Semiconductor Science and Information Devices

Journal Information
EISSN : 2661-3212
Published by: Bilingual Publishing Co. (10.30564)
Total articles ≅ 24

Latest articles in this journal

Shaun Mc Brearty, William Farrelly, Kevin Curran
Semiconductor Science and Information Devices, Volume 3; doi:10.30564/ssid.v3i2.3347

In the absence of specialized encryption hardware,cryptographic operations must be performed in main memory.As such,it is common place for cyber criminals to examine the content of main memory with a view to retrieving high-value data in plaintext form and/or the associated decryption key.In this paper,the author presents a number of simple methods for identifying and extracting cryptographic keys from memory dumps of software applications that utilize the Microsoft .NET Framework,as well as sourcecode level countermeasures to protect against same.Given the EXE file of an application and a basic knowledge of the cryptographic libraries utilized in the .NET Framework,the author shows how to create a memory dump of a running application and how to extract cryptographic keys from same using WinDBG - without any prior knowledge of the cryptographic key utilized.Whilst the proof-of-concept application utilized as part of this paper uses an implementation of the DES cipher,it should be noted that the steps shown can be utilized against all three generations of symmetric and asymmetric ciphers supported within the .NET Framework.
Sabina Bogati, Mahesh Sharma, Rajesh Shrestha
Semiconductor Science and Information Devices, Volume 3; doi:10.30564/ssid.v3i1.3138

The atmosphere of planet plays a great role in numerous weather phenomena which affects our life directly. To understand these phenomena, it requires knowledge about the relation between temperature and humidity.The effects of temperature on humidity influence the potential for precipitation. It also directly influences the human health and well-being. Relative humidity and dew point are the two parameters that are used by the meteorologists for understanding the interaction between temperature and humidity. Therefore there is a necessary of a smart monitoring system which is fully automated, accurate and capable enough to monitor all the parameters with accuracy. Besides, it should be portable and less expensive. For this purpose, the digital portable wireless temperature and humidity monitoring device is designed. This project consists of HC-05 Bluetooth module, DHT-11, Arduino UNO, 16 X 2 LCD, and smartphone. The data are recorded at different part of Kathmandu Valley with this device wirelessly by using smartphone and analyze it with the help of Origin software.
Ayuba John, Abdulazeez Yusuf, Abdulhamid Ardo
Semiconductor Science and Information Devices, Volume 3; doi:10.30564/ssid.v3i1.3060

The acquisition of data, the processing of those data for use by the operator, and control of remote devices are the fundamental building blocks of all modern utility control systems. Manual calculations, technical analysis and conclusions were initially adopted in power system design, operation and control. As the power system grow it become more complex due to the technical advancements, variety and dynamic requirements. Artificial intelligence is the science of automating intelligent behaviours currently achievable by humans. Intelligent system techniques may be of great help in the implementation of area power system controls. While smart grid can be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated control, high power converters, modern communications infrastructure, sensing and metering technologies, and modern energy management techniques based on the optimization of demand, energy and network availability, and so on. The big picture of the whole transmission grid, in the context of smart grids, is still unclear; and in Nigeria no studies have been put on ground in order for the existing network to be turn into a smart grid. In this research work emphasis is place on generation and transmission stations; power optimization using artificial intelligent techniques and wireless sensor networks for power control management system.
Benjamin Ashby Smith, Kevin Curran
Semiconductor Science and Information Devices, Volume 3; doi:10.30564/ssid.v3i1.3151

Microprocessors such as those found in PCs and smartphones are complex in their design and nature. In recent years, an increasing number of security vulnerabilities have been found within these microprocessors that can leak sensitive user data and information. This report will investigate microarchitecture vulnerabilities focusing on the Spectre and Meltdown exploits and will look at what they do, how they do it and, the real-world impact these vulnerabilities can cause. Additionally, there will be an introduction to the basic concepts of how several PC components operate to support this.
Joseph Williamson, Kevin Curran
Semiconductor Science and Information Devices, Volume 3; doi:10.30564/ssid.v3i1.3152

Multi-factor Authentication (MFA) often referred to as Two-factor Authentication (2FA), which is a subset of MFA, is the practice of implementing additional security methods on top of a standard username and password to help authenticate the identity of a user and increase the security of data.This chapter will investigate the problem with username and password logins, the different types of authentication, current best practice for multi-factor authentication and interpretations about how the technology will grow in the upcoming years.
Dylan Rafferty, Kevin Curran
Semiconductor Science and Information Devices, Volume 3; doi:10.30564/ssid.v3i1.3153

