Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Prelim Exam in Capstone Project 1 Updated

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

Lyceum of the Philippines University

College of Technology

THESIS/CAPSTONE PROJECT PROPOSAL


PRELIM EXAMINATION (60%)

NAME OF PROPONENT(S): Atalia, Mattrick A. Sano, John Frederick J.


Castro, Andrei E.

First Subject Proposal

1.0 PROPOSED THESIS/CAPSTONE TITLE:

INFORMATION AND COMMUNICATION, A WEB-BASED INQUIRY FOR THE


RESIDENCE OF BARANGAY 20 TONDO MANILA

2.0 AREA OF INVESTIGATION:


The main function of this system is to give the residents of barangay 20 a web-based system
than can help them with their business with the barangay, residents can request a
hearing by submitting a request. they can also apply for a barangay clearance and id.
residents can also check the status of their requests (id, hearing, clearance). residents who
just moved in the area can register their residency with the barangay. the system will use
HTML,CSS with SCSS as a preprocessor, JavaScript, NodeJS and MongoDB.

(Discuss the area of investigation of the proposed system, its function, features, and
programming language to be used in developing the system)

3.0 REASON FOR CHOICE:


As a resident of barangay 20, i experienced firsthand the problems that we have here, the
long and chaotic process of registering for a barangay ID and clearance. let alone hearings,
the staffs of the barangay have no system that tracks and sort all these things.
that’s why a lot of residents are unhappy. and we are developing this system to solve these
problems.

4.0 IMPORTANCE OF THE STUDY:


The residents of barangay 20 deserves a fast and reliable service from their barangay.
they are paying hard earned money through tax and they should be given the equivalent
service. This will ensure a fast and sustainable service because this system will use a
relational database which will track all the resident's queries.
5.0 TARGET USERS / BENEFICIARIES:
Residents of barangay 20

6.0 SIMILARITY WITH PREVIOUS STUDIES OR PROJECT:

This study discusses an urban innovation system and the role of digital technology using the
Amsterdam Smart City as a case. Based on semi-structured interviews and document
analysis, this study reveals that Amsterdam Smart City can be considered an example of a
new type of urban innovation system. There are nine actor categories involved with either a
one-sided or a bi-directional relationship between them in this innovation system. The actors
dynamically interact with each other in different innovation phases based on their interests
and resources. Besides, the use of an open web-based platform to connect actors and to
exchange information in the innovation system makes the information distributed fairly and
transparently among actors. Additionally, more actors can be reached to join the innovation
system. There is also no geographical limitation between actors to collaborate and innovate
on a specific idea. Therefore, dynamic interactions between actors that are facilitated by an
open web-based platform can be a new way of developing an innovation system in urban
areas. Dinar Wahidayat Putra, Z., & van der Knaap, W. G. M. (2018). 

Not only companies, but also cities and public administrations are increasingly thinking
about complementary and new digital business—and corresponding service models due to
growing digital networking, smarter services, omnipresent access technologies, and
dynamic customer requirements. Thus, the development and implementation of smart city
technologies is a unique opportunity for cities of various sizes to make digital innovation
potentials more usable for residents, visitors, and local businesses. This paper describes the
application of the Digital Innovation and Transformation Process (DITP) in an urban
environment, as it collects, analyzes, and evaluates digitalization goals, customer values,
and actions of a small city, which focuses on digitalization in northern Germany and
combines it with related research work within the area of digital services for smart cities.
The investigation aims to analyze and focus the municipal governments’ intention for the
digitization of urban space by using the first phase of the DITP. Possible business concepts
and best practices were gathered and experiences from the use are used to improve DITP
approach. Wichmann J., Wißotzki M., Sandkuhl K. (2021)
The vision of ''Smart Cities'' is the urban center of the future, made safe, secure
environmentally green, and efficient because all structures--whether for power, water,
transportation, etc. are designed, constructed, and maintained making use of advanced,
integrated materials, sensors, electronics, and networks which are interfaced with
computerized systems comprised of databases, tracking, and decision-making algorithms.
This paper discusses a current initiative being led by the Brookhaven National Laboratory to
create a research, development and deployment agenda that advances this vision. This is
anchored in the application of new technology to current urban center issues while looking
20 years into the future and conceptualizing a city framework that may exist.
Hall, R E, Bowerman, B, Braverman, J, Taylor, J, Todosow, H, & Von Wimmersperg (2000)

