Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 40681 - 40710 of 302474

Full-Text Articles in Physical Sciences and Mathematics

Retaining Competitive Advantage In Ship Recycling Under The New Regulatory Framework: A Case Study Of Bangladesh, Wahidul Sheikh Oct 2021

Retaining Competitive Advantage In Ship Recycling Under The New Regulatory Framework: A Case Study Of Bangladesh, Wahidul Sheikh

World Maritime University Dissertations

No abstract provided.


Fuel Oil Bunkering Mechanism And Ways Ahead In Strategic Enforcement, Sudhir Kumar Shrivastava Oct 2021

Fuel Oil Bunkering Mechanism And Ways Ahead In Strategic Enforcement, Sudhir Kumar Shrivastava

World Maritime University Dissertations

No abstract provided.


The Implementation Of The Ballast Water Management Convention In Timor-Leste, Domingos Ximenes Nunes Oct 2021

The Implementation Of The Ballast Water Management Convention In Timor-Leste, Domingos Ximenes Nunes

World Maritime University Dissertations

No abstract provided.


Examining The Island States Process Of Planning, Preparedness, And Response To The Oil Spills Using A Case Study Of The Mv Wakashio Oil Spill, Ishara Gihan Dharmasiri Oct 2021

Examining The Island States Process Of Planning, Preparedness, And Response To The Oil Spills Using A Case Study Of The Mv Wakashio Oil Spill, Ishara Gihan Dharmasiri

World Maritime University Dissertations

No abstract provided.


The Impact Of Waste-To-Energy Sustainability Projects In Port On Society: A Case Study In Copenhagen-Malmö Port (Cmp), Dumisa Kevin January Oct 2021

The Impact Of Waste-To-Energy Sustainability Projects In Port On Society: A Case Study In Copenhagen-Malmö Port (Cmp), Dumisa Kevin January

World Maritime University Dissertations

No abstract provided.


A Scenario-Based Analysis Of The Domestic Law Of Argentina In The Context Of The Nairobi Wreck Removal Convention, Laura Noelia Sanchez Oct 2021

A Scenario-Based Analysis Of The Domestic Law Of Argentina In The Context Of The Nairobi Wreck Removal Convention, Laura Noelia Sanchez

World Maritime University Dissertations

No abstract provided.


Maritime Cybersecurity: Comparing Practices Between Developing Countries : The Case Study Of Kenya And Spain, Bibian Turyahumura Oct 2021

Maritime Cybersecurity: Comparing Practices Between Developing Countries : The Case Study Of Kenya And Spain, Bibian Turyahumura

World Maritime University Dissertations

No abstract provided.


An Assessment Of The Awaraness Level Of Coastal And Upland Communities In Nigeria On The Impacts Of Marine Litter On The Ocean And Its Ecosystem Services., Yakubu Abubakar Oct 2021

An Assessment Of The Awaraness Level Of Coastal And Upland Communities In Nigeria On The Impacts Of Marine Litter On The Ocean And Its Ecosystem Services., Yakubu Abubakar

World Maritime University Dissertations

No abstract provided.


Assessing The Effectiveness Of Community Action On Marine And Coastal Litter: Case Study Through The Prism Of Social Media Groups In A Maltese Locality (Mellieha), Tessy Umbuwa Anjide Oct 2021

Assessing The Effectiveness Of Community Action On Marine And Coastal Litter: Case Study Through The Prism Of Social Media Groups In A Maltese Locality (Mellieha), Tessy Umbuwa Anjide

World Maritime University Dissertations

No abstract provided.


Analysis Of Marine Plastic Litter Policies In Ghana, Perfect Ashai Oct 2021

Analysis Of Marine Plastic Litter Policies In Ghana, Perfect Ashai

World Maritime University Dissertations

No abstract provided.


Natural Resource Damage Assessment For Oil Spills In Sri Lanka: The Application Of Habitat Equivalency Analysis, Sayakkara Mesthrilage Dinishiya Athukorala Oct 2021

Natural Resource Damage Assessment For Oil Spills In Sri Lanka: The Application Of Habitat Equivalency Analysis, Sayakkara Mesthrilage Dinishiya Athukorala

World Maritime University Dissertations

No abstract provided.


A Multiple Case Study Of Meti Cybersecurity Education And Training: A Basis For The Development Of A Guiding Framework For Educational Approaches, Jeric Bacasdoon Oct 2021

A Multiple Case Study Of Meti Cybersecurity Education And Training: A Basis For The Development Of A Guiding Framework For Educational Approaches, Jeric Bacasdoon

World Maritime University Dissertations

No abstract provided.


