Prelim Exam in Capstone Project 1 Updated
Prelim Exam in Capstone Project 1 Updated
Prelim Exam in Capstone Project 1 Updated
College of Technology
(Discuss the area of investigation of the proposed system, its function, features, and
programming language to be used in developing the system)
This study discusses an urban innovation system and the role of digital technology using the
Amsterdam Smart City as a case. Based on semi-structured interviews and document
analysis, this study reveals that Amsterdam Smart City can be considered an example of a
new type of urban innovation system. There are nine actor categories involved with either a
one-sided or a bi-directional relationship between them in this innovation system. The actors
dynamically interact with each other in different innovation phases based on their interests
and resources. Besides, the use of an open web-based platform to connect actors and to
exchange information in the innovation system makes the information distributed fairly and
transparently among actors. Additionally, more actors can be reached to join the innovation
system. There is also no geographical limitation between actors to collaborate and innovate
on a specific idea. Therefore, dynamic interactions between actors that are facilitated by an
open web-based platform can be a new way of developing an innovation system in urban
areas. Dinar Wahidayat Putra, Z., & van der Knaap, W. G. M. (2018).
Not only companies, but also cities and public administrations are increasingly thinking
about complementary and new digital business—and corresponding service models due to
growing digital networking, smarter services, omnipresent access technologies, and
dynamic customer requirements. Thus, the development and implementation of smart city
technologies is a unique opportunity for cities of various sizes to make digital innovation
potentials more usable for residents, visitors, and local businesses. This paper describes the
application of the Digital Innovation and Transformation Process (DITP) in an urban
environment, as it collects, analyzes, and evaluates digitalization goals, customer values,
and actions of a small city, which focuses on digitalization in northern Germany and
combines it with related research work within the area of digital services for smart cities.
The investigation aims to analyze and focus the municipal governments’ intention for the
digitization of urban space by using the first phase of the DITP. Possible business concepts
and best practices were gathered and experiences from the use are used to improve DITP
approach. Wichmann J., Wißotzki M., Sandkuhl K. (2021)
The vision of ''Smart Cities'' is the urban center of the future, made safe, secure
environmentally green, and efficient because all structures--whether for power, water,
transportation, etc. are designed, constructed, and maintained making use of advanced,
integrated materials, sensors, electronics, and networks which are interfaced with
computerized systems comprised of databases, tracking, and decision-making algorithms.
This paper discusses a current initiative being led by the Brookhaven National Laboratory to
create a research, development and deployment agenda that advances this vision. This is
anchored in the application of new technology to current urban center issues while looking
20 years into the future and conceptualizing a city framework that may exist.
Hall, R E, Bowerman, B, Braverman, J, Taylor, J, Todosow, H, & Von Wimmersperg (2000)
Information and communication technology is changing the way in which cities organise
policymaking and urban growth. Smart Cities base their strategy on the use of information
and communication technologies in several fields such as economy, environment, mobility
and governance to transform the city infrastructure and services. This paper draws on the city
of Barcelona and intends to analyse its transformation from a traditional agglomeration to a
twenty-first century metropolis. The case of Barcelona is of special interest due to its
apparent desire, reflected by its current policies regarding urban planning, to be considered as
a leading metropolis in Europe. Hence, an assessment of the Smart City initiative will cast
light on the current status of Barcelona’s urban policy and its urban policy of Barcelona and
its future directions. This article analyses Barcelona’s transformation in the areas of Smart
City management; drivers, bottlenecks, conditions and assets. First, it presents the existing
literature on Barcelona’s Smart City initiative. Then, the case study analysis is presented with
the Barcelona Smart City model. After describing this model, we further explore the main
components of the Smart City strategy of Barcelona in terms of Smart districts, living labs,
initiatives, e-Services, infrastructures and Open Data. This paper also reveals certain benefits
and challenges related to this initiative and its future directions. The results of the case study
analysis indicate that Barcelona has been effectively implementing the Smart City strategy
with an aim to be a Smart City model for the world. Bakıcı, T., Almirall, E. & Wareham
(2013)
Based on the "digital city", "smart city" is widely used in daily livelihood, environmental
protection, public security, city services and other fields. In this paper, we mainly focus on
recent research and the concept of "smart city", summarizing the relationship between "smart
city" and "digital city", putting forward the main content of application systems as well as the
importance and difficulty of the construction of "smart city", and making a brief statement of
the influence of developing smart city in China. K. Su, J. Li and H. Fu (2011)
(Use APA format. Site some related literature and studies that will backbone the study.
