Inquiry (E-Journal - Faculty of Business and Administration, International University of Sarajevo)
Not a member yet
    237 research outputs found

    Comprehensive Analysis of the Current State of Cyber Security Measures for IoT Devices

    Get PDF
    A new era of connectivity has been brought about by the Internet of Things (IoT), which presents unheard-of chances for innovation in a wide range of sectors and applications. IoT device proliferation does, however, also bring with it serious cybersecurity challenges. This systematic review examines the state of cyber security risk in the Internet of Things (IoT) space today, providing a thorough analysis of the research that has already been done and the approaches that have been used to assess and mitigate these risks. We study different aspects of cyber security risk within the IoT context, such as threat modeling, risk assessment techniques, vulnerability analysis, and mitigation strategies, drawing from a wide range of peer-reviewed articles, industry reports, and white papers. Additionally, the review draws attention to the unique qualities of IoT systems—such as heterogeneity, scalability, and resource constraints—that increase the risks associated with cyber security. The current status of cyber security protocols for Internet of Things devices is thoroughly examined in this paper. This paper will examine the distinct difficulties presented by the Internet of Things environment, the security flaws that these gadgets frequently display, and the possible risks they may encounter. Furthermore, the paper will examine the diverse approaches, tools, and methods presently utilized to enhance the security of Internet of Things devices. We will also talk about the regulatory environment that oversees IoT security and the ongoing research and development initiatives aimed at improving it. In order to help direct future efforts in safeguarding our digital, interconnected world, we hope to offer a comprehensive, perceptive analysis

    Atom Connectivity and Connectivity Energy of few Molecules

    Get PDF
    For a given chemical compound, a molecular graph could be constructed. The total of the absolute measures of Eigen values taken from adjacency matrix of the molecular graph for the assumed chemical compound is known as the energy of graph. It has been observed that, the adjacency matrix derived from the molecular graph has no information about the atoms and bonds connected. To overcome this limitation, we have considered the atom-connectivity and connectivity matrix which give more information about the classification of bonds and atom- connectivity of a chemical compound in the molecular graph. In this paper, we enhance our results on the atom connectivity energy graph and also few hydrocarbons are compared with the ordinary energy

    Brain Stroke Prediction Model Based SMOTE and Machine Learning Algorithms

    Get PDF
    A brain stroke is a critical medical emergency condition that causes disability and death. The pre-diagnosis of this case can reduce the complications and problems that affect the brain as a result of being affected by the complications that occur during the injury. This study lists an analysis process on a brain stroke dataset using the KNIME tool, which provides a set of different machine learning components such as random forest, Decision Tree Learner, Gradient Boosted Trees Learner, and Logistic Regression algorithms. The problem of imbalanced data will be handled as part of data preprocessing. The factors that affect the brain stroke will be explored based on feature selection approaches such as forward feature selection, backward feature elimination, genetic algorithms, and random. The aim is to build a model that helps doctors diagnose the disease accurately based on the results we obtained from the study and analysis. The results showed that logistic regression outperformed the other algorithms after applying the algorithm with forward feature selection and backward feature elimination

    Analysis of Priority Queueing System with Working Breakdown,Vacation and Vacation Interruption under Random Environment

    Get PDF
    study priority queueing system consisting of working breakdown, repair, single vacation and vacation interruption. At a breakdown instant during the busy period, without stop the servie, the server provides service at slower rate for the current customer. After completion of priority service, depending on the environment, the server can choose type I or type II vacation. Both types of vacation are considered as a single vacation. On completion of type I vacation if the server finds thepriority queue is empty, he has the option to take type II vacation. During the type II vacation, when priority customers arrive the server has the option to interrupt the vacation. We use the established norm which is the corresponding steady state results for time dependent probability generating functions are obtained. Along with that, the expected waiting time for theexpected number of customers for both high and low priority queues are computed. Numerical results along with the graphical representations are shown elaborately

    In-Dominating Number and Out-Dominating Number of Unidirectional Perfect Binary Trees