Blue Carbon Marine Habitats In Nigeria: Ecosystem Services, Threats And Implication For Ecosystem Based Management, Oluremi Taiwo Filani Oct 2021

Blue Carbon Marine Habitats In Nigeria: Ecosystem Services, Threats And Implication For Ecosystem Based Management, Oluremi Taiwo Filani

World Maritime University Dissertations

No abstract provided.


Challenges/Issues Of Implementing Marpol Annex Vi In Papua New Guinea: An Assessment From The Regulator's Point Of View With Recommendations For National Implementation., Sammy Kalepo Oct 2021

Challenges/Issues Of Implementing Marpol Annex Vi In Papua New Guinea: An Assessment From The Regulator's Point Of View With Recommendations For National Implementation., Sammy Kalepo

World Maritime University Dissertations

No abstract provided.


A Study Of Accession And Implementation Of The 2004 Bwm Convention In Vietnam: Challenges And Sollutions., Quy Thanh La Oct 2021

A Study Of Accession And Implementation Of The 2004 Bwm Convention In Vietnam: Challenges And Sollutions., Quy Thanh La

World Maritime University Dissertations

No abstract provided.


Challenges And Potential For Egyptian Oil Spill Contingency Plan: A Comparative Study For Improving Oil Spill Preparedness : Case Study Gulf Of Suez And North Sea, Ahmed Raafat Reiad Nasreldin Oct 2021

Challenges And Potential For Egyptian Oil Spill Contingency Plan: A Comparative Study For Improving Oil Spill Preparedness : Case Study Gulf Of Suez And North Sea, Ahmed Raafat Reiad Nasreldin

World Maritime University Dissertations

No abstract provided.


Port Throughput Forecasting Using Arima And Ols Regression: Case Study : Gwangyang Port In Korea, Shin Park Oct 2021

Port Throughput Forecasting Using Arima And Ols Regression: Case Study : Gwangyang Port In Korea, Shin Park

World Maritime University Dissertations

No abstract provided.


Digitalization In Ship Management And Operations: Use Of Digital Twin Technology To Monitor Marine Fouling, Walid Mohamed Ali Awadh Timimi Oct 2021

Digitalization In Ship Management And Operations: Use Of Digital Twin Technology To Monitor Marine Fouling, Walid Mohamed Ali Awadh Timimi

World Maritime University Dissertations

No abstract provided.


Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan Oct 2021

Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan

KSU Proceedings on Cybersecurity Education, Research and Practice

The constant rise of cyber-attacks poses an increasing demand for more qualified people with cybersecurity knowledge. Games have emerged as a well-fitted technology to engage users in learning processes. In this paper, we analyze the emotional parameters of people while learning cybersecurity through computer games. The data are gathered using a non-invasive Brain-Computer Interface (BCI) to study the signals directly from the users’ brains. We analyze six performance metrics (engagement, focus, excitement, stress, relaxation, and interest) of 12 users while playing computer games to measure the effectiveness of the games to attract the attention of the participants. Results show participants …


Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz Oct 2021

Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Students in multiple cohorts of our 3000 level Fundamentals of Information Systems Security course were given a discussion question where they had to either agree or disagree with the premise that given all the constant threats to our systems, we should dedicate more of our efforts to quickly repairing the damage of an attack rather than dedicate more of our time and energies to preventing such attacks. They were required to give their reasoning and provide sources to back up their analysis of his comment.

This paper will describe and explain the concept of cyber resiliency. It will then evaluate …


Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne Oct 2021

Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …


Incidence Matrix And Some Of Its Applications In Graph Theory, Hizer Leka, Faton Kabashi Oct 2021

Incidence Matrix And Some Of Its Applications In Graph Theory, Hizer Leka, Faton Kabashi

UBT International Conference

In this paper we will focus mainly on some basic concepts and definitions regarding incidence matrices and some examples of their application in graph theory. To give their clearest definition of the incidence matrix, we will first give the meaning of the incidence structure, then through it to define the incidence matrix. The structure of incidence is called the ordered triplet S=(P,B,I), where P∩B=ϕ, I⊆P×B and P,B while, are two non-empty sets and I a relation in between them, such that I⊂P×B. We call the elements of P community dots and we will mark them in lower case letters of, …


Internet Of Things In Healthcare: A Review, Faton Kabashi, Lamir Shkurti, Hizer Leka, Vehbi Sofiu, Nazmi Misini Oct 2021

Internet Of Things In Healthcare: A Review, Faton Kabashi, Lamir Shkurti, Hizer Leka, Vehbi Sofiu, Nazmi Misini

UBT International Conference

In the current era, there is a requirement of a system with connected devices, persons, time, places, and networks, which is completely incorporated in what is called as Internet of Things (IoT). IoT is developed toward making the objects smart and connectable using recent development in miniaturizing and communication technologies. IoT can change the way human being live their life by making it their more convenient and smart. IoT has wide application domains one of them is healthcare. Healthcare is one of the application domains in IoT that draws enormous interest from industry, the research community, and the public sector. …


Importance Of Cryptography In The Government, Gazmend Krasniqi, Agnesa Pefqeli Oct 2021

Importance Of Cryptography In The Government, Gazmend Krasniqi, Agnesa Pefqeli

UBT International Conference

This paper first of all reflects the need for encryption and then the importance it has managed to accumulate over thousands of years of use. Various factors, mainly of a purpose; being powerful, have influenced the rapid development and stressed the importance of encryption in governing bodies.

