7 research outputs found

    Cyber Security’s Influence on Modern Society

    Get PDF
    The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet. The purpose of this is to see how much of an importance cyber security has and how cyber-criminals are able to utilize the cyberworld for their own personal gain. Research has been done on how the cyberworld got where it is today. Additionally, individual research has been done in an effort to learn how to hack. A hack lab has been created and a study has been done to see if it is possible to hack into a cell phone within one month without obtaining any knowledge prior to the start of the study

    Multivariate Ewma Models and Monitoring Health Surveillance during a Pandemic

    Get PDF
    We examine a common problem is biological analytics and surveillance in health care. These methods can improve greatly the process of monitoring health data to assess changes in the likelihood of Pandemics and disease incidence in a world where medical knowledge is still largely in an embryonic period. Based on an illustration, we suggest that multivariate exponential moving-average (MEWMA) control charts are suitable in many cases where detection and inspection of several or more variables over a lengthy period of testing provide for the best analysis of data leading to pre-­diagnostic and diagnostic therapy. Though these methods came from the control of quality and continuous improvement in lean manufacturing and service operations, these methods are useful if not a vital application in the analysis of health care and therapeutic data. The indications from this study corroborate earlier findings by others that MEWMA methods fit the diagnostic activity under study. Unfortunately Pandemic Analysis is using oversimplified techniques in analyzing data secure by diagnostic tests which can easily be improved especially in the use modern day analytics based on quality control methods used in other disciplines

    The Multivariate EWMA Model and Health Care Monitoring

    Get PDF
    We introduce the construction of MEWMA (Multivariate exponentially weighted movingaverage) process control in the field of bio surveillance. Such introduction will both improve the reliability of data collected in bio surveillance, better interpretation of the results,improvement in the quality of results and standardization of results when more than two variables are involved. We propose sensitivity ratios as a measure of the effects of the mean shift and dispersion shift in processes under study. Using these sensitivity measures, we designed the optimal exponential weighting factor, which is consistent to results reported in control chart applications. Although ARL (average run length) is the usual measure for control chart performance in multivariate process control, it is by no means the only criterion, however, at the moment it is most widely used criterion for decision making. We suggest addition study of other criteria. For example Medial Run Length, Days to Completion, Direction of Eorrors and others

    The United States Marine Corps Data Collaboration Requirements: Retrieving and Integrating Data From Multiple Databases

    Get PDF
    The goal of this research is to develop an information sharing and database integration model and suggest a framework to fully satisfy the United States Marine Corps collaboration requirements as well as its information sharing and database integration needs. This research is exploratory; it focuses on only one initiative: the IT-21 initiative. The IT-21 initiative dictates The Technology for the United States Navy and Marine Corps, 2000-2035: Becoming a 21st Century Force. The IT-21 initiative states that Navy and Marine Corps information infrastructure will be based largely on commercial systems and services, and the Department of the Navy must ensure that these systems are seamlessly integrated and that information transported over the infrastructure is protected and secure. The Delphi Technique, a qualitative method approach, was used to develop a Holistic Model and to suggest a framework for information sharing and database integration. Data was primarily collected from mid-level to senior information officers, with a focus on Chief Information Officers. In addition, an extensive literature review was conducted to gain insight about known similarities and differences in Strategic Information Management, information sharing strategies, and database integration strategies. It is hoped that the Armed Forces and the Department of Defense will benefit from future development of the information sharing and database integration Holistic Model

    A process control approach to cyber attack detection

    No full text
    corecore