<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="http://hdl.handle.net/20.500.12323/644">
    <title>DSpace Collection:</title>
    <link>http://hdl.handle.net/20.500.12323/644</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="http://hdl.handle.net/20.500.12323/6152" />
        <rdf:li rdf:resource="http://hdl.handle.net/20.500.12323/5484" />
        <rdf:li rdf:resource="http://hdl.handle.net/20.500.12323/5483" />
        <rdf:li rdf:resource="http://hdl.handle.net/20.500.12323/5457" />
      </rdf:Seq>
    </items>
    <dc:date>2026-04-03T06:49:47Z</dc:date>
  </channel>
  <item rdf:about="http://hdl.handle.net/20.500.12323/6152">
    <title>The impact of security and privacy issues on data management in fog Computing</title>
    <link>http://hdl.handle.net/20.500.12323/6152</link>
    <description>Title: The impact of security and privacy issues on data management in fog Computing
Authors: Adepoju, Alamu Luke
Abstract: With the increased growth of the application domains of IoT and the associated volumes of data generation, IoT systems are complicated and have small storage and recycling capacity. The cloud, a primary IoT storage medium with countless benefits, is not ideal for processing real time IoT data without delays. Capacity of data generated by IoTs keep increasing rampantly with associated security risks and privacy-preserving problems. Therefore, privacy maintenance, confidentiality and integrity of user’s data, improved latency and bandwidth restrictions are some of the major respective challenges of cloud computing.&#xD;
Fog computing is therefore a novel paradigm and an extension of the cloud. Which aims to improve cloud efficiency by enabling IoTs to locally process data before cloud transmission. However, some of the issues present in cloud such as the establishment of connection between edge devices often raise security and privacy concerns are also inherent in fog.&#xD;
The goal of this study, however, is to look at the state of data management security and privacy in a fog computing environment by reviewing existing security frameworks and data privacy procedures. This study lays bare the security vulnerabilities that exist inside the fog environment, creating hazards to user data privacy and security, and in lieu of that, this study incorporates features of data in addition to the acquired facts and statistics. Privacy-preservation is key to the continued use of services within the context of internet usage, as a result respondents indicated that they were experienced internet users who have been using the internet and its associated resources for various purposes, however respondents neither agreed nor disagreed with the possibility of the tracking or monitoring of their usage of the internet. The perception of respondents influenced the usage of the internet and various computing devices.</description>
    <dc:date>2022-05-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://hdl.handle.net/20.500.12323/5484">
    <title>Generative Adversarial Network Image synthesis method for skin lesion Generation and classification</title>
    <link>http://hdl.handle.net/20.500.12323/5484</link>
    <description>Title: Generative Adversarial Network Image synthesis method for skin lesion Generation and classification
Authors: Mutepfe, Freedom
Abstract: Skin cancer is the most commonly diagnosed cancer in today's growing population. One of the common limitations in the treatment of cancer is in the early detection of this disease. Mostly, skin cancer is detected in its later stages, when it has already compromised most of the skin area. Early detection of skin cancer is of utmost importance in increasing the chances for successful treatment, thus reducing mortality and morbidity. Currently, most dermatologists use a special microscope to examine the pattern and the affected area. This method is time-consuming and is prone to human errors, so there is a need for detecting skin cancer automatically. In this study, we investigate the automated classification of skin cancer using the Deep Convolution Generative Adversarial Network(DCGAN).In this work, Deep Convolutional GAN is used to generate realistic synthetic dermoscopic images, in a way that could enhance the classification performance in a large dataset and to evaluate whether the classification accuracy is enhanced or not, by generating a substantial amount of new skin lesion images. The DCGAN is trained using images generated by the Generator and then tweaked using the actual images and allow the Discriminator to make a distinction between fake and real images. The DCGAN might need slightly more fine-tuning to ripe a better return. Hyperparameter optimization can be utilized for selecting the best-performed hyperparameter combinations and several network hyperparameters, namely number of iterations, batch size, and Learning rate can be tweaked, for example in this work we decreased the learning rate from the default 0.001 to 0.0002 and the momentum for Adam optimization algorithm from 0.9 to 0.5, in trying to reduce the instability issues related to GAN models. Moreover, at each iteration in the course of the training process, the weights of the discriminative and generative network are updated to balance the loss between them. This pretraining and fine-tuning process is substantial for the model performance.</description>