Depending on in which part of the world it is used and for what reasons it is developed, the importance of cryptography in different governments has shifted to the more powerful states.

Governments have encountered conflicts due to the popularization of encryption, where users of encryption belonging to the non-governmental communities have declined …


The Impact Of Geogebra On Learning The Concept Of Quadratic Function, Nazmi Misini, Faton Kabashi Oct 2021

The Impact Of Geogebra On Learning The Concept Of Quadratic Function, Nazmi Misini, Faton Kabashi

UBT International Conference

There are many software programs used in math, but we have noticed that the Geogebra program is more equipped for our groups of different ages, it is useful for elementary math teachers and even in bachelor's undergraduate teaching. It is useful for students to teach math at each school level, it's fun and fun using GeoGebra - thus encouraging students to deepen more and more in math. The purpose of this quasi-experimental research is to show how GeoGebra can be used to learn the concept of quadratic function within the subject of mathematics at the high school level. Research will …


Blockchain Invoicing For Government Services, Vehbi Neziri, Ramadan Dervishi, Blerim Rexha Oct 2021

Blockchain Invoicing For Government Services, Vehbi Neziri, Ramadan Dervishi, Blerim Rexha

UBT International Conference

Blockchain technology is known primarily through the cryptocurrency bitcoin, but has begun to find application in other areas for both public and private services, including, but not limited to, payments, electronic voting, health, government services etc. Blockchain technology potential relay on its capability to store all transactions records and makes them available to all parties with permission to view, but no one can make unauthorized changes to them. Many government service providers have to bill the government for the services they provide, but non-standardized and unverified manual or electronic invoicing often leads to double invoicing or payment. As a result …


Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar Oct 2021

Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity involves a broad range of techniques, including cyber-physical, managerial, and technical, while authentication provides a layer of protection for Information Systems (IS) against data breaches. The recent COVID-19 pandemic brought a tsunami of data breach incidents worldwide. Authentication serves as a mechanism for IS against unauthorized access utilizing various defense techniques, with the most popular and frequently used technique being passwords. However, the dramatic increase of user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure high level of IS security; this leaves the end-users holding a critical role in protecting their …


Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim Oct 2021

Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim

KSU Proceedings on Cybersecurity Education, Research and Practice

Robots are widely used in our day-to-day life in various domains. For example, eldercare robots, such as CareO-Bots [1]are used to perform household tasks and provide mobility assistance [2]. Amazon uses manufacturing robots to accomplish manufacturing labor activities, such as welding and assembling equipment [2]. According to the International Data Corporation, spending on robotics is expected to reach USD 241.4 billion by the end of 2023 [4].

However, malicious users can exploit security vulnerabilities in hardware and software components of robotics systems to conduct security attacks and cause malfunction, i.e., deviate robots from their expected behaviors. Security attacks on robots …


Chatbot In Banks Of Kosovo And Albania, Festinë Retkoceri, Festim Halili Oct 2021

Chatbot In Banks Of Kosovo And Albania, Festinë Retkoceri, Festim Halili

UBT International Conference

Not so long ago Artificial Intelligence was only in the realm of scientific fiction. Today, it has become a reality and is growing every day more prominent in many different industries. Chatbots enable machines to mimic human conversation. This paper is an attempt to study the use of artificial intelligence and natural language processing in Albanian banks and Kosovo banks regarding the use of Albanian-speaking Chatbots and how to become a more intelligent chatbot. The data is collected from sources that are in the public domain, such as banking websites.


One-Time Pad Cipher (Otp) Use Cases And Simulation Examples For Electronic Financial Transactions, Ana Savic, Goran Bjelobaba, Nikola Popović, Hana Stefanovic Oct 2021

One-Time Pad Cipher (Otp) Use Cases And Simulation Examples For Electronic Financial Transactions, Ana Savic, Goran Bjelobaba, Nikola Popović, Hana Stefanovic

UBT International Conference

Network This paper presents some applications of One-Time pad (OTP) cipher in business communications and processing the electronic financial transactions. Several simulation models created in the CrypTool, making a mention of the misuse and weaknesses if the same OTP key is used several times, are also given. Some examples of processing an electronic financial transaction through the application of the OTP are proposed.