Information and communication technology is changing the way in which cities organise
policymaking and urban growth. Smart Cities base their strategy on the use of information
and communication technologies in several fields such as economy, environment, mobility
and governance to transform the city infrastructure and services. This paper draws on the city
of Barcelona and intends to analyse its transformation from a traditional agglomeration to a
twenty-first century metropolis. The case of Barcelona is of special interest due to its
apparent desire, reflected by its current policies regarding urban planning, to be considered as
a leading metropolis in Europe. Hence, an assessment of the Smart City initiative will cast
light on the current status of Barcelona’s urban policy and its urban policy of Barcelona and
its future directions. This article analyses Barcelona’s transformation in the areas of Smart
City management; drivers, bottlenecks, conditions and assets. First, it presents the existing
literature on Barcelona’s Smart City initiative. Then, the case study analysis is presented with
the Barcelona Smart City model. After describing this model, we further explore the main
components of the Smart City strategy of Barcelona in terms of Smart districts, living labs,
initiatives, e-Services, infrastructures and Open Data. This paper also reveals certain benefits
and challenges related to this initiative and its future directions. The results of the case study
analysis indicate that Barcelona has been effectively implementing the Smart City strategy
with an aim to be a Smart City model for the world. Bakıcı, T., Almirall, E. & Wareham
(2013)

Based on the "digital city", "smart city" is widely used in daily livelihood, environmental
protection, public security, city services and other fields. In this paper, we mainly focus on
recent research and the concept of "smart city", summarizing the relationship between "smart
city" and "digital city", putting forward the main content of application systems as well as the
importance and difficulty of the construction of "smart city", and making a brief statement of
the influence of developing smart city in China. K. Su, J. Li and H. Fu (2011)

(Use APA format. Site some related literature and studies that will backbone the study.
Minimum of 5 and Maximum of 10 RRL.)

Second Subject Proposal


1.0 PROPOSED THESIS/CAPSTONE TITLE:

Efficient and Enhanced Attribute, A Web-based Information Security that Encrypts Datafiles.

2.0 AREA OF INVESTIGATION:


Basically, function of this topic is all about monitoring system on how to protect your data
and users’ confidential information to protect from being accessed by unauthorized user and
security monitoring also involves collecting and analyzing information to detect suspicious
behavior or unauthorized system changes on your network, defining which types of behavior
should trigger alerts, and taking action on alerts as needed, to come up with the system we
also used the java script language.

(Discuss the area of investigation of the proposed system, its function, features, and
programming language to be used in developing the system)

3.0 REASON FOR CHOICE:

As a researcher, we already know that there’s a lot suspicious happens when it comes to our
personal data and sometimes, we already encounter that situation, and I became curious on
this topic because I want to solve such things and also to secure the important details on
something.

4.0 IMPORTANCE OF THE STUDY:

Every organization needs protection against cyber-attacks and security threats. Cybercrime
and malware are constant threats to anyone with an Internet presence, and data breaches are
time-consuming and expensive. So basically, the importance of this study is to keep
unwanted visitors away, so they cannot get into your personal data and to ensures that your
files stay safe and locked.

5.0 TARGET USERS / BENEFICIARIES:

Networking Companies, Bank, Financial Services,

6.0 SIMILARITY WITH PREVIOUS STUDIES OR PROJECT:

Recently in every field there is a need of effective security of data which is also required in
multimedia commerce. So, to maintain security and confidentiality digital video stored and
keep processed in the encrypted form. As cryptography is a field which focused on text and
numerous algorithms developed not suitable for applications of multimedia due to large data
size and real time constraint. So, we check confidentiality of multimedia big data under
resources constraints. In first phase comparing growth trends of data volume with
computational resources, and proposed encryption resource optimization technique. Then, a
general-purpose lightweight speed tunable video encryption scheme is introduced. Thirdly, a
series of intelligent selective encryption control models are proposed. Lastly, using hashing
algorithm, we provide auditing to large files. The experimental results show and demonstrate
the feasibility and efficiency of the proposed technique [CITATION Dhe \l 1033 ]

