1,253 research outputs found

    20th SC@RUG 2023 proceedings 2022-2023

    Get PDF

    20th SC@RUG 2023 proceedings 2022-2023

    Get PDF

    Intergenerational Discipleship at St. Paul\u27s Smoke Church

    Get PDF
    Intergenerational ministry through discipleship is found in the archetype of Christ and His disciples. St. Paul’s Smoke Church in Windsor Township, Pennsylvania, has impacted and influenced the area through many centuries in the generational call to follow Christ. The church has seen its ebbs and flows. In the past decade, membership has tremendously decreased, but the heart of love for God and its community is lasting. The pandemic of COVID-19 had limited ministry in the traditional sense. Still, the unorthodox ways of ministry were sought out and employed to continue St. Paul’s Smoke Church in its operation and functionality while hoping for growth. Sunday service was the strong anchor while prayer, encouragement, and practical solutions were the substance of ministry. Research methods include observation, first-hand knowledge, demographic data, interviews, surveys, and a Bible study on discipleship. The study shows that intergenerational ministry in love toward one another cannot be stopped by rules and regulations and in fact, causes many to walk closer with the Lord. The project does open a door to many other subtopics of research including successes, showing what worked, and failures, showing what was not working, in ministry during the pandemic. Further research should branch into church preparedness and prevention for the future existence of the church in power and authority outreaching with love into the world

    Passive Electric Field Sensing for Ubiquitous and Environmental Perception

    Get PDF
    Electric Field Sensing plays an important role in the research branches of Environmental Perception as well as in Ubiquitous Computing. Environmental Perception aims to collect data of the surroundings, while Ubiquitous Computing has the objective of making computing available at any time. This includes the integration of sensors to perceive environmental influences in an unobtrusive way. Electric Field Sensing, also referenced as Capacitive Sensing, is an often used sensing modality in these research fields, for example, to detect the presence of persons or to locate touches and interactions on user interfaces. Electric Field Sensing has a number of advantages over other technologies, such as the fact that Capacitive Sensing does not require direct line-of-sight contact with the object being sensed and that the sensing system can be compact in design. These advantages facilitate high integrability and allow the collection of data as required in Environmental Perception, as well as the invisible incorporation into a user's environment, needed in Ubiquitous Computing. However, disadvantages are often attributed to Capacitive Sensing principles, such as a low sensing range of only a few centimeters and the generation of electric fields, which wastes energy and has several more problems concerning the implementation. As shown in this thesis, this only affects a subset of this sensing technology, namely the subcategory of active capacitive measurements. Therefore, this thesis focuses on the mainly open area of Passive Electric Field Sensing in the context of Ubiquitous Computing and Environmental Perception, as active Capacitive Sensing is an open research field which already gains a lot of attention. The thesis is divided into three main research questions. First, I address the question of whether and how Passive Electric Field Sensing can be made available in a cost-effective and simple manner. To this end, I present various techniques for reducing installation costs and simplifying the handling of these sensor systems. After the question of low-cost applicability, I examine for which applications passive electric field sensor technology is suitable at all. Therefore I present several fields of application where Passive Electric Field Sensing data can be collected. Taking into account the possible fields of application, this work is finally dedicated to the optimization of Passive Electric Field Sensing in these cases of application. For this purpose, different, already known signal processing methods are investigated for their application for Passive Electric Field sensor data. Furthermore, besides these software optimizations, hardware optimizations for the improved use of the technology are presented

    Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation

    Get PDF
    The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics

    Advancing security in IoT-driven critical infrastructure: a focus on smart transportation system.

    Get PDF
    As new technological platforms such as the Internet of Things (IoT), blockchain, Artificial Intelligence (AI) and Machine Learning (ML) are gradually emerging and being integrated into critical infrastructures which are subjected to digital attacks. i.e., the critical systems are vulnerable to new cybersecurity threatsand thus requires corresponding security approach to challenge the threats.It is therefore imperative to identify the various types of possible cyber-attacks on the systems and develop a security framework to manage the associated security risks. IoT-based critical infrastructure systemslike smart healthcare, smart transportation and smart manufacturing are prone to attacks such as Denial of Service (DoS) attacks, brute-force attacks, Man-in-the-Middle attacks (MiTM), Stuxnet computer virus etc. This paper focuses on a detailed study of the smart transportation system and its security issues; various threat vectors used by the attackers are examinedalongsidecorresponding countermeasures. Additionally,an in-depth analysis on how an identified malicious attack on smart transportationcould be achieved was carried out by using an open-source vehicular network tool called Vehicle in Network Simulation (Veins). A detailed evaluation of the impact of MiTM attack was then carried out based on the evaluation metrics. Results from the simulation results indicate that attacks on the built STSthesis vehicular network have a higher influence on the network. Also, although the STSthesis was a basic network that was run with considerable node, limited time and injected malicious node, the impact of the MiTM attack was still visible. Furthermore, implementing the elliptic-curve Diffie-Hellman (ECDH) with the Advanced Encryption Standard (AES) in the early stage of design and implementation will prevent the MiTM attacks from intercepting messages between legitimate nodes
    • …
    corecore