Minimum of 5 and Maximum of 10 RRL.)
Efficient and Enhanced Attribute, A Web-based Information Security that Encrypts Datafiles.
(Discuss the area of investigation of the proposed system, its function, features, and
programming language to be used in developing the system)
As a researcher, we already know that there’s a lot suspicious happens when it comes to our
personal data and sometimes, we already encounter that situation, and I became curious on
this topic because I want to solve such things and also to secure the important details on
something.
Every organization needs protection against cyber-attacks and security threats. Cybercrime
and malware are constant threats to anyone with an Internet presence, and data breaches are
time-consuming and expensive. So basically, the importance of this study is to keep
unwanted visitors away, so they cannot get into your personal data and to ensures that your
files stay safe and locked.
Recently in every field there is a need of effective security of data which is also required in
multimedia commerce. So, to maintain security and confidentiality digital video stored and
keep processed in the encrypted form. As cryptography is a field which focused on text and
numerous algorithms developed not suitable for applications of multimedia due to large data
size and real time constraint. So, we check confidentiality of multimedia big data under
resources constraints. In first phase comparing growth trends of data volume with
computational resources, and proposed encryption resource optimization technique. Then, a
general-purpose lightweight speed tunable video encryption scheme is introduced. Thirdly, a
series of intelligent selective encryption control models are proposed. Lastly, using hashing
algorithm, we provide auditing to large files. The experimental results show and demonstrate
the feasibility and efficiency of the proposed technique [CITATION Dhe \l 1033 ]
(Use APA format. Site some related literature and studies that will backbone the study.
Minimum of 5 and Maximum of 10 RRL.)
First, the function of this topic is to provide better optimum security level for password whenever
the user using computer to log in and log out, thus the unauthorized users cannot easily breach
and decipher the users account through password. The main features of this topic, involves
generating high security level for the confidentiality of each user, thus their personal identity will
not be easily duplicated. And lastly the programming languages that will be used in developing
this topic is JavaScript, PHP, and Python
(Discuss the area of investigation of the proposed system, its function, features, and
programming language to be used in developing the system)
We researcher choose this topic because we are aware to possible cybersecurity threats when it
comes to our, social media account, networking and even our bank information account. I also
encounter this before and I think this is a good opportunity to create a web-based system that will
enhance the security level for password.
All users and even corporate companies need high security protection against possible threat of
unauthorized users. Basically, the importance of the study is to keep private account safe against
unauthorized users and hackers by implementing better security output password, thus high
security level for password will keep account safe and at the same time it will keep unwanted
users, so there’s no information will be extract and exposed.
Everybody used authentication password to protect their private accounts against unauthorized
breach attempt, some cybersecurity community provide knowledge to educate people about
password authentication mechanism. Therefor the researcher provides password cracking idea,
where it can optimize the security level of password, but it takes more time to process. The
researcher provides hypothesis process where it can optimize the knowledge area and tools
required, even though many research attempt to performed from that area. Therefore, the design
for advance tools need to promote integrating powerful toolkits presenting (ultimate password
awareness toolkit), where it features the password cracking process, and the result demonstrating
the importance of designing next generation password. [ CITATION Pie191 \l 1033 ]
File compression optimizes the original amount of space needed to store data, thus the archive
file that support data compression are the RAR which are commonly archive file format.
