Computer and Information Science
Latest Publications


TOTAL DOCUMENTS

887
(FIVE YEARS 118)

H-INDEX

14
(FIVE YEARS 1)

Published By Canadian Center Of Science And Education

1913-8997, 1913-8989

2021 ◽  
Vol 15 (1) ◽  
pp. 32
Author(s):  
Yanshuo Wang

This paper explores the COVID19 transmission pattern and circulation dynamics in the Euclidean space at the lower peninsula of Michigan by using the divergence and curl concept in vector field. The COVID19 transmission volume flux can be calculated for each county by using vector divergence. The results shows Wayne county had the highest divergence (162660), the Kent county had the second highest divergence (152540), and the Saginaw county had the third highest divergence (103240), the divergence is positive which means the COVID19 virus was transmitted from these counties to other places. The results also shows Monroe county had the lowest divergence (-187843), the Allegan county had the second lowest number in divergence (-90824), the divergence is negative which means the COVID19 virus was transmitted from other places to these counties. The circulation of the virus is also calculated by using vector curl. The positive curl means that the virus has circulated in a counter-clockwise direction, and the negative curl means the virus has circulated in a clockwise direction. The divergence is an operator of the COVID19 transmission vector field, which produces a scalar field giving the quantity of the transmission vector field’s source at each location. The COVID19 spreading volume density of the outward flux of transmission field is represented by divergence around a given location. The curl is an operator of the COVID19 transmission field, which describes the circulation of a transmission vector field. The curl at a location in COVID19 transmission field is represented by a vector whose length and direction denote the magnitude and axis of the maximum circulation. The curl of a transmission field is formally defined as the circulation density at each location of COVID19 transmission field.


2021 ◽  
Vol 15 (1) ◽  
pp. 20
Author(s):  
Robert Karamagi

Phishing has become the most convenient technique that hackers use nowadays to gain access to protected systems. This is because cybersecurity has evolved and low-cost systems with the least security investments will need quite advanced and sophisticated mechanisms to be able to penetrate technically. Systems currently are equipped with at least some level of security, imposed by security firms with a very high level of expertise in managing the common and well-known attacks. This decreases the possible technical attack surface. Nation-states or advanced persistent threats (APTs), organized crime, and black hats possess the finance and skills to penetrate many different systems. However, they are always in need of the most available computing resources, such as central processing unit (CPU) and random-access memory (RAM), so they normally hack and hook computers into a botnet. This may allow them to perform dangerous distributed denial of service (DDoS) attacks and perform brute force cracking algorithms, which are highly CPU intensive. They may also use the zombie or drone systems they have hacked to hide their location on the net and gain anonymity by bouncing off around them many times a minute. Phishing allows them to gain their stretch of compromised systems to increase their power. For a normal hacker without the money to invest in sophisticated techniques, exploiting the human factor, which is the weakest link to security, comes in handy. The possibility of successfully manipulating the human into releasing the security that they set up makes the life of the hacker very easy, because they do not have to try to break into the system with force, rather the owner will just open the door for them. The objective of the research is to review factors that enhance phishing and improve the probability of its success. We have discovered that hackers rely on triggering the emotional effects of their victims through their phishing attacks. We have applied the use of artificial intelligence to be able to detect the emotion associated with a phrase or sentence. Our model had a good accuracy which could be improved with the use of a larger dataset with more emotional sentiments for various phrases and sentences. Our technique may be used to check for emotional manipulation in suspicious emails to improve the confidence interval of suspected phishing emails.


2021 ◽  
Vol 15 (1) ◽  
pp. 13
Author(s):  
Qing Li

An approximate calculation of the spatial characteristics on finite range is required, so one quantitative continuum represents the accumulation of infinite great quantities is artificially divided it into smaller and camparable parts in which calculus operation can be applied .This operation is defined as Theorem 1 in which infinity is not involved, there is a camparable finity is constantly (forever) approaching and not reaching infinity, and only staying within a finite range. Theorem 1 can exist in this paper as a new mathematical basis for physics. Because the essence of all physical quantities is size comparison, and the size comparison relation of matter can only be space/time, so relation formula space/time is the only expression of the concept of matter, all physical quantities are applicable to this expression, each different physical quantity is a multi-dimensional representation of this expression. A new mass energy formula is aslo derived from this paper.


2021 ◽  
Vol 15 (1) ◽  
pp. 1
Author(s):  
Sobitha Samaranayake ◽  
Athula D. A. Gunawardena ◽  
Robert Meyer

Choosing a major can be a difficult choice for undeclared students, depending on personal interests, job markets, program costs, and the complexity of graduation requirements. The current procedure for exploring possible majors/minors involves a tedious and time-consuming exploration of static data presented in a convoluted format. This work considers the complexity of degree requirements and presents the design and implementation of an efficient decision support system (DSS) for exploring majors and/or minors. The DSS presents a tool that enables college students to map their already completed courses to degree requirements and then view the majors/minors that yield the shortest path for graduation. Secondly, the DSS system provides data visualization tools to assist students in selecting courses that satisfy the remaining requirements of a selected major/minor.