A web-based user-friendly document encryption application software was developed as a


better cryptographic online system used in securing important tertiary institutions’ documents
such as students' Official Grade Report (OGR) sheets, computed and approved results,
transcripts, examination and test question papers, Senate/Council documents and any other
sensitive or important document needed to be secured from unauthorized users. It is a known
fact that problems like unsecured information, information misuse, tampering of sensitive
documents by unauthorized persons, stress of hiding sensitive documents from unauthorized
persons and locating hidden sensitive documents exist in any system/unit where proper data
security mechanism is not in place. In this research work, an online cryptographic system
was designed, using Advanced Encryption Standard (AES) algorithm, to secure important
documents. The Analysis and Design of this system followed the Structured System Analysis
and Design Methodology (SSADM) using web tools. The output of the software shows that
the application can encrypt files and save in the database and can only be decrypted using a
cipher key automatically generated by the system. With this software, sensitive information
can be easily accessed without stress or fear, and it has created a more reliable and safer
platform to secure such sensitive documents other than the primitive method of using
username and password. [ CITATION Ibe20 \l 1033 ]
Secure Data Sharing enables account-to-account sharing of data through Snowflake database
tables, secure views, and secure UDFs. With Secure Data Sharing, no actual data is copied or
transferred between accounts. All sharing is accomplished through Snowflake’s unique
services layer and metadata store. This is an important concept because it means that shared
data does not take up any storage in a consumer account and, therefore, does not contribute to
the consumer’s monthly data storage charges. The only charges to consumers are for the
compute resources (i.e., virtual warehouses) used to query the shared data. Attribute-based
encryption is a type of public-key encryption in which the secret key of a user and the cipher
text are dependent upon attributes (e.g., the country in which he lives, or the kind of
subscription he has). In such a system, the decryption of a cipher text is possible only if the
set of attributes of the user key matches the attributes of the cipher text. There are mainly two
types of attribute-based encryption schemes: Key-policy attribute-based encryption (KP-
ABE) and cipher text-policy attribute-based encryption (CP-ABE). In KPABE, users’ secret
keys are generated based on an access tree that defines the privileges scope of the concerned
user, and data are encrypted over a set of attributes. However, CP-ABE uses access trees to
encrypt data and users’ secret keys are generated over a set of attributes. Secure data sharing
is a challenging problem currently being faced by the cloud computing sector. A novel
method of Cipher text policy attribute-based encryption (CP-ABE) is presented by paper to
overcome the issues. The data from various sources like Medical and military sources, stored
in the cloud, tend to have a multilevel hierarchy. But this hierarchy was not explored in CP-
ABE. [ CITATION PPr20 \l 1033 ]
The times has made human needs are increasing, including information needs. Therefore,
sending and storing data through electronic media requires a process that is able to guarantee
the security and integrity of the data that requires an encoding process. Encryption is the
process of changing an original data into confidential data that cannot be read. Meanwhile,
the decryption process is a process where the confidential data received will be converted
back into the original data. In this case the Advanced Encryption Standard (AES) algorithm
is used as the latest cryptographic algorithm standard. The previous algorithm was
considered unable to answer the challenges of the development of communication
technology very quickly. AES is a cryptographic algorithm using the Rijndael algorithm that
can encrypt and decrypt blocks of data over 128 bits with a key length of 128 bits. In this
study the application of AES as a file security system is carried out, where the encryption and
decryption process is carried out on the file. In testing the system, a trial is performed on all
files with different file sizes and for the results of the encryption process (ciphertext) in the
form of files with the file format with the *. encrypted extension. [ CITATION Kha20 \l 1033 ]
Ransomware is the most predominant cyber threat in the digital infrastructure. The attackers
launching ransomware attacks use different techniques to hijack the users’ or organizations’
files and resources to demand ransom in exchange to free the encrypted/captured data or
resources. Although there are many malware attacks, ransomware is considered most
dangerous as it imposes a high financial burden on the organization. The crypto currency is
an untraceable payment method that the attacker uses to receive ransom from victims to
conceal his/her identity and location. This still creates challenges to trace the attacker or
attackers’ networks. The article uses the systematic literature review (SLR) approach to
provide significant study on the ransomware attacks as it is the area that requires topmost
attention in critical infrastructure. The paper briefs the various types of ransomwares,
vulnerabilities, attack methodologies, impacts, mitigation, and prevention techniques of the
attacks. This research study is mainly focused on Windows OS vulnerabilities. These
findings in the survey will be highly beneficial to understand the effects of ransomware
attacks in critical infrastructure environments and the use of machine learning to detect and
prevent these attacks. [ CITATION TRR21 \l 1033 ]

(Use APA format. Site some related literature and studies that will backbone the study.
Minimum of 5 and Maximum of 10 RRL.)