    Get PDF
    A diverging unidirectional perfect binary tree is a unidirectional perfect binary tree in which every internal node has exactly outdegree two and indegree 1 and all the leaf nodes are at the same level. A converging unidirectional perfect binary tree is a unidirectional perfect binary tree in which every internal node has exactly indegree two and outdegree 1 and all the leaf nodes are at the same level. In this paper, we study the out-domination number and in-domination number of the unidirectional perfect binary trees

    Bulk queueing system with starting failure and single vacation

    Get PDF
    To analyze an M^([X])/G(a,b)/1 queue with starting failure, repair and single vacation. This type of queueing model has a wide range of applications in production/manufacturing systems. Important performance measures and stability conditions are obtained. Further, we discuss some particular cases. Finally, numerical results of the proposed model have been derived

    A cryptographic technique applying Laplace Transform and Exponetial Function

    Get PDF
    Secured Information transformation from one person to another is very much essential in this world of internet. In electronic communications such as system security, smart card, mobile communications etc, the data are stored in the various applications used in them. While using all the applications, we give permission to access all the information. Cryptography is based on transformation of multiple rounds of transformation of messages in the form of plain text as input into encrypted text message. Through suitable mathematical technique, secrecy of the information is maintained. This paper proposes a Laplace and its inverse transform technique with a suitable function for encryption and decryption of a message

    A Cryptographic Algorithm using Fuzzy Logic and Deck of Cards

    Get PDF
    Sharing of information in a secured manner is extremely essential in this world of internet technology. In recent times, many people come across situations wherein their personal data are being hacked by trespassers. These stolen data are used for many malpractices including theft of money. Many researchers involve themselves in finding a better path to overcome this difficulty. Cryptography plays a major role in bringing out a solution to rectify this issue. Mathematics provides a helping hand in most of the cryptographic techniques. It helps to secure data from hackers involved in the robbery of data. Fuzzy logic find its application in many field of research. This paper proposes a cryptographic technique which make use of fuzzy logic together with the help of deck of cards and its membership functional value

    NOVEL CRYPTOGRAPHIC APPROACH BASED ON PDF AND CDF

    Get PDF
    Secret Information sharing is all time requirement in this internet world, especially in Electronic communications such as system security, smart card, mobile communications etc. Cryptography is based on transformation of multiple rounds of transformation of messages in the form of plain text as input into encrypted text message. Through suitable mathematical technique, secrecy of the information is maintained. Many researchers have shown their interest in making use of mathematical techniques in Cryptography. This paper proposes a cryptographic technique using PDF and CDF. In this, plain text message is transformed as cipher text using a single key is used for both encryption and decryption. Using this proposed method, the information is also shared in safe manner and an illustration is done

    A study on fuzzy connectedness and fuzzy continuity in fuzyy topological spaces

    Get PDF
    Fuzzy connectedness and fuzzy continuity are important concepts in the field of fuzzy mathematics, and have been studied in various types of fuzzy spaces. In this review paper, we have explored several recent research articles that investigate these concepts in different types of fuzzy spaces, including intuitionistic fuzzy topological spaces, quasi-metric spaces, generalized metric spaces, generalized fuzzy topological spaces, intuitionistic fuzzy soft metric spaces, fuzzy normed linear spaces, fuzzy quasi-metric spaces, fuzzy metric spaces, and b-metric spaces. The methodology and results of each study vary based on the type of fuzzy space under consideration, but all papers aim to provide a better understanding of the properties and behavior of fuzzy connectedness and fuzzy continuity. Common theme across these articles includes the use of various types of fuzzy functions, fuzzy sets, and the extension of classical concepts to fuzzy spaces. This review paper provides a comprehensive overview of the recent advances in the study of fuzzy connectedness and fuzzy continuity, highlighting similarities and differences among the various types of fuzzy spaces and suggesting directions for future research

    187

    full texts

    237

    metadata records
    Updated in last 30 days.
    Inquiry (E-Journal - Faculty of Business and Administration, International University of Sarajevo) is based in Bosnia & Herzegovina
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