Help ?

IGMIN: あなたがここにいてくれて嬉しいです. お願いクリック '新しいクエリを作成してください' 当ウェブサイトへの初めてのご訪問で、さらに情報が必要な場合は.

すでに私たちのネットワークのメンバーで、すでに提出した質問に関する進展を追跡する必要がある場合は, クリック '私のクエリに連れて行ってください.'

Subjects Content

Welcome to IgMin Research – an Open Access journal uniting Biology Group, Medicine Group, and Engineering Group. We’re dedicated to advancing global knowledge and fostering collaboration across scientific fields.

Biology Group

The Biology Group explores diverse topics in life sciences, providing open access to cutting-edge research and fostering global collaboration in biological studies.

Medicine Group

The Medicine Group focuses on advancing medical knowledge through open access research, promoting innovation, and encouraging global collaboration in healthcare studies.

Engineering Group

The Engineering Group showcases cutting-edge research across engineering fields, providing open access and encouraging global collaboration and innovation.

General Science Group

The General Science Group covers a broad range of scientific disciplines, offering open access to research that drives innovation and fosters global collaboration.

Members Content

We believe in fueling cross-disciplinary conversations that stimulate progress and innovation.

Articles Content

We believe in fueling cross-disciplinary conversations that stimulate progress and innovation.

Identify Us

We believe in fueling cross-disciplinary conversations that stimulate progress and innovation.

IgMin Corporation

Welcome to IgMin, a leading platform dedicated to enhancing knowledge dissemination and professional growth across multiple fields of science, technology, and the humanities. We believe in the power of open access, collaboration, and innovation. Our goal is to provide individuals and organizations with the tools they need to succeed in the global knowledge economy.

Publications Support
publications.support@igmin.org
E-Books Support
ebooks.support@igmin.org
Webinars & Conferences Support
webinarsandconference@igmin.org
Content Writing Support
contentwriting.support@igmin.org

Search

Explore Section

Content for the explore section slider goes here.

Engineering

Cybersecurity at IgMin Research | Engineering Group

We believe in fueling cross-disciplinary conversations that stimulate progress and innovation.

について

Cybersecurity has emerged as a critical discipline within engineering and general sciences, fundamentally shaping how we design, implement, and manage technology in an interconnected world. The proliferation of digital devices and the Internet of Things (IoT) has expanded the attack surface for malicious actors, making the protection of data and systems more complex and imperative than ever. Advances in artificial intelligence and machine learning offer both new tools for defense and new vectors for attack, necessitating a robust, interdisciplinary approach to cybersecurity research and application.

In the biomedical field, cybersecurity is vital for safeguarding sensitive patient data and ensuring the integrity of medical devices and healthcare systems. As telemedicine and electronic health records become standard, protecting against cyber threats is essential to maintain patient trust and safety. "IgMin Research - A Biomed & Engineering Open Access Journal" seeks to foster innovation and collaboration in this arena, encouraging the exploration of novel security frameworks, encryption methods, and protocols that can withstand evolving cyber challenges while supporting technological advancement in medicine and engineering.

  • Network Security
  • Cryptography
  • Cyber-Physical Systems Security
  • IoT Security
  • Cloud Security
  • Artificial Intelligence in Cybersecurity
  • Cybersecurity in Healthcare
  • Medical Device Security
  • Electronic Health Records Security
  • Biometric Security Systems
  • Blockchain Applications in Cybersecurity
  • Cybersecurity Policy and Governance
  • Cybersecurity Risk Management
  • Secure Software Development
  • Malware Detection and Prevention
  • Intrusion Detection Systems
  • Data Privacy and Protection
  • Cybersecurity in Biomedical Engineering
  • Ethical Hacking and Penetration Testing
  • Cyber Threat Intelligence
  • Cybersecurity Education and Training
  • Cybersecurity in Critical Infrastructure
  • Mobile Security
  • Cybersecurity for Smart Grids
  • Secure Wireless Communication
  • Quantum Cryptography
  • Cybersecurity in Autonomous Systems
  • Secure Machine Learning
  • Human Factors in Cybersecurity
  • Cyber Forensics
  • Cybersecurity in Telemedicine
  • Security of Wearable Devices
  • Cybersecurity Regulations and Compliance
  • Application Security
  • Cybersecurity in Supply Chain
  • Cybersecurity for Industrial Control Systems
  • Secure Cloud Computing in Healthcare
  • Privacy-Preserving Data Mining
  • Distributed Denial of Service (DDoS) Protection
  • Secure Network Protocols
  • Security in 5G Networks
  • Cybersecurity Economics
  • Cybersecurity in Social Networks
  • Security in Virtual and Augmented Reality Systems
  • Cybersecurity in E-commerce
  • Cybersecurity Incident Response
  • Cybersecurity Analytics
  • Secure Coding Practices
  • Cybersecurity in Embedded Systems
  • Cybersecurity Awareness and Culture.

