Welcome to IgMin Research – an Open Access journal uniting Biology Group, Medicine Group, and Engineering Group. We’re dedicated to advancing global knowledge and fostering collaboration across scientific fields.
The Biology Group explores diverse topics in life sciences, providing open access to cutting-edge research and fostering global collaboration in biological studies.
The Medicine Group focuses on advancing medical knowledge through open access research, promoting innovation, and encouraging global collaboration in healthcare studies.
The Engineering Group showcases cutting-edge research across engineering fields, providing open access and encouraging global collaboration and innovation.
The General Science Group covers a broad range of scientific disciplines, offering open access to research that drives innovation and fosters global collaboration.
Members Content
We believe in fueling cross-disciplinary conversations that stimulate progress and innovation.
Welcome to IgMin, a leading platform dedicated to enhancing knowledge dissemination and professional growth across multiple fields of science, technology, and the humanities. We believe in the power of open access, collaboration, and innovation. Our goal is to provide individuals and organizations with the tools they need to succeed in the global knowledge economy.
Cybersecurity at IgMin Research | Engineering Group
We believe in fueling cross-disciplinary conversations that stimulate progress and innovation.
について
Cybersecurity has emerged as a critical discipline within engineering and general sciences, fundamentally shaping how we design, implement, and manage technology in an interconnected world. The proliferation of digital devices and the Internet of Things (IoT) has expanded the attack surface for malicious actors, making the protection of data and systems more complex and imperative than ever. Advances in artificial intelligence and machine learning offer both new tools for defense and new vectors for attack, necessitating a robust, interdisciplinary approach to cybersecurity research and application.
In the biomedical field, cybersecurity is vital for safeguarding sensitive patient data and ensuring the integrity of medical devices and healthcare systems. As telemedicine and electronic health records become standard, protecting against cyber threats is essential to maintain patient trust and safety. "IgMin Research - A Biomed & Engineering Open Access Journal" seeks to foster innovation and collaboration in this arena, encouraging the exploration of novel security frameworks, encryption methods, and protocols that can withstand evolving cyber challenges while supporting technological advancement in medicine and engineering.
✓Network Security
✓ Cryptography
✓ Cyber-Physical Systems Security
✓ IoT Security
✓ Cloud Security
✓ Artificial Intelligence in Cybersecurity
✓ Cybersecurity in Healthcare
✓ Medical Device Security
✓ Electronic Health Records Security
✓ Biometric Security Systems
✓ Blockchain Applications in Cybersecurity
✓ Cybersecurity Policy and Governance
✓ Cybersecurity Risk Management
✓ Secure Software Development
✓ Malware Detection and Prevention
✓ Intrusion Detection Systems
✓ Data Privacy and Protection
✓ Cybersecurity in Biomedical Engineering
✓ Ethical Hacking and Penetration Testing
✓ Cyber Threat Intelligence
✓ Cybersecurity Education and Training
✓ Cybersecurity in Critical Infrastructure
✓ Mobile Security
✓ Cybersecurity for Smart Grids
✓ Secure Wireless Communication
✓ Quantum Cryptography
✓ Cybersecurity in Autonomous Systems
✓ Secure Machine Learning
✓ Human Factors in Cybersecurity
✓ Cyber Forensics
✓ Cybersecurity in Telemedicine
✓ Security of Wearable Devices
✓ Cybersecurity Regulations and Compliance
✓ Application Security
✓ Cybersecurity in Supply Chain
✓ Cybersecurity for Industrial Control Systems
✓ Secure Cloud Computing in Healthcare
✓ Privacy-Preserving Data Mining
✓ Distributed Denial of Service (DDoS) Protection
✓ Secure Network Protocols
✓ Security in 5G Networks
✓ Cybersecurity Economics
✓ Cybersecurity in Social Networks
✓ Security in Virtual and Augmented Reality Systems
Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.
Cyber Threat Analysis (CTA) in current conflicts focuses on identifying, monitoring, and assessing potential cyber threats. The main objective is to understand how the parties to the conflict use information and network technologies to conduct warfare, espionage, disinformation, or attacks on digital infrastructure. This analysis includes the identification of actors involved in conflicts and their targets in cyberspace, as well as the analysis of techniques and tools used in cyber activities. The aim of the article is to identify the role of c...yber threat analysis in the context of two current conflicts - the war in Ukraine and the Hamas attack on Israel. The article describes the essence of cyber threat analysis. The research problem focuses on identifying and understanding the role of cyber threat analysis in these conflicts and their potential consequences for international security and regional stability. Through the analysis of reports, online sources, and scientific literature, the article aims to familiarize readers with the role of cyber threat analysis in the context of these conflicts and to propose possible strategies for cyber risk management in the face of contemporary armed conflicts. The results of the analysis of cyber threats (CTA) in current conflicts include the identification of specific actors operating in cyberspace, their modus operandi, their objectives, and the techniques and tools used. In addition, the analysis can reveal existing vulnerabilities in digital security and areas that are particularly vulnerable to attacks. To sum up, it is necessary to create recommendations and directions for changes regarding the strengthening of digital security measures, such as software updates, implementation of network security, and increasing staff awareness of cyber threats. In addition, the CTA may suggest the need for better international cooperation to combat cyber threats and the need to develop strategies to prevent and respond to cyber-attacks.
Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.
byNg Wei Xuan, Cheng Zhuo Yuan and Luke Peh Lu Chang
This case study investigates the implementation of Virtual Reality (VR) technology in facilities management Competency-Based Training (CBT) within one of Singapore’s leading facilities and township management companies. Traditionally, workplace training in facility management has relied heavily on lecture-based methods, often resulting in insufficient preparation and a high turnover rate among newly onboarded staff. To address this challenge, this study explores the conversion of training materials into VR-based courseware, enabling immer...sive and interactive learning experiences.Two groups of newly onboarded staff underwent either traditional lecture-based or VR training sessions. Results indicate that those trained using VR exhibited a better comprehension of the material and higher levels of motivation compared to their counterparts in the traditional lecture-based group. However, it was noted that VR training carries the risk of cybersickness, with some participants reporting symptoms such as dizziness. To mitigate this issue, insights from existing literature on cybersickness are incorporated to enhance future VR training materials.This paper studies the application of VR in Facilities Management Competency-based training within the discourse of Industrie 5.0, the latest evolution of industrial technology that emphasizes human-machine collaboration and smart technologies such as VR. By leveraging VR technology for training purposes, this initiative aligns with the principles of Industrie 5.0, fostering innovation and efficiency in facility management practices. Overall, this research underscores the potential of VR in revolutionizing training methodologies within the practices of facilities management while addressing associated challenges to ensure optimal learning outcomes.
Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.
Today’s cadet leader is tomorrow’s officer, a professional capable of integrating knowledge and solving complex problems in a full-scale war with incomplete information, being a leader and authority for the personnel. Most of the time, cadets study in study groups using traditional technology, which is not enough to form a professional cadet leader. With the advent of computer technology, students’ and cadets’ motivation to learn using traditional teaching methods has paradoxically begun to decline rapidly. The problem o...f the quality of training of military specialists for the needs of communication and cybersecurity units is not reflected in the publications reviewed. However, significant progress has been made in the use of computer technology as the basis of training tools for ground forces units. Similar training complexes are actively used in NATO member states in the military education system in the training of air force pilots (navigators). Therefore, the author chose the improvement of the educational process at the Department of Combat Use of Communication Units in combination with the methodology of professional-business game for the development of a cadet leader in professional training courses (L-1B) of the tactical level of military education as the direction of research. The purpose of the study and the article is to substantiate the conceptual view of the department in the need to build a computerized training complex for training officers of leaders in professional training courses (L-1B) of the tactical level of military education, capable of using communication units based on computer games. Fragments of the game mechanics of stimulating the interest and motivation of cadets to study, for example, electronic shooting range, and learning Morse code, are considered. Game mechanics is a proof of a professional business game in the course of the discipline: Combat use of military communication systems and complexes of the course of professional military education (professional course of tactical level L1B).
Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.
The pervasive Internet of Things (IoT) integration has revolutionized industries such as medicine, environmental care, and urban development. The synergy between IoT devices and 5G cellular networks has further accelerated this transformation, providing ultra-high data rates and ultra-low latency. This connectivity enables various applications, including remote surgery, autonomous driving, virtual reality gaming, and AI-driven smart manufacturing. However, IoT devices’ real-time and high-volume messaging nature exposes them to potential m...alicious attacks. The implementation of encryption in such networks is challenging due to the constraints of IoT devices, including limited memory, storage, and processing bandwidth. In a previous work [1], we proposed an ongoing key construction process, introducing a pivotal pool to enhance network security. The protocol is designed with a probability analysis to ensure the existence of a shared key between any pair of IoT devices, with the predefined probability set by the system designer. However, our earlier model faced vulnerabilities such as the “parking lot attack” and physical attacks on devices, as highlighted in the conclusion section. We present a complementary solution to address these issues, fortifying our previous protocol against cyber threats. Our approach involves the implementation of an internal Certification Authority (CA) that issues certificates for each IoT device before joining the network.Furthermore, all encryption keys are distributed by the primary IoT device using the Unix OS ‘passwd’ mechanism. If a device “disappears,” all encryption keys are promptly replaced, ensuring continuous resilience against potential security breaches. This enhanced protocol establishes a robust security framework for IoT networks, safeguarding against internal and external threats.
Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.
Sarcasm, a standard social media message, delivers the opposite meaning through irony or teasing. Unfortunately, identifying sarcasm in written text is difficult in natural language processing. The work aims to create an effective sarcasm detection model for social media text data, with possible applications in sentiment analysis, social media analytics, and online reputation management. A hybrid Deep learning strategy is used to construct an effective sarcasm detection model for written content on social media networks. The design emphasizes f...eature extraction, selection, and neural network application. Limited research exists on detecting sarcasm in human speech compared to emotion recognition. The study recommends using Word2Vec or TF-IDF for feature extraction to address memory and temporal constraints. Use feature selection techniques like PCA or LDA to enhance model performance by selecting relevant features. A Capsule Neural Network (CNN) and Long Short-Term Memory (LSTM) collect contextual information and sequential dependencies in textual material. We evaluate Reddit datasets with labelled sarcasm data using metrics like Accuracy. Our hybrid method gets 95.60% accuracy on Reddit.