    <dc:date>2021-01-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://hdl.handle.net/20.500.12323/5483">
    <title>Evaluation Of EOR Potential in Shale Oil Reservoir, Focusing on Wettability, and In-Situ Fluid Composition</title>
    <link>http://hdl.handle.net/20.500.12323/5483</link>
    <description>Title: Evaluation Of EOR Potential in Shale Oil Reservoir, Focusing on Wettability, and In-Situ Fluid Composition
Authors: Ahmed, Imtiaz
Abstract: Developing shale oil and gas resources is becoming essential due to the continuous depletion of conventional reservoirs. As the thrust towards shale oil resources increases, the petroleum industry, especially in countries striving to mitigate the challenges of such reservoirs. One of the essential techniques utilized to increase the production capability of such reservoirs is hydraulic fracturing. Besides, EOR gas injection assists the recovery of the process by increasing pressure and decreasing the oil's viscosity. This research evaluates EOR potential by focusing on wettability variations on recovery performance. In unconventional shale oil reservoir. The candidate reservoir is based on a simple layer cake model, simulated on a dual permeability approach with four fractured layers. The reservoir is first perforated, and then the reservoir is undergone through the EOR CO2 cyclic gas injection process.&#xD;
They huff and puff cycle has been done in the reservoir model for ten years. The research studies the effect of wettability on an unconventional reservoir. Three different wettability cases in 3 different permeability models, i.e., 0.00001 mD, 0.0001 mD, and 0.001 mD, are studied. The sensitivity result shows that the 0.001 mD model possesses the highest cumulative production accounts for 550,000 BBL, followed by 0.0001 mD and 0.00001 mD. Through sensitivity analysis and comparison, it has been concluded that wettability variations do affect the recovery performance in the reservoir model that is even below 0.01 mD permeability. Besides, the changes in the wettability in 3 different permeability distribution models significantly improve the production performance of the reservoir.</description>
    <dc:date>2021-01-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://hdl.handle.net/20.500.12323/5457">
    <title>Assessment of Security Threats on IoT Based Applications: Cyber Security Case Study in Cloud-Based IoT Environment Using the Example of Developing Cloud Information Security Technology in Banking</title>
    <link>http://hdl.handle.net/20.500.12323/5457</link>
    <description>Title: Assessment of Security Threats on IoT Based Applications: Cyber Security Case Study in Cloud-Based IoT Environment Using the Example of Developing Cloud Information Security Technology in Banking
Authors: Dursunzade, Oruj
Abstract: The main objective of this master’s thesis is to emphasise on internet cyber security viewpoint on the appliances and the environment of the internet of things (IoT). In recent studies, there has been an exponential rise in the number of IoT devices and the usage rate of these devices is frequent because they are used in everyday life. Hence, the need to secure these IoT devices is becoming more and more crucial. The specified research methodology was sub-divided into two main parts. The first part of the research was about investigating and studying the environment and the IoT architectural viewpoint. Also, what is currently available in the market, the different types of IoT appliances commonly utilised, and their purpose. This part also clearly emphasises the basic rules used to protect devices in such an environment against the most common forms of cyber-attacks.&#xD;
Study Design. The study adopted a mixed-method research design utilising case study and pragmatic philosophical reasoning, the exploratory approach was deemed appropriate because it enabled the research to be conducted by emphasising various aspects of the case under review. The study found out that the common vulnerabilities on IoT are malware, outdated software, weak passwords, storing data in clear texts. The vulnerabilities are exploited by cyber attackers to cause a denial of service and other forms of attacks that have caused millions of losses in the banking industry. Improved technology has also lead to increased cyber security risks in the banking industry. Therefore, the banking industry needs to take much care in regards to this and prevent cyber-attack directed to them as high as possible by being on guard always. To overcome the vulnerabilities counter measures must be put in place. Some of the counter measures are regular software updates, installation, and constant checks using antiviruses. Developing automated patching software to mitigate the vulnerabilities.</description>
    <dc:date>2021-01-01T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

