64 research outputs found

    Threats –Solutions in Cloud security

    Get PDF
    Distributed computing frameworks speak to a standout amongst the most complex processing frameworks as of now in presence. Current uses of Cloud include broad utilization of disseminated frameworks with shifting level of network and use. With a late concentrate on huge scale expansion of Cloud processing, personality administration in Cloud based frameworks is a basic issue for the maintainability of any Cloud-based administration. This zone has additionally gotten extensive consideration from the exploration group and also the IT business. Diverse calculations and methodology are utilized by the specialists. Still distributed computing security is in its center stage. A few IT organizations are concentrating on cloud security and cloud information security. This paper gives a thought regarding security dangers and arrangements

    Cloud Forensic: Issues, Challenges and Solution Models

    Full text link
    Cloud computing is a web-based utility model that is becoming popular every day with the emergence of 4th Industrial Revolution, therefore, cybercrimes that affect web-based systems are also relevant to cloud computing. In order to conduct a forensic investigation into a cyber-attack, it is necessary to identify and locate the source of the attack as soon as possible. Although significant study has been done in this domain on obstacles and its solutions, research on approaches and strategies is still in its development stage. There are barriers at every stage of cloud forensics, therefore, before we can come up with a comprehensive way to deal with these problems, we must first comprehend the cloud technology and its forensics environment. Although there are articles that are linked to cloud forensics, there is not yet a paper that accumulated the contemporary concerns and solutions related to cloud forensic. Throughout this chapter, we have looked at the cloud environment, as well as the threats and attacks that it may be subjected to. We have also looked at the approaches that cloud forensics may take, as well as the various frameworks and the practical challenges and limitations they may face when dealing with cloud forensic investigations.Comment: 23 pages; 6 figures; 4 tables. Book chapter of the book titled "A Practical Guide on Security and Privacy in Cyber Physical Systems Foundations, Applications and Limitations", World Scientific Series in Digital Forensics and Cybersecurit

    The Echo: February 9, 2018

    Get PDF
    Local hikers’ dreams come true – A new way to dine – New community hours in place for next semester – More than petty cache – Bree’s Beat International News – Leaders in love – Civil Rights trip makes national history – Questions missionary kids want to ignore – CrossFit builds body of Christ – Celebrating female friendship – Valentine’s Day Bachelor and Bachelorette – Food Spotlight – Echograms #TaylorU -- #TaylorU’s Top Tweets – Looking at the end through artwork – A&E Events – Glimpsing into the past in ‘The Post’ – Searching for healing and forgiveness in the ‘Land of Silence’ – Our View – ‘Power to the Polls’ focuses on intersectionality – Do our dorms do their job? – The word we are all afraid to say – Robinson makes it rain on Cougars – Weekly Preview – Trojans roll over Cougars with ease – Track and field is showing off their talent – Athletes of the Weekhttps://pillars.taylor.edu/echo-2017-2018/1016/thumbnail.jp

    The History of the Future: A Creative 26th Century Article on the 2016 Presidential Election

    Get PDF
    As technology has grown in recent decades, many fields of study have been affected. This thesis will consider how technology might continue to impact the field of the historian and what historical research and writing might look like in the distant future. This project will attempt to demonstrate the potential sources of a future historian, how those sources might have been stored, how historians might interpret those sources, and what historical writing itself might look like. This thesis will demonstrate these aspects in a creative manner in the form of a future historical scholarly article from the 26th century looking back and analyzing the 2016 U.S. Presidential Election. In this article the future historian will examine how Social Media played a role in the election of Donald Trump, considering Russian interference and Trump’s own use of Twitter. This project also includes a rationale where the research of Thesis and decisions regarding the creative articles are explained. The rationale discusses how electronic sources, specifically Social Media, might be used by future historians and how those sources might be stored digitally by examining the current preservation of Social Media, the Internet Archive, and trends in current archives. The rationale also considers how the historical viewpoints of Empiricism and Postmodernism will be used in the future

    Predictive Modeling of Fuel Efficiency of Trucks

    Get PDF
    This research studied the behavior of several controllable variables that affect the fuel efficiency of trucks. Re-routing is the process of modifying the parameters of the routes for a set of trips to optimize fuel consumption and also to increase customer satisfaction through efficient deliveries. This is an important process undertaken by a food distribution company to modify the trips to adapt to the immediate necessities. A predictive model was developed to calculate the change in Miles per Gallon (MPG) whenever a re-route is performed on a region of a particular distribution area. The data that was used, was from the Dallas center which is one of the distribution centers owned by the company. A consistent model that could provide relatively accurate predictions across five distribution centers had to be developed. It was found that the model built using the data from the Corporate center was the most consistent one. The timeline of the data used to build the model was from May 2013 through December 2013. The predictive model provided predictions of which about 88% of the data that was used, was within the 0-10% error group. This was an improvement on the lesser 43% obtained for the linear regression and K-means clustering models. The model was also validated on the data for January 2014 through the first two weeks of March 2014 and it provided predictions of which about 81% of the data was within the 0-10 % error group. The average overall error was around 10%, which was the least for the approaches explored in this research. Weight, stop count and stop time were identified as the most significant factors which influence the fuel efficiency of the trucks. Further, neural network architecture was built to improve the predictions of the MPG. The model can be used to predict the average change in MPG for a set of trips whenever a re-route is performed. Since the aim of re-routing is to reduce the miles and trips; extra load will be added to the remaining trips. Although, the MPG would decrease because of this extra load, it would be offset by the savings due to the drop in miles and trips. The net savings in the fuel can now be translated into the amount of money saved

    Refinement of Stellar Intensity Interferometry at VERITAS

    Get PDF
    This paper will present a number of analyses done with Stellar Intensity Interferometry (SII) data from the VERITAS Observatory. We will demonstrate the similarity between correlations generated using two different methods which are found to be highly consistent with one another. Then, we will discuss how we model and remove extraneous noise frequencies that disrupt VERITAS SII data. Furthermore, we will investigate the ADC Requirements needed to perform intensity interferometry. Finally, we will present a limb-darkened uniform disk angular diameter of β\beta UMa which we find to be 1.06 ±\pm 0.04 ±\pm 0.05 mas.No embargoAcademic Major: Physic

    Federal Regulation of Emerging Technologies and Its Implications for Transhumanist Applications of NBIC Technologies

    Get PDF
    This paper attempts to chart potential courses for federal regulation of emerging technologies in the United States, and its near-future implications for the development and proliferation of NBIC technologies in a transhumanist context. Drawing on significant regulatory actions by the FDA and FCC throughout the twentieth century, relevant historical regulatory trends are identified and extrapolated broadly across the next two to three decades. The importance of the NBIC paradigm is discussed in detail, alongside several examples of both current and potential NBIC technologies with transhumanist applications. It ultimately concludes that, in spite of recent congressional dysfunctions and lack of political will, the groundwork that has already been laid by major federal regulatory agencies well in advance of the wide commercialization of NBIC products is a promising sign for the eventual establishment of responsible and flexible regulatory schema for NBIC technologies
    corecore