2021 ◽  
Vol 14 (4) ◽  
pp. 65
Author(s):  
Jiacheng Huang

The relationship between complexity and various factors is explored through the simulation of the three neighbor ways of the game of life. It mainly discusses the state evolution process of cell populations under various evolutionary laws, various environmental scales and various initial states. Based on the discovery of a novel, long-lived and simple cell with an initial state, the periodic and stable cell morphology in Game of Life is introduced, thus reflecting the related complexity factors and changes. By simulating various environmental boundaries and comparing the steady-state graphs, it is concluded that a closed system will cause certain limitations in the final outcome. The limited environment will prevent the cell from expanding outward, but it can also create more periodic patterns. A limited environment is simultaneously an important factor in simplifying the system. In addition to the environment, the edge of chaos is also an important factor in the complexity of the system. An appropriate evolution rule can help the entire system find a balance in the chaos and present stable and interesting patterns. In addition, the correct neighbor method has a positive effect on the change of the cell. Finally, an infinite loop mode is set up to illustrate once again the wonder and complexity of Game of Life.


2021 ◽  
Vol 14 (4) ◽  
pp. 57
Author(s):  
Paras Gulati ◽  
Abiodun Adeyinka. O. ◽  
Saritha Ramkumar

The rapid spread of online fake news through some media platforms has increased over the last decade. Misinformation and disinformation of any kind is extensively propagated through social media platforms, some of the popular ones are Facebook and Twitter. With the present global pandemic ravaging the world and killing hundreds of thousands, getting fake news from these social media platforms can exacerbate the situation. Unfortunately, there has been a lot of misinformation and disinformation on COVID-19 virus implications of which has been disastrous for various people, countries, and economies. The right information is crucial in the fight against this pandemic and, in this age of data explosion, where TBs of data is generated every minute, near real time identification and tagging of misinformation is quintessential to minimize its consequences. In this paper, the authors use Natural Language Processing (NLP) based two-step approach to classify a tweet to be a potentially misinforming one or not. Firstly, COVID -19 tagged tweets were filtered based on the presence of keywords formulated from the list of common misinformation spread around the virus. Secondly, a deep neural network (RNN) trained on openly available real and fake news dataset was used to predict if the keyword filtered tweets were factual or misinformed.


2021 ◽  
Vol 14 (4) ◽  
pp. 47
Author(s):  
Liujue Zhang

We can use java language to design the game of chess on eclipse platform and design a new rule for it : “Six in a Row”, this game is more complex than Five-in-a-Row,and we can add a function of Man-Machine Battle in the program.This paper which based on the practical programming experience introduce the algorithm of the above game. The basic mentality of the algorithm is creating a scoring table and all points of the chessboard are scored by using ergodic method.Finally, the machine will placing the chess in the point which have the highest score.This algorithm is clearly operable, and the machine has a high rate of winning when play with human.


2021 ◽  
Vol 14 (4) ◽  
pp. 36
Author(s):  
Eian Prinsen ◽  
Damian Schofield

Video games, and especially roleplaying games offer a way for players to escape stress and cope with stressors. Video games are a new, and potentially unique, mechanism for telling stories. They allow a player to not only interact with a world, but to fully immerse themselves in a digital world. Being able to quite literally escape to a fantasy world where your actions matter, and you’re given control can be a great form of self-therapy for players. This study aims to examine the results of a global pandemic and quarantine on player motivations and the reasons they play video games. The study collected detailed information on the video games genres and play time of each user and how it has been affected during self-isolation. Participants were also asked a series of questions that required them to evaluate their gaming habits both prior to and during the pandemic. This information was analysed to attempt to further understand players choices, in particular during a pandemic where there is an increased need to alleviate stress and experience a sense of escapism.


2021 ◽  
Vol 14 (4) ◽  
pp. 32
Author(s):  
Rasha Al-Mahrouqi ◽  
Khalsa Al Siyabi ◽  
Amani Al Nabhani ◽  
Salma Al-Hashemi ◽  
Shoukath Ali Muhammed

Consumers shifted their spending to the web due to the coronavirus (Covid-19) outbreak. Businesses and organizations that once mapped digital strategy with careful planning over a transition period, now forced to scale their initiatives in a matter of days. In this regard, we are motivated by the need to develop a scalable, highly available, resilient, secure, and cost-effective e-commerce web application for demonstrating how cloud services can be leveraged for implementing such applications. This paper is a part of the aforementioned web application development project, titled “A cloud-based e-commerce storefront prototype for SMEs in Oman”. In this paper, we discuss the system considerations, components of implementation, and the schematic design of the proposed software solution. This paper provides meaningful guidelines for companies that want to adopt cloud-based E-commerce web application to bring their products and services online without much upfront cost or initial investment.


2021 ◽  
Vol 14 (4) ◽  
pp. 20
Author(s):  
Mahmoud Ali Al Shugran

A Vehicular Ad hoc Network (VANET) is a distinctive situation of wireless ad hoc networks. The designing of the routing protocol considers a critical role in communication in VANET. VANET has specific features compared to other types of wireless ad hoc networks that impose special characteristics for designing of efficient routing protocols.The challenging factor in designing efficient routing protocols for VANET is the high movement of vehicles that incurs a rapid change in the network topology that causes frequent link breakage. This paper presents and evaluates different position-based routing protocols associated with VANETs. The evaluation aiming to determine appropriate specifications for optimal routing protocols’ features achieving best performance within different environmental conditions. The performance comparison is carried out in terms of Packet Delivery Rate (PDR), Void Problem Occurrence Rate (VPOR), and Average Hops Count (AHC).


Sign in / Sign up

Export Citation Format

Share Document