Abstract:
Cyber security breaches are on the rise globally. Due to the introduction of legislation like the EU’s General Data Protection Regulation (GDPR),companies are now subject to further financial penalties if they fail to meet requirements in protecting user information. In 2018, 75% of CEOs and board members considered cyber security and technology acquisitions among... More
Abstract:
Multi-factor Authentication (MFA) often referred to as Two-factor Authentication (2FA), which is a subset of MFA, is the practice of implementing additional security methods on top of a standard username and password to help authenticate the identity of a user and increase the security of data.This chapter will investigate the problem with username and password... More
Abstract: Microprocessors such as those found in PCs and smartphones are complex in their design and nature. In recent years, an increasing number of security vulnerabilities have been found within these microprocessors that can leak sensitive user data and information. This report will investigate microarchitecture vulnerabilities focusing on the Spectre and Meltdown exploits and will look... More
Abstract:
The atmosphere of planet plays a great role in numerous weather phenomena which affects our life directly. To understand these phenomena, it requires knowledge about the relation between temperature and humidity.The effects of temperature on humidity influence the potential for precipitation. It also directly influences the human health and well-being. Relative humidity and dew point... More
Abstract:
The temperature,humidity,atmospheric pressure and altitude are the most important parameters of the environment.If those parameters are known,it will help to select the best crops for specific location which increases the productivity in agricultural field.This is very useful for countries like Nepal where the most of people in this country depends on agriculture.In this research,an Arduino... More
Abstract:
The modern basic building blocks of a control system consist of data acquisition, dispensation of data by the system operators and the remote control of system devices. However, the physical controls, technical examinations and deductions were originally implemented to aid the process and control of power system design. The complexity of the power system keeps increasing due the technical improvements,... More