Engineering Group (5)

Research Article Article ID: igmin169
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Cyber Threat Analysis (CTA) in Current Conflicts
by Zbigniew Ciekanowski and Sławomir Żurawski

Cyber Threat Analysis (CTA) in current conflicts focuses on identifying, monitoring, and assessing potential cyber threats. The main objective is to understand how the parties to the conflict use information and network technologies to conduct warfare, espionage, disinformation, or attacks on digital infrastructure. This analysis includes the identification of actors involved in conflicts and their targets in cyberspace, as well as the analysis of techniques and tools used in cyber activities. The aim of the article is to identify the role of c...yber threat analysis in the context of two current conflicts - the war in Ukraine and the Hamas attack on Israel. The article describes the essence of cyber threat analysis. The research problem focuses on identifying and understanding the role of cyber threat analysis in these conflicts and their potential consequences for international security and regional stability. Through the analysis of reports, online sources, and scientific literature, the article aims to familiarize readers with the role of cyber threat analysis in the context of these conflicts and to propose possible strategies for cyber risk management in the face of contemporary armed conflicts. The results of the analysis of cyber threats (CTA) in current conflicts include the identification of specific actors operating in cyberspace, their modus operandi, their objectives, and the techniques and tools used. In addition, the analysis can reveal existing vulnerabilities in digital security and areas that are particularly vulnerable to attacks. To sum up, it is necessary to create recommendations and directions for changes regarding the strengthening of digital security measures, such as software updates, implementation of network security, and increasing staff awareness of cyber threats. In addition, the CTA may suggest the need for better international cooperation to combat cyber threats and the need to develop strategies to prevent and respond to cyber-attacks.

Cybersecurity
Research Article Article ID: igmin165
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Application of Virtual Reality (VR) in Facility Management Competency-based Training (CBT) in the Era of Industrie 5.0
by Ng Wei Xuan, Cheng Zhuo Yuan and Luke Peh Lu Chang

This case study investigates the implementation of Virtual Reality (VR) technology in facilities management Competency-Based Training (CBT) within one of Singapore’s leading facilities and township management companies. Traditionally, workplace training in facility management has relied heavily on lecture-based methods, often resulting in insufficient preparation and a high turnover rate among newly onboarded staff. To address this challenge, this study explores the conversion of training materials into VR-based courseware, enabling immer...sive and interactive learning experiences.Two groups of newly onboarded staff underwent either traditional lecture-based or VR training sessions. Results indicate that those trained using VR exhibited a better comprehension of the material and higher levels of motivation compared to their counterparts in the traditional lecture-based group. However, it was noted that VR training carries the risk of cybersickness, with some participants reporting symptoms such as dizziness. To mitigate this issue, insights from existing literature on cybersickness are incorporated to enhance future VR training materials.This paper studies the application of VR in Facilities Management Competency-based training within the discourse of Industrie 5.0, the latest evolution of industrial technology that emphasizes human-machine collaboration and smart technologies such as VR. By leveraging VR technology for training purposes, this initiative aligns with the principles of Industrie 5.0, fostering innovation and efficiency in facility management practices. Overall, this research underscores the potential of VR in revolutionizing training methodologies within the practices of facilities management while addressing associated challenges to ensure optimal learning outcomes.

