Help ?

IGMIN: あなたがここにいてくれて嬉しいです. お願いクリック '新しいクエリを作成してください' 当ウェブサイトへの初めてのご訪問で、さらに情報が必要な場合は.

すでに私たちのネットワークのメンバーで、すでに提出した質問に関する進展を追跡する必要がある場合は, クリック '私のクエリに連れて行ってください.'

科学、技術、工学、医学(STEM)分野に焦点を当てています | ISSN: 2995-8067  G o o g l e  Scholar

logo image

IgMin Research | マルチディシプリナリーオープンアクセスジャーナルは、科学、技術、工学、医学(STEM)の広範な分野における研究と知識の進展に貢献することを目的とした権威ある多分野のジャーナルです.

Engineering

Information Security at IgMin Research | Engineering Group

私たちの使命は、学際的な対話を促進し、広範な科学領域にわたる知識の進展を加速することです.

について

Safeguarding the Digital Frontier

In an era where information reigns supreme, Information Security takes center stage as the guardian of digital landscapes. This segment of IgMin Research navigates the intricate landscape of cybersecurity, delving into the tactics that protect digital assets from threats, breaches, and cyberattacks. From encryption to threat intelligence, we explore the evolving battle between security and adversity.

  • Cyber Threat Landscape Analysis
  • Network Security Protocols
  • Cryptography and Data Encryption
  • Vulnerability Assessment and Penetration Testing
  • Data Privacy and Compliance
  • Cloud Security Measures
  • Mobile and App Security
  • Identity and Access Management
  • Secure Software Development
  • Social Engineering and Phishing Countermeasures
  • Incident Response and Recovery
  • Cybersecurity Risk Management
  • IoT Security Considerations
  • Blockchain and Distributed Ledger Security
  • Threat Intelligence and Analysis
  • Artificial Intelligence in Cybersecurity
  • Biometric Security
  • Digital Forensics
  • Industrial Control System Security
  • E-commerce and Payment Security
  • National and International Cybersecurity Policies
  • Dynamic Cybersecurity Strategies
  • Case Studies in Cybersecurity Challenges
  • Emerging Trends in Information Security
  • Cybersecurity for Critical Infrastructure

Engineering Group (5)

Research Article Article ID: igmin169
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Cyber Threat Analysis (CTA) in Current Conflicts
by Zbigniew Ciekanowski and Sławomir Żurawski

Cyber Threat Analysis (CTA) in current conflicts focuses on identifying, monitoring, and assessing potential cyber threats. The main objective is to understand how the parties to the conflict use information and network technologies to conduct warfare, espionage, disinformation, or attacks on digital infrastructure. This analysis includes the identification of actors involved in conflicts and their targets in cyberspace, as well as the analysis of techniques and tools used in cyber activities. The aim of the article is to identify the role of c...yber threat analysis in the context of two current conflicts - the war in Ukraine and the Hamas attack on Israel. The article describes the essence of cyber threat analysis. The research problem focuses on identifying and understanding the role of cyber threat analysis in these conflicts and their potential consequences for international security and regional stability. Through the analysis of reports, online sources, and scientific literature, the article aims to familiarize readers with the role of cyber threat analysis in the context of these conflicts and to propose possible strategies for cyber risk management in the face of contemporary armed conflicts. The results of the analysis of cyber threats (CTA) in current conflicts include the identification of specific actors operating in cyberspace, their modus operandi, their objectives, and the techniques and tools used. In addition, the analysis can reveal existing vulnerabilities in digital security and areas that are particularly vulnerable to attacks. To sum up, it is necessary to create recommendations and directions for changes regarding the strengthening of digital security measures, such as software updates, implementation of network security, and increasing staff awareness of cyber threats. In addition, the CTA may suggest the need for better international cooperation to combat cyber threats and the need to develop strategies to prevent and respond to cyber-attacks.

Information Security Technology and SocietyNetwork Security
Research Article Article ID: igmin165
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Application of Virtual Reality (VR) in Facility Management Competency-based Training (CBT) in the Era of Industrie 5.0
by Ng Wei Xuan, Cheng Zhuo Yuan and Luke Peh Lu Chang

This case study investigates the implementation of Virtual Reality (VR) technology in facilities management Competency-Based Training (CBT) within one of Singapore’s leading facilities and township management companies. Traditionally, workplace training in facility management has relied heavily on lecture-based methods, often resulting in insufficient preparation and a high turnover rate among newly onboarded staff. To address this challenge, this study explores the conversion of training materials into VR-based courseware, enabling immer...sive and interactive learning experiences.Two groups of newly onboarded staff underwent either traditional lecture-based or VR training sessions. Results indicate that those trained using VR exhibited a better comprehension of the material and higher levels of motivation compared to their counterparts in the traditional lecture-based group. However, it was noted that VR training carries the risk of cybersickness, with some participants reporting symptoms such as dizziness. To mitigate this issue, insights from existing literature on cybersickness are incorporated to enhance future VR training materials.This paper studies the application of VR in Facilities Management Competency-based training within the discourse of Industrie 5.0, the latest evolution of industrial technology that emphasizes human-machine collaboration and smart technologies such as VR. By leveraging VR technology for training purposes, this initiative aligns with the principles of Industrie 5.0, fostering innovation and efficiency in facility management practices. Overall, this research underscores the potential of VR in revolutionizing training methodologies within the practices of facilities management while addressing associated challenges to ensure optimal learning outcomes.

