Q-learning algorithm-based relay and jammer selection for physical layer security improvement By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Physical Layer Security (PLS) and relay technology have emerged as viable methods for enhancing the security of wireless networks. Relay technology adoption enhances the extent of coverage and enhances dependability. Moreover, it can improve the PLS. Choosing relay and jammer nodes from the group of intermediate nodes effectively mitigates the presence of powerful eavesdroppers. Current methods for Joint Relay and Jammer Selection (JRJS) address the optimisation problem of achieving near-optimal secrecy. However, most of these techniques are not scalable for large networks due to their computational cost. Secrecy will decrease if eavesdroppers are aware of the relay and jammer intermediary nodes because beamforming can be used to counter the jammer. Consequently, this study introduces a multi-agent Q-learning-based PLS-enhanced secured joint relay and jammer in dual-hop wireless cooperative networks, considering the existence of several eavesdroppers. The performance of the suggested algorithm is evaluated in comparison to the current algorithms for secure node selection. The simulation results verified the superiority of the proposed algorithm. Full Article
sec Digitalisation boost operation efficiency with special emphasis on the banking sector By www.inderscience.com Published On :: 2024-10-01T23:20:50-05:00 The banking sector has experienced a substantial technological shift that has opened up new and better opportunities for its customers. Based on their technological expenditures, the study assessed the two biggest public Indian banks and the two biggest private Indian banks. The most crucial statistical techniques used to demonstrate the aims are realistic are bivariate correlations and ordinary least squares. This work aims to establish a connection between research and a technology index that serves as a proxy for operational efficiency. The results show that for both public and private banks, the technology index positively influences operational efficiency metrics like IT costs, marketing costs, and compensation costs. This suggests that when the technology index increases, so do IT, marketing, and compensation costs, even though it has been shown that the technology index favourably improves operational efficiency measures like depreciation and printing. This means that the cost to banks is high despite greater investment in technology for these activities. Full Article
sec Integrating big data collaboration models: advancements in health security and infectious disease early warning systems By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 In order to further improve the public health assurance system and the infectious diseases early warning system to give play to their positive roles and enhance their collaborative capacity, this paper, based on the big and thick data analytics technology, designs a 'rolling-type' data synergy model. This model covers districts and counties, municipalities, provinces, and the country. It forms a data blockchain for the public health assurance system and enables high sharing of data from existing system platforms such as the infectious diseases early warning system, the hospital medical record management system, the public health data management system, and the health big and thick data management system. Additionally, it realises prevention, control and early warning by utilising data mining and synergy technologies, and ideally solves problems of traditional public health assurance system platforms such as excessive pressure on the 'central node', poor data tamper-proofing capacity, low transmission efficiency of big and thick data, bad timeliness of emergency response, and so on. The realisation of this technology can greatly improve the application and analytics of big and thick data and further enhance the public health assurance capacity. Full Article
sec Digital Bridge or Digital Divide? A Case Study Review of the Implementation of the ‘Computers for Pupils Programme’ in a Birmingham Secondary School By Published On :: Full Article
sec Effective Adoption of Tablets in Post-Secondary Education: Recommendations Based on a Trial of iPads in University Classes By Published On :: Full Article
sec Secure E-Examination Systems Compared: Case Studies from Two Countries By Published On :: 2017-04-12 Aim/Purpose: Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of knowledge about the methods of e-examinations. Background: Electronic examinations are now a viable alternative method of assessing student learning. They provide freedom of choice, in terms of the location of the examination, and can provide immediate feedback; students and institutions can be assured of the integrity of knowledge testing. This in turn motivates students to strive for deeper learning and better results, in a higher quality and more rigorous educational process. Methodology : This paper compares an e-examination system at FUT Minna Nigeria with one in Australia, at the University of Tasmania, using case study analysis. The functions supported, or inhibited, by each of the two e-examination systems, with different approaches to question types, cohort size, technology used, and security features, are compared. Contribution: The researchers’ aim is to assist stakeholders (including lecturers, invigilators, candidates, computer instructors, and server operators) to identify ways of improving the process. The relative convenience for students, administrators, and lecturer/assessors and the reliability and security of the two systems are considered. Challenges in conducting e-examinations in both countries are revealed by juxtaposing the systems. The authors propose ways of developing more effective e-examination systems. Findings: The comparison of the two institutions in Nigeria and Australia shows e-examinations have been implemented for the purpose of selecting students for university courses, and for their assessment once enrolled. In Nigeria, there is widespread systemic adoption for university entrance merit selection. In Australia this has been limited to one subject in one state, rather than being adopted nationally. Within undergraduate courses, the Nigerian scenario is quite extensive; in Australia this adoption has been slower, but has penetrated a wide variety of disciplines. Recommendations for Practitioners: Assessment