Abstract-This paper revisits malicious object propagation in networks using epidemic theory in such a manner that it proposes the (Pre-quarantining) of nodes in networks. This is a concept that is known by experience to be a standard disease control procedure that involves screening and quarantining of immigrants to a population. As preliminary investigation we propose the Q-SEIRS model and the more advanced Q-SEIRS-V model for malicious objects' spread in networks. This Pre-quarantine concept addresses and implements the "assume guilty till proven innocent" slogan of the cyber world by providing a mechanism for pre-screening, isolation and treatment for incoming infected nodes. The treated nodes from the pre-quarantine compartment are sent to the recovered compartment while the free nodes join the network population. The paper also derived the reproduction number, equilibria, as well as local stability of the proposed model. Numerical methods are employed to solve the system of equations and MATLAB is used to simulate the system so as to visualize the dynamical behavior of the models. It is seen that pre-screening/prequarantining improves the recovery rate in relative terms.
Many nations of the world are employing the use of big data in e making. However, in Nigeria, data centralized framework that can integrate different silo data centers for insightful and evidence based governance. The paper proposes a big data governance operations. The framework was designed in the Nigerian context using big dat mechanisms. It was tested with an experiment that performed a sentiment analysis to uncover the opinion of the masses on selected agencies in order to help policy making. This was done with datasets collected from the social media handles of two (2) gove police force and the Nigerian army. The results uncovered the actual opinions of the populace concerning both agencies as it regards national security. The framework promises a host of benefits such as centralized data entry integration and collaboration of government operations and an easy application of open data policy. The paper concludes with four (4) recommendations which the government of any developing nation can imbibe for results to citizens and businesses.
Abstract-Now, it is unarguable that cyber threats arising from malicious codes such as worms possesses the ability to cause losses, damages and disruptions to industries that utilize ICT infrastructure for meaningful daily work. More so for wireless sensor networks (WSN) which thrive on open air communications. As a result epidemic models are used to study propagation patterns of these malicious codes, although they favor horizontal transmissions. Specifically, the literature dealing with the analysis of worms that are both vertically and horizontally (transmitted) is not extensive. Therefore, we propose the Vulnerable-Latent-Breaking OutTemporarily Immune-Inoculation (VLBTV-I) epidemic model to investigate both horizontal and vertical worm transmission in wireless sensor networks. We derived the solutions of the equilibriums as well as the epidemic threshold for two topological expressions (gleaned from literature). Furthermore, we employed the Runge-KuttaFehlberg order 4 and 5 method to solve, simulate and validate our proposed models. Critically, we analyzed the impact of both vertical and horizontal transmissions on the latent and breaking out compartments using several simulations experiments.
This paper establishes that: a formally instituted and consistently applied attendance management system significantly reduces absence levels. It further establishes that: the effectiveness of an attendance management system depends largely on the monitoring, recording, measuring, and reporting of attendance statistics. The paper then affirms that: computer based technologies will be suitable for implementing such systems, since they possess the capacity for effectively performing the listed tasks, as well as producing information for making prompt, informed, and consistent decisions across organisational units. However, the paper discovers that generalizable standards for building these systems are lacking in the literature, due to the obscuring of the internal logic of the existing systems, which are also strategically organisation-centric. The paper therefore, emphasises the need to shift from organisation-centric to process-centric (inter-organisational) approaches. Consequently, it introduces a set of systematic drivers (algorithms, flowcharts, structure chart, and mathematical models), for building new systems, rather than discussing the features of a black-box oriented system that may not have complied adequately with the software engineering best practices. This paper is thus, providing opportunities for broader scientific evaluations, development of sound evidence-based guidelines, and rational framework for ongoing modification and refinement in the future. It will therefore, lead to the implementation of
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.