Cyber Security Research Papers/Topics

COMPUTER HARDWARE SYSTEM DESIGN

The arithmetic/logic unit is the component of the CPU where data is held temporarily and where calculations take place. The control unit controls and interprets the execution of instructions. Most of these actions are retrievals of instructions from memory followed by movements of data or addresses from one part of the CPU to another. The control unit determines the particular instruction to be executed by reading the contents of a program counter (PC), sometimes called an instruction pointer...

Pipelining

Pipelining is one way of improving the overall processing performance of a processor. This architectural approach allows the simultaneous execution of several instructions. Pipelining is transparent to the programmer; it exploits parallelism at the instruction level by overlapping the execution process of instructions. It is analogous to an assembly line where workers perform a specific task and pass the partially completed product to the next worker. This chapter explains various types of pi...

Application of Drone in Agriculture

The world population has increases day by day and projected to reach 9 billion people by 2050, so that the agricultural consumption will also increase. There is extreme need to fulfil the food demand of each and every person. Agriculture sector is the most promising sector, dealing with the lot of problems now a day’s one of the main problems is labour unavailability for farming. Other problems or difficulties are extreme weather events, inadequate amount and inefficient application of fert...

Military Use of Unmanned Aerial Vehicles- A Historical Study

The following study is devoted to the phenomenon of unmanned aerial vehicles used throughout known history on the battlefield or for military purposes. The purpose of the following text is to familiarise the reader with an overview with the contemporary and historical employment of the unmanned vehicles on the battlefield. The study also aims to show that the concept of unmanned combat vehicles, also unmanned aerial combat vehicles, is far more ancient than is it is widely known. The article ...

CAPTURING NETWORK TRAFFIC IN A NETWORKED ENVIROMENT USING WIRESHARK

What is Wireshark? Wireshark is a network packet analyzer. A network packet analyzer used to capture network packets and display that packet data as detailed as possible. My network capturing was done on wireshark on kali linux, Some intended uses of wireshark 1.Network administrators use it to troubleshoot network problems 2.Network security engineers use it to examine security problems 3.Engineers use it to verify network applications 4.Developers use it to debug protocol implementations 5...

Data Analytics Techniques

Some analytical techniques are required in order to the attempt some relevant information. It gives a broad overview of some of the most commonly used techniques and technologies to help the reader to better understand the tools based on big data analytics. There are many analytic techniques that could be employed when considering a big data project. Which ones are used that depends on the type of data being analyzed, the technology available to you, and the research questions you are trying ...

CSS 411: BASICS OF DIGITAL FORENSICS

TABLE OF CONTENTS 1.0.Introduction 1.1.Packet capturing and Analysis 1.2.Definition of key terms. 1.3.Scope of the work. 2.0.Related work. 2.1Aims and objectives of Research work. 3.0.Materials and Method. 3.1Tools and Applications used 3.2Wireshark 3.2.1Uses of Wireshark 3.2.2Features of Wireshark 4.0.Results and Discussion 4.1Packets Capturing using Wireshark 4.2Packets Analyzing using Wireshark 4.3IP address Capturing/Tracing 5.0.Summary & Conclusion 5.1Summary 5.2Conclusion References  1...

Cyber security

Cyber security is a fast growing pace in the society today and as a result of that, its growth is becoming more and more widespread. According to the 2015 (ISC) Global Information Security Workforce Study, a shortfall of 1.8 million cybersecurity jobs will happen by 2022 cite mat 1. Allegedly, the most common reason for this fact is the lack of qualified personnel. As a consequence of this trend even in education sector, Information Technology (IT), Cyber space, Online platform, medical field...

SOCIAL NETWORKING SITES

INTRODUCTION2 DEFINITION OF TERMS:2 LITERATURE REVIEW:3 SCOPE OF WORK:3 OVERVIEW:3 USAGE OF SOCIAL NETWORKING SITES3 EFFECT OF SOCIAL MEDIA ADDICTION (LOSS OF INTEREST IN OTHER ACTIVITIES)4 IMPACT OF SOCIAL MEDIA ADDICTION:4 IMPACT OF SOCIAL MEDIA ADDICTION ON STUDENT ACADEMIC PERFORMANCE5 IMPACT OF SOCIAL MEDIA ADDICTION ON EMPLOYEES5 METHODOLOGY5 METHODS OF DATA COLLECTION:6 ANALYSIS OF DATA:6 DISCUSSIONS AND RESULTS6 SUMMARY9 CONCLUSION9 REFERENCES:9

CPT 413: OPERATION RESEARCH

1.      Introduction to Dynamic Programming Dynamic programming is a general type of approach to problem solving, and the particular equations used must be developed to fit each situation. Therefore, a certain degree of ingenuity and insight into the general structure of dynamic programming problems is required to recognize when and how a problem can be solved by dynamic programming procedures. These abilities can best be developed by an exposure to a wide variety of dynamic programming ...

CSS 415: DISASTER RECOVERY

INTRODUCTION Disaster according to Wikipedia “A disaster is a serious disruption, occurring over a relatively short time, of the functioning of a community or a society involving widespread human, material, economic or environmental loss and impacts, which exceeds the ability of the affected community or society to cope using its own resources”. Over the years, the world has experienced different forms and dimensions of disaster, ranging from natural to man-made incidents. In effect, ther...

Introduction to Big Data Analysis

INTRODUCTION Big data is a word used for detailed information of massive amounts of data which are either structured, semi structured or unstructured. The data which is not able to be handled by the traditional databases and software Technologies then we divide such data as big data. The term big data is originated from the web companies who used to handle loosely structured (numerical form, figures, and transaction data etc.) or unstructured data (Email attachments, Images comments on social...

Ethical Hacking and Countermeasures

Hacking means to attack systems, networks and applications by exploiting their weaknesses, in order to gain unauthorized access to data and systems. • What are the goals of hacking? • Ethical hacking is the use of hacking knowledge, skills tools and techniques to demonstrate the true exploitable vulnerabilities of a system for the purpose of better securing it. 

Introduction to Linear Programming.

What is Linear Programming? A typical optimization problem is to find the best element from a given set. In order to compare elements, we need a criterion, which we call an objective function f(x). The given set is called the feasible set which is usually defined by {x ∈ Rn | gi (x) ≤ 0, i = 1, . . . , m}.

Linear Programming

One of the major applications of linear algebra involving systems of linear equations is in finding the maximum or minimum of some quantity, such as profit or cost. In mathematics the process of finding an extreme value (maximum or minimum) of a quantity (normally called a function) is known as optimization . Linear programming (LP) is a branch of Mathematics which deals with modeling a decision problem and subsequently solving it by mathematical techniques. The problem is presented in a form...


1 - 15 Of 16 Results