integrity and equipment reliability were common issues across the two case studies, although the delivery of e-examinations is different in each country. As with any procedural process, a particular solution is only as good as its weakest attribute. Technical differences highlight the link between e-examination system approaches and pedagogical implications. It is clear that social, cultural, and environmental factors affect the success of e-examinations. For example, an interrupted electrical power supply and limited technical know-how are two of the challenges affecting the conduct of e-examinations in Nigeria. In Tasmania, the challenge with the “bring your own device” (BYOD) is to make the system operate on an increasing variety of user equipment, including tablets. Recommendation for Researchers: The comparisons between the two universities indicate there will be a productive convergence of the approaches in future. One key proposal, which arose from the analysis of the existing e-examination systems in Nigeria and Australia, is to design a form of “live” operating system that is deployable over the Internet. This method would use public key cryptography for lecturers to encrypt their questions online. Impact on Society : If institutions are to transition to e-examinations, one way of facilitating this move is by using computers to imitate other assessment techniques. However, higher order thinking is usually demonstrated through open-ended or creative tasks. In this respect the Australian system shows promise by providing the same full operating system and software application suite to all candidates, thereby supporting assessment of such creative higher order thinking. The two cases illustrate the potential tension between “online” or networked reticulation of questions and answers, as opposed to “offline” methods. Future Research: A future design proposition is a web-based strategy for a virtual machine, which is launched into candidates’ computers at the start of each e-examination. The new system is a form of BYOD externally booted e-examination (as in Australia) that is deployable over the Internet with encryption and decryption features using public key cryptography (Nigeria). This will allow lecturers to encrypt their questions and post them online while the questions are decrypted by the administrator or students are given the key. The system will support both objective and open-ended questions (possibly essays and creative design tasks). The authors believe this can re-define e-examinations as the “gold standard” of assessment. Full Article
sec An Investigation of the Use of the ‘Flipped Classroom’ Pedagogy in Secondary English Language Classrooms By Published On :: 2017-01-09 Aim/Purpose : To examine the use of a flipped classroom in the English Language subject in secondary classrooms in Hong Kong. Background: The research questions addressed were: (1) What are teachers’ perceptions towards the flipped classroom pedagogy? (2) How can teachers transfer their flipped classroom experiences to teaching other classes/subjects? (3) What are students’ perceptions towards the flipped classroom pedagogy? (4) How can students transfer their flipped classroom experiences to studying other subjects? (5) Will students have significant gain in the knowledge of the lesson topic trialled in this study? Methodology: A total of 57 students from two Secondary 2 classes in a Band 3 secondary school together with two teachers teaching these two classes were involved in this study. Both quantitative and quantitative data analyses were conducted. Contribution: Regarding whether the flipped classroom pedagogy can help students gain significantly in their knowledge of a lesson topic, only one class of students gained statistically significantly in the subject knowledge but not for another class. Findings: Students in general were positive about the flipped classroom. On the other hand, although the teachers considered that the flipped classroom pedagogy was creative, they thought it may only be useful for teaching English grammar. Recommendations for Practitioners: Teachers thought that flipping a classroom may only be useful for more motivated students, and the extra workload of finding or making suitable pre-lesson online videos is the main concern for teachers. Recommendations for Researchers: Both quantitative and qualitative analyses should be conducted to investigate the effectiveness of a flipped classroom on students’ language learning. Impact on Society : Teachers and students can transfer their flipped classroom experiences in English Language to teaching and studying other subjects. Future Research: More classes should be involved and a longer period of time should be spent on trial teaching in which a flipped classroom can be implemented in different lesson topics, not only teaching grammar. Teachers also need to determine if students can use the target language item in a task. Full Article
sec Enhancing Student Learning in Cybersecurity Education using an Out-of-class Learning Approach By Published On :: 2019-02-12 Aim/Purpose: In this study, the researchers investigated whether the out-of-class learning approach could help the students to attain any valuable learning outcomes for cybersecurity learning and could enhance the perceived value of cybersecurity education among the students. Background: Cybersecurity learning poses challenges for its students to learn a complicated subject matter and the students may be intimidated by the challenging courses in cybersecurity programs. Therefore, it is essential for the faculty members to devise some mechanisms to promote cybersecurity learning to increase its student retention. The mechanism suggested by this study was the out-of-class learning approach. Methodology: The researchers in this study employed a content analysis and adopted a semiotic method to analyze qualitative data. The researchers also conducted crosstabulation analyses using chi-square tests to detect the significant differences in the emerging learning outcomes from the two different out-of-class learning activities investigated in this study. Contribution: This study addressed the difficulty of cybersecurity education and proposed a viable mechanism to promote the student learning in such a complicated subject matter. Findings: For cybersecurity education, the out-of-class learning approach is a viable pedagogical mechanism that could lead the students to several learning