Third Subject Proposal


1.0 PROPOSED THESIS/CAPSTONE TITLE:

A WEB-BASED APPLICATION SUPPORT SYSTEM OPTIMIZING THE USAGE OF


PASSWORD AGAINST UNAUTHORIZED ACCESS TO COMPUTER.

2.0 AREA OF INVESTIGATION:

First, the function of this topic is to provide better optimum security level for password whenever
the user using computer to log in and log out, thus the unauthorized users cannot easily breach
and decipher the users account through password. The main features of this topic, involves
generating high security level for the confidentiality of each user, thus their personal identity will
not be easily duplicated. And lastly the programming languages that will be used in developing
this topic is JavaScript, PHP, and Python

(Discuss the area of investigation of the proposed system, its function, features, and
programming language to be used in developing the system)

3.0 REASON FOR CHOICE:

We researcher choose this topic because we are aware to possible cybersecurity threats when it
comes to our, social media account, networking and even our bank information account. I also
encounter this before and I think this is a good opportunity to create a web-based system that will
enhance the security level for password.

4.0 IMPORTANCE OF THE STUDY:

All users and even corporate companies need high security protection against possible threat of
unauthorized users. Basically, the importance of the study is to keep private account safe against
unauthorized users and hackers by implementing better security output password, thus high
security level for password will keep account safe and at the same time it will keep unwanted
users, so there’s no information will be extract and exposed.

5.0 TARGET USERS / BENEFICIARIES:

Local users, private websites, and web pages,

6.0 SIMILARITY WITH PREVIOUS STUDIES OR PROJECT:


(Use APA format. Site some related literature and studies that will backbone the study.
Minimum of 5 and Maximum of 10 RRL.)
Transforming password user into keys for symmetric encryption are based on password-based
key derivation functions (PBKDFs) which are commonly used to prevent upcoming cyber-attack
from hackers. The author of the research studies employs two alternative that will strengthen the
performance of previously published PBKDF. Thus, the design will employ symmetric cipher as
pseudo random generator and supporting the hardware acceleration for AES which is currently
available to many platforms to prevent phasing password attack. [ CITATION Raf181 \l 1033 ]

Everybody used authentication password to protect their private accounts against unauthorized
breach attempt, some cybersecurity community provide knowledge to educate people about
password authentication mechanism. Therefor the researcher provides password cracking idea,
where it can optimize the security level of password, but it takes more time to process. The
researcher provides hypothesis process where it can optimize the knowledge area and tools
required, even though many research attempt to performed from that area. Therefore, the design
for advance tools need to promote integrating powerful toolkits presenting (ultimate password
awareness toolkit), where it features the password cracking process, and the result demonstrating
the importance of designing next generation password. [ CITATION Pie191 \l 1033 ]

File compression optimizes the original amount of space needed to store data, thus the archive
file that support data compression are the RAR which are commonly archive file format.
According to author even though RAR use classic symmetry encryption algorithm SHA-1
hashing and AES for encryption, these two cannot be cracked easily because of their advance
built security encryption algorithm. Therefore, the author presents an approach paper using
GPUs to speed up the process recovery, however it takes more time to parallelize the SHA-1
hashing, so the author implements course granularity parallel where GPU are only dedicated
validation for password. Thus, the author presents four optimization methods to enhance parallel
version between CPU and GPU. [ CITATION Xia151 \l 1033 ]