Educational Technology Information Security
Review Article Article ID: igmin145
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

The Conceptual View of the Department of Combat use of Communication Units on the Creation of a Training Game Complex for Training Military Specialists on the Basis of Leadership
by Igor Kozubtsov and Oleksandr Nesterov

Today’s cadet leader is tomorrow’s officer, a professional capable of integrating knowledge and solving complex problems in a full-scale war with incomplete information, being a leader and authority for the personnel. Most of the time, cadets study in study groups using traditional technology, which is not enough to form a professional cadet leader. With the advent of computer technology, students’ and cadets’ motivation to learn using traditional teaching methods has paradoxically begun to decline rapidly. The problem o...f the quality of training of military specialists for the needs of communication and cybersecurity units is not reflected in the publications reviewed. However, significant progress has been made in the use of computer technology as the basis of training tools for ground forces units. Similar training complexes are actively used in NATO member states in the military education system in the training of air force pilots (navigators). Therefore, the author chose the improvement of the educational process at the Department of Combat Use of Communication Units in combination with the methodology of professional-business game for the development of a cadet leader in professional training courses (L-1B) of the tactical level of military education as the direction of research. The purpose of the study and the article is to substantiate the conceptual view of the department in the need to build a computerized training complex for training officers of leaders in professional training courses (L-1B) of the tactical level of military education, capable of using communication units based on computer games. Fragments of the game mechanics of stimulating the interest and motivation of cadets to study, for example, electronic shooting range, and learning Morse code, are considered. Game mechanics is a proof of a professional business game in the course of the discipline: Combat use of military communication systems and complexes of the course of professional military education (professional course of tactical level L1B).

Educational Technology Information Security
Mini Review Article ID: igmin137
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

A Capsule Neural Network (CNN) based Hybrid Approach for Identifying Sarcasm in Reddit Dataset
by Muhammad Faseeh and Harun Jamil

Sarcasm, a standard social media message, delivers the opposite meaning through irony or teasing. Unfortunately, identifying sarcasm in written text is difficult in natural language processing. The work aims to create an effective sarcasm detection model for social media text data, with possible applications in sentiment analysis, social media analytics, and online reputation management. A hybrid Deep learning strategy is used to construct an effective sarcasm detection model for written content on social media networks. The design emphasizes f...eature extraction, selection, and neural network application. Limited research exists on detecting sarcasm in human speech compared to emotion recognition. The study recommends using Word2Vec or TF-IDF for feature extraction to address memory and temporal constraints. Use feature selection techniques like PCA or LDA to enhance model performance by selecting relevant features. A Capsule Neural Network (CNN) and Long Short-Term Memory (LSTM) collect contextual information and sequential dependencies in textual material. We evaluate Reddit datasets with labelled sarcasm data using metrics like Accuracy. Our hybrid method gets 95.60% accuracy on Reddit.

Machine Learning Information SecurityData Science
Research Article Article ID: igmin120
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

A Comprehensive Methodology for Assessing the Business Reputation of Industrial and Production Personnel
by Filatov EA

The currently existing Russian and other legislation, as well as special literature, do not contain a methodology for the formation of the business reputation of the organization’s personnel and as a result, there is no unambiguous perception of the business, professional qualities of personnel as an object of evaluation of the organization in the market system. Therefore, it is impossible to single out the share of the results of intellectual advantage in the goods and services produced. This confirms the requirements formulated in para...graph 4 of Accounting Regulation 14/2007 «Accounting for intangible assets», which states that the intellectual and business qualities of the organization’s personnel, their qualifications, and their ability to work are not included in the intangible assets (since they are inseparable from their carriers and cannot be used without them). Meanwhile, the interests of the leading economically developed countries of the world lie in the field of accelerated growth of knowledge acquisition and application of professional skills. This trend of development of economically developed countries forms the basis of competitiveness and efficiency of their work. It should be noted that in the world economy, there is insufficient theoretical elaboration and a special practical significance and relevance of the issue of assessing the business reputation of the personnel of an economic entity. The article presents a comprehensive methodology for evaluating the performance of industrial and production personnel (the standard-production methodology), which contributes to the formation of accounting and information support for the analysis of the activities of both structural divisions, responsibility centers, business segments and commercial organizations as a whole. The author’s standard-production methodology makes it possible to determine the business reputation of industrial and production personnel, which contradicts the official economic paradigm.

Technology and Society Information SecurityData Mining