Educational Technology Cybersecurity
Review Article Article ID: igmin145
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

The Conceptual View of the Department of Combat use of Communication Units on the Creation of a Training Game Complex for Training Military Specialists on the Basis of Leadership
by Igor Kozubtsov and Oleksandr Nesterov

Today’s cadet leader is tomorrow’s officer, a professional capable of integrating knowledge and solving complex problems in a full-scale war with incomplete information, being a leader and authority for the personnel. Most of the time, cadets study in study groups using traditional technology, which is not enough to form a professional cadet leader. With the advent of computer technology, students’ and cadets’ motivation to learn using traditional teaching methods has paradoxically begun to decline rapidly. The problem o...f the quality of training of military specialists for the needs of communication and cybersecurity units is not reflected in the publications reviewed. However, significant progress has been made in the use of computer technology as the basis of training tools for ground forces units. Similar training complexes are actively used in NATO member states in the military education system in the training of air force pilots (navigators). Therefore, the author chose the improvement of the educational process at the Department of Combat Use of Communication Units in combination with the methodology of professional-business game for the development of a cadet leader in professional training courses (L-1B) of the tactical level of military education as the direction of research. The purpose of the study and the article is to substantiate the conceptual view of the department in the need to build a computerized training complex for training officers of leaders in professional training courses (L-1B) of the tactical level of military education, capable of using communication units based on computer games. Fragments of the game mechanics of stimulating the interest and motivation of cadets to study, for example, electronic shooting range, and learning Morse code, are considered. Game mechanics is a proof of a professional business game in the course of the discipline: Combat use of military communication systems and complexes of the course of professional military education (professional course of tactical level L1B).

Educational Technology Cybersecurity
Review Article Article ID: igmin149
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Strengthening IoT Network Protocols: A Model Resilient Against Cyber Attacks
by Guy Leshem and Menachem Domb

The pervasive Internet of Things (IoT) integration has revolutionized industries such as medicine, environmental care, and urban development. The synergy between IoT devices and 5G cellular networks has further accelerated this transformation, providing ultra-high data rates and ultra-low latency. This connectivity enables various applications, including remote surgery, autonomous driving, virtual reality gaming, and AI-driven smart manufacturing. However, IoT devices’ real-time and high-volume messaging nature exposes them to potential m...alicious attacks. The implementation of encryption in such networks is challenging due to the constraints of IoT devices, including limited memory, storage, and processing bandwidth. In a previous work [1], we proposed an ongoing key construction process, introducing a pivotal pool to enhance network security. The protocol is designed with a probability analysis to ensure the existence of a shared key between any pair of IoT devices, with the predefined probability set by the system designer. However, our earlier model faced vulnerabilities such as the “parking lot attack” and physical attacks on devices, as highlighted in the conclusion section. We present a complementary solution to address these issues, fortifying our previous protocol against cyber threats. Our approach involves the implementation of an internal Certification Authority (CA) that issues certificates for each IoT device before joining the network.Furthermore, all encryption keys are distributed by the primary IoT device using the Unix OS ‘passwd’ mechanism. If a device “disappears,” all encryption keys are promptly replaced, ensuring continuous resilience against potential security breaches. This enhanced protocol establishes a robust security framework for IoT networks, safeguarding against internal and external threats.

Cybersecurity
Mini Review Article ID: igmin137
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

A Capsule Neural Network (CNN) based Hybrid Approach for Identifying Sarcasm in Reddit Dataset
by Muhammad Faseeh and Harun Jamil

Sarcasm, a standard social media message, delivers the opposite meaning through irony or teasing. Unfortunately, identifying sarcasm in written text is difficult in natural language processing. The work aims to create an effective sarcasm detection model for social media text data, with possible applications in sentiment analysis, social media analytics, and online reputation management. A hybrid Deep learning strategy is used to construct an effective sarcasm detection model for written content on social media networks. The design emphasizes f...eature extraction, selection, and neural network application. Limited research exists on detecting sarcasm in human speech compared to emotion recognition. The study recommends using Word2Vec or TF-IDF for feature extraction to address memory and temporal constraints. Use feature selection techniques like PCA or LDA to enhance model performance by selecting relevant features. A Capsule Neural Network (CNN) and Long Short-Term Memory (LSTM) collect contextual information and sequential dependencies in textual material. We evaluate Reddit datasets with labelled sarcasm data using metrics like Accuracy. Our hybrid method gets 95.60% accuracy on Reddit.

Machine Learning Cybersecurity
Cybersecurity
研究を公開する

私たちは、科学、技術、工学、医学に関する幅広い種類の記事を編集上の偏見なく公開しています。

提出する

見る 原稿のガイドライン 追加 論文処理料

IgMin 科目を探索する
グーグルスカラー
welcome Image

Google Scholarは2004年11月にベータ版が発表され、幅広い学術領域を航海する学術ナビゲーターとして機能します。それは査読付きジャーナル、書籍、会議論文、論文、博士論文、プレプリント、要約、技術報告書、裁判所の意見、特許をカバーしています。 IgMin の記事を検索