outcomes, including connecting them to the real-life scenarios related to the cybersecurity profession, guiding them to their career choices and development, stimulating their intellectual growth, creating their justification of learning, and raising their cybersecurity awareness. Recommendations for Practitioners: The instructors of any cybersecurity programs should incorporate some out-of-class learning activities into the courses in their programs, especially the introductory-level courses. Additionally, it is important to coordinate the out-of-class learning activities with the in-class lessons to enable the students to justify what they have learned in their classrooms and motivate them to learn more. Recommendation for Researchers: Researchers could look beyond in-class learning and laboratory learning to investigate the impacts of out-of-class learning activities on cybersecurity education to help the students to attain better learning outcomes. Impact on Society: By promoting cybersecurity education, universities and colleges could attain a higher retention rate of the students in their cybersecurity programs. The higher retention rate of the students in cybersecurity programs would help to ease the critical shortage of cybersecurity talent. Future Research: Future research could explore the impacts of other out-of-class learning activities on cybersecurity learning; for example: job shadowing, attending cybersecurity conferences, internship, developing cybersecurity systems or tools for actual customers, working on cybersecurity research with faculty members. Additionally, future studies could investigate the effects of the out-of-class learning approach on promoting other academic programs that are characterized by intensely complex and technical nature, similar to cybersecurity programs. Full Article
sec Knowledge Management Applied to Learning English as a Second Language Through Asynchronous Online Instructional Videos By Published On :: 2022-09-14 Aim/Purpose: The purpose of this research is to determine whether ESL teaching videos as a form of asynchronous online knowledge sharing can act as an aid to ESL learners internalizing knowledge in language acquisition. In this context, internalizing knowledge carries the meaning of being able to remember language, and purposefully and accurately use it context, including appropriacy of language, and aspects of correct pronunciation, intonation, stress patterns and connected speech, these being the elements of teaching and practice that are very often lacking in asynchronous, online, instructional video. Background: Knowledge Management is the field of study, and the practice, of discovering, capturing, sharing, and applying knowledge, typically with a view to translating individuals’ knowledge into organizational knowledge. In the field of education, it is the sharing of instructors’ knowledge for students to be able to learn and usefully apply that knowledge. In recent pandemic times, however, the mode of instruction has, of necessity, transitioned from face-to-face learning to an online environment, transforming the face of education as we know it. While this mode of instruction and knowledge sharing has many advantages for the online learner, in both synchronous and asynchronous learning environments, it presents certain challenges for language learners due to the absence of interaction and corrective feedback that needs to take place for learners of English as a Second Language (ESL) to master language acquisition. Unlike other subjects where the learner has recourse to online resources to reinforce learning through referencing external information, such as facts, figures, or theories, to be successful in learning a second language, the ESL learner needs to be able to learn to process thought and speech in that language; essentially, they need to learn to think in another language, which takes time and practice. Methodology: The research employs a systematic literature review (SLR) to determine the scope and extent to which the subject is covered by existing research in this field, and the findings thereof. Contribution: Whilst inconclusive in relation to internalizing language through online, asynchronous instructional video, through its exploratory nature, the research contributes towards the body of knowledge in online learning through the drawing together of various studies in the field of learning through asynchronous video through improving video and instructional quality. Findings: The findings of the systematic literature review revealed that there is negligible research in this area, and while information exists on blended and flipped modes of online learning, and ways to improve the quality and delivery of instructional video generally, no prior research on the exclusive use of asynchronous videos as an aid to internalizing English as a second language were found. Recommendations for Practitioners: From this research, it is apparent that there is considerably more that practitioners can do to improve the quality of instructional videos that can help students engage with the learning, from which students stand a much better chance of internalizing the learning. Recommendation for Researchers: For researchers, the absence of existing research is an exciting opportunity to further explore this field. Impact on Society: Online learning is now globally endemic, but it poses specific challenges in the field of second language learning, so the development of instructional videos that can facilitate this represents a clear benefit to all ESL learners in society as a whole. Future Research: Clearly the absence of existing research into whether online asynchronous instructional videos can act as an aid to internalizing the acquisition of English as a second language would indicate that this very specific field is one that merits future research. Indeed, it is one that the author intends to exploit through primary data collection from the production of a series of asynchronous, online, instructional videos. Full Article