Major websites and application come up with password-strength measure, known as password
checker, where it keeps the user password to be authenticate by anonymous hacker, thus, to
prevent producing weak and common string characters and variables for password. Regardless of
stringency, where static checkers will vary to leak such information, the authors address
weaknesses, and proposed and modify dynamic password policy generator, namely DPPG,
which aims to employ the distributed password space and create dynamic friendly policies for
users to create high security level password in terms of password space and distribution.
[ CITATION Shu171 \l 1033 ]
Many banking sectors and application sites uses One-time Password (OTPs) to provide extra
layer of security against unauthorized users, in contrast to basic security method such as "Card
and PIN" or traditional username and password. The researcher implements authentication
process using biometric authentication, featuring the fingerprint recognition based on finger line
patterns of customer, thus the solution is already supported by Internet of things (IoT) device
using Arduino Uno, SIM/GSM/GPRS Shield and fingerprint sensor depending on the user body
temperature before it makes progress. [ CITATION Xia201 \l 1033 ]
References
Dheeraj Hari Patil, D. S. (2018, February 17). Retrieved from A Selective Encryption and fraud detection
on Multimedia: https://www.researchgate.net/profile/Sameer-Mohammad-
4/publication/354529139_A_Selective_Encryption_and_fraud_detection_on_Multimedia_Files_
for_data_security_with_Resource_Optimization_Technique/links/613d13e24e1df271062e9b9e/
A-Selective-Encryption-and-fr

Ibeneme-Sabinus, I. L. (2020, April 24). Journal of Cybersecurity and Information Management (JCIM).
Retrieved from Journal of Cybersecurity and Information Management (JCIM):
https://www.researchgate.net/profile/Ifeoma-Livina-Ibeneme-
Sabinus/publication/342702857_A_Web_Based_Document_Encryption_Application_Software_f
or_Information_Security_in_Tertiary_Institutions/links/5f023431299bf18816038ecc/A-Web-
Based-Document-Encryption-

Khairul Muttaqin, J. R. (2020, May 6). Journal of Applied Engineering and Technological Science (JAETS).
Retrieved from Journal of Applied Engineering and Technological Science (JAETS):
https://journal.yrpipku.com/index.php/jaets/article/view/78

P. Prashanthi, M. D. (2020, October 12). Springer Link. Retrieved from Springer Link:
https://link.springer.com/chapter/10.1007/978-981-15-7961-5_31

Pierre Jordan, E. S. (2019). Towards Designing Advanced Password Cracking Toolkits: Optimizing the
Password Cracking Process. UMAP'19 Adjunct: Adjunct Publication of the 27th Conference on
User Modeling, Adaptation and Personalization, 203–208.

Rafael Alvarez, A. A. (2018). Optimizing a Password Hashing Function with Hardware-Accelerated


Symmetric Encryption. Symmetry.

Shukun Yang, S. J. (2017). DPPG: A Dynamic Password Policy Generation System. IEEE, 545 - 558.

T.R.Reshmi. (2021, November). Science Direct. Retrieved from Science Direct:


https://www.sciencedirect.com/science/article/pii/S2667096821000069

Xiaochun Cheng, A. P. (2020). Implementing Fingerprint Recognition on One-Time Password Device to


Enhance User Authentication. Cyberspace Safety and Security.

Xiaojing An, H. J. (2015). Optimized Password Recovery for Encrypted RAR on GPUs. IEEE.

Dinar Wahidayat Putra, Z., & van der Knaap, W. G. M.  (2018). Urban Innovation
System and the Role of an Open Web-based Platform: The Case of Amsterdam
Smart City. Journal of Regional and City Planning , 29(3), 234-
249. https://doi.org/10.5614/jrcp.2018.29.3.4

Wichmann J., Wißotzki M., Sandkuhl K. (2021) Toward a Smart Town: Digital
Innovation and Transformation Process in a Public Sector Environment. In: Zimmermann
A., Howlett R., Jain L. (eds) Human Centred Intelligent Systems. Smart Innovation,
Systems and Technologies, vol 189. Springer, Singapore. https://doi.org/10.1007/978-
981-15-5784-2_8

Hall, R E, Bowerman, B, Braverman, J, Taylor, J, Todosow, H, & Von Wimmersperg, U.


The vision of a smart city. United States. https://www.osti.gov/biblio/773961

Bakıcı, T., Almirall, E. & Wareham, J. A Smart City Initiative: the Case of Barcelona. J
Knowl Econ 4, 135–148 (2013). https://doi.org/10.1007/s13132-012-0084-9

K. Su, J. Li and H. Fu, "Smart city and the applications," 2011 International Conference on
Electronics, Communications and Control (ICECC), 2011, pp. 1028-1031, doi:
10.1109/ICECC.2011.6066743.

You might also like