According to author even though RAR use classic symmetry encryption algorithm SHA-1
hashing and AES for encryption, these two cannot be cracked easily because of their advance
built security encryption algorithm. Therefore, the author presents an approach paper using
GPUs to speed up the process recovery, however it takes more time to parallelize the SHA-1
hashing, so the author implements course granularity parallel where GPU are only dedicated
validation for password. Thus, the author presents four optimization methods to enhance parallel
version between CPU and GPU. [ CITATION Xia151 \l 1033 ]
Major websites and application come up with password-strength measure, known as password
checker, where it keeps the user password to be authenticate by anonymous hacker, thus, to
prevent producing weak and common string characters and variables for password. Regardless of
stringency, where static checkers will vary to leak such information, the authors address
weaknesses, and proposed and modify dynamic password policy generator, namely DPPG,
which aims to employ the distributed password space and create dynamic friendly policies for
users to create high security level password in terms of password space and distribution.
[ CITATION Shu171 \l 1033 ]
Many banking sectors and application sites uses One-time Password (OTPs) to provide extra
layer of security against unauthorized users, in contrast to basic security method such as "Card
and PIN" or traditional username and password. The researcher implements authentication
process using biometric authentication, featuring the fingerprint recognition based on finger line
patterns of customer, thus the solution is already supported by Internet of things (IoT) device
using Arduino Uno, SIM/GSM/GPRS Shield and fingerprint sensor depending on the user body
temperature before it makes progress. [ CITATION Xia201 \l 1033 ]
References
Dheeraj Hari Patil, D. S. (2018, February 17). Retrieved from A Selective Encryption and fraud detection
on Multimedia: https://www.researchgate.net/profile/Sameer-Mohammad-
4/publication/354529139_A_Selective_Encryption_and_fraud_detection_on_Multimedia_Files_
for_data_security_with_Resource_Optimization_Technique/links/613d13e24e1df271062e9b9e/
A-Selective-Encryption-and-fr
Ibeneme-Sabinus, I. L. (2020, April 24). Journal of Cybersecurity and Information Management (JCIM).
Retrieved from Journal of Cybersecurity and Information Management (JCIM):
https://www.researchgate.net/profile/Ifeoma-Livina-Ibeneme-
Sabinus/publication/342702857_A_Web_Based_Document_Encryption_Application_Software_f
or_Information_Security_in_Tertiary_Institutions/links/5f023431299bf18816038ecc/A-Web-
Based-Document-Encryption-
Khairul Muttaqin, J. R. (2020, May 6). Journal of Applied Engineering and Technological Science (JAETS).
Retrieved from Journal of Applied Engineering and Technological Science (JAETS):
https://journal.yrpipku.com/index.php/jaets/article/view/78
P. Prashanthi, M. D. (2020, October 12). Springer Link. Retrieved from Springer Link:
https://link.springer.com/chapter/10.1007/978-981-15-7961-5_31
Pierre Jordan, E. S. (2019). Towards Designing Advanced Password Cracking Toolkits: Optimizing the
Password Cracking Process. UMAP'19 Adjunct: Adjunct Publication of the 27th Conference on
User Modeling, Adaptation and Personalization, 203–208.
Shukun Yang, S. J. (2017). DPPG: A Dynamic Password Policy Generation System. IEEE, 545 - 558.
Xiaojing An, H. J. (2015). Optimized Password Recovery for Encrypted RAR on GPUs. IEEE.
Dinar Wahidayat Putra, Z., & van der Knaap, W. G. M. (2018). Urban Innovation
System and the Role of an Open Web-based Platform: The Case of Amsterdam
Smart City. Journal of Regional and City Planning , 29(3), 234-
249. https://doi.org/10.5614/jrcp.2018.29.3.4
Wichmann J., Wißotzki M., Sandkuhl K. (2021) Toward a Smart Town: Digital
Innovation and Transformation Process in a Public Sector Environment. In: Zimmermann
A., Howlett R., Jain L. (eds) Human Centred Intelligent Systems. Smart Innovation,
Systems and Technologies, vol 189. Springer, Singapore. https://doi.org/10.1007/978-
981-15-5784-2_8
Bakıcı, T., Almirall, E. & Wareham, J. A Smart City Initiative: the Case of Barcelona. J
Knowl Econ 4, 135–148 (2013). https://doi.org/10.1007/s13132-012-0084-9
K. Su, J. Li and H. Fu, "Smart city and the applications," 2011 International Conference on
Electronics, Communications and Control (ICECC), 2011, pp. 1028-1031, doi:
10.1109/ICECC.2011.6066743.