sec Honeybrid method for network security in a software defined network system By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 This research introduces a hybrid honeypot architecture to bolster security within software-defined networks (SDNs). By combining low-interaction and high-interaction honeypots, the proposed solution effectively identifies and mitigates cyber threats, including port scanning and man-in-the-middle attacks. The architecture is structured into multiple modules that focus on detecting open ports using Vilhala honeypots and simulating targeted and random attack scenarios. This hybrid approach enables comprehensive monitoring and detailed packet-level analysis, providing enhanced protection against advanced online threats. The study also conducts a comparative analysis of different attack detection methods using tools like KFSensor and networking shell commands. The results highlight the hybrid honeypot system's efficacy in filtering malicious traffic and detecting security breaches, making it a robust solution for safeguarding SDNs. Full Article
sec A novel IoT-enabled portable, secure automatic self-lecture attendance system: design, development and comparison By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 This study focuses on the importance of monitoring student attendance in education and the challenges faced by educators in doing so. Existing methods for attendance tracking have drawbacks, including high costs, long processing times, and inaccuracies, while security and privacy concerns have often been overlooked. To address these issues, the authors present a novel internet of things (IoT)-based self-lecture attendance system (SLAS) that leverages smartphones and QR codes. This system effectively addresses security and privacy concerns while providing streamlined attendance tracking. It offers several advantages such as compact size, affordability, scalability, and flexible features for teachers and students. Empirical research conducted in a live lecture setting demonstrates the efficacy and precision of the SLAS system. The authors believe that their system will be valuable for educational institutions aiming to streamline attendance tracking while ensuring security and privacy. Full Article
sec International Journal of Electronic Security and Digital Forensics By www.inderscience.com Published On :: Full Article
sec Effective inventory management among Malaysian SMEs in the manufacturing sector towards organisational performance By www.inderscience.com Published On :: 2023-10-23T23:20:50-05:00 In several manufacturing firms, inventory constitutes most of the current assets, and this underscores the importance of inventory management as a fundamental issue for the majority of the firms irrespective of their sizes. Therefore, the purpose of this research is to assess the factors that influence the effectiveness of inventory management of Malaysian SMEs in the manufacturing sector. The study employs PLS-SEM technique to test the hypotheses. The main findings show that documentation and records, inventory control system and qualified personnel have positive effects on effective inventory management of Malaysian SMEs in the manufacturing sector. The study also reveals that effective inventory management has a mediating effect on the relationship between documentation and records, inventory control system, qualified personnel and organisational performance. Therefore, the study recommends that Malaysian SMEs in the manufacturing sector should improve their approaches to embracing effective inventory management practices in order to enhance organisational performance. Full Article
sec Can artificial intelligence replace whistle-blowers in the business sector? By www.inderscience.com Published On :: 2020-02-07T23:20:50-05:00 The major technological developments have changed the traditional way of doing business. These developments have facilitated whistle-blowing. Access to data is easier and faster and communicating with the public can be done in seconds. Another development is the artificial intelligence (AI) which enters the business workplace in different forms challenging the traditional working relations. The combination of these concepts gives the idea of artificial whistle-blowing or robot whistle-blowing. The concept is that a machine should conceive and report relevant wrongdoing avoiding the traditional model of whistle-blowing where the employee is the person who should report. This concept, yet unexplored, presents interesting positive and negative aspects. The purpose of this contribution is to present the idea of artificial whistle-blowing and its advantages and disadvantages for the business sector. As a conclusion, this paper suggests that the concept of artificial whistle-blowing needs still to be researched and an optimal solution, for the time being, is to permit artificial whistle-blowing as a helping tool for the employees to detect wrongdoings but report them themselves. Full Article
sec LDSAE: LeNet deep stacked autoencoder for secure systems to mitigate the errors of jamming attacks in cognitive radio networks By www.inderscience.com Published On :: 2024-10-15T23:20:50-05:00 A hybrid network system for mitigating errors due to jamming attacks in cognitive radio networks (CRNs) is named LeNet deep stacked autoencoder (LDSAE) and is developed. In this exploration, the sensing stage and decision-making are considered. The sensing unit is composed of four steps. First, the detected signal is forwarded to filtering progression. Here, BPF is utilised to filter the detected signal. The filtered signal is squared in the second phase. Third, signal samples are combined and jamming attacks occur by including false energy levels. Last, the attack is maliciously affecting the FC decision in the fourth step. On the other hand, FC initiated the decision-making and also recognised jamming attacks that affect the link amidst PU and SN in decision-making stage and it is accomplished by employing LDSAE-based trust model where the proposed module differentiates the malicious and selfish users. The analytic measures of LDSAE gained 79.40%, 79.90%, and 78.40%. Full Article
sec e-HR and Employee Self Service: A Case Study of a Victorian Public Sector Organisation By Published On :: Full Article
sec Exploring Change and Innovation by ICT Teaching Staff in the New Zealand Polytechnic Sector By Published On :: Full Article
sec Factors Influencing the Decision to Choose Information Technology Preparatory Studies in Secondary Schools: An Exploratory Study in Regional/Rural Australia By Published On :: Full Article
sec Computer Network Simulation and Network Security Auditing in a Spatial Context of an Organization By Published On :: Full Article
sec A Second Opinion on the Current State of Affairs in Computer Science Education: An Australian Perspective By Published On :: Full Article