Cyber security breaches are on the rise globally. Due to the introduction of legislation like the EU’s General Data Protection Regulation (GDPR), companies are now subject to further financial penalties if they fail to meet requirements in protecting user information. In 2018, 75% of CEOs and board members considered cyber security and technology acquisitions among their top priorities, and blockchain based solutions were among the most considered options. Blockchain is a decentralised structure that offers multiple security benefits over traditional, centralised network architectures. These two approaches are compared in this chapter in areas such as data storage, the Internet of Things (IoT) and Domain Name System (DNS) in order to determine blockchain’s potential in the future of cyber security.
Bibek Dhungana, Mahesh Sharma, Rajesh Shrestha
Semiconductor Science and Information Devices, Volume 3; doi:10.30564/ssid.v3i1.3137

The temperature,humidity,atmospheric pressure and altitude are the most important parameters of the environment.If those parameters are known,it will help to select the best crops for specific location which increases the productivity in agricultural field.This is very useful for countries like Nepal where the most of people in this country depends on agriculture.In this research,an Arduino based device is constructed which measures those parameters and record the data in real time.The DHT22 and BMP180 sensors are used for measurin those parameters whereas RTC and SD Card module is used to record the data in real time. Data can be displayed on LCD and serial monitor of computer or laptop.The data were collected at Tri-Chandra Multiple College,Ghantaghar and at Gaurighat,Chabahil with the help of Arduino based device.In this project, the digital portable weather station monitoring system has been designed and data from this device compared with the data obtained from HTC-2 standard device and error analysis has been done.
Ibrahim Goni, Abdulrahman Saidu, Umar Maigari T.
Semiconductor Science and Information Devices, Volume 2; doi:10.30564/ssid.v2i2.2496

E-Government is the use of information and communication Technologies (ICT) such as internet, smart phones, telecommunication, mobile company among others to interact between government and the citizens in running the affairs of the country such as decision making etc. The impact and potential of ICTs have not been fully exploited in the Nigerian context, leaving government in a weak position to formulate policy comprehensively and implement plans effectively. Despite the fact that E-government has been implemented for a while now in Federal Capital Territory (FCT) of Nigeria Abuja, but its effectiveness is not impressive. The citizens connection to the government is limited it can be improved more easily using electronic means of communication, A reduction in corruption cases as accountability and transparency can also be increased, Equal opportunity will be given to all to access information irrespective of the person’s physical location or disability and the elimination of the bureaucracy experienced in government offices. This research work is aimed at assessing the effectiveness of e-government in federal capital territory of Nigeria Abuja using Seoul Metropolitan Government as a yard stick for measuring the effectiveness. Questionnaire was used as a primary method of data collection, internet and library as secondary data. The data obtained from the questionnaire has been analyzed using frequency table and percentage. The findings of this work shows that 41.91% of the respondents agree e-government initiatives have decreased civil servants corruption in Abuja, 46.81% of the respondents agree that E-government services has increased citizens trust in Abuja, 58.11% of the respondents believe that E-government initiative have increased the accessibility to the government in Abuja however 37.11% agree that Lack of IT infrastructure is the major problem affecting E-government in Abuja.
Gbeminiyi Musibau Sobamowo, A A. Yinusa, O. A. Adesina, O. M. Oyekeye
Semiconductor Science and Information Devices, Volume 2; doi:10.30564/ssid.v2i2.1887

In this paper, nonlinear vibration of electrostatically actuated microbeam is analyzed using differential transformation method. The high level of accuracy of the analytical solutions of the method was established through comparison of the results of the solutions of exact analytical method, variational approach, homotopy analysis method and energy balance methods. Also, with the aid of the present analytical solution, the time response, velocity variation and the phase plots of the system are presented graphically. It is hope that the method will be widely applied to more nonlinear problems of systems in various fields of study.
Ibrahim Goni, Jerome Mishion Gumpy, Timothy Umar Maigari
Semiconductor Science and Information Devices, Volume 2; doi:10.30564/ssid.v2i2.2495

We live in a connected world of digital devices which include mobile devices, workstations, control systems, transportation systems, base stations, satellites of different interconnected networks, Global positioning system (GPS) with their associated e-services in which internet provide platform for the connection of this devices worldwide. cyber forensics as a sub-branch of computer security that uses software and predefined techniques which is aim at extracting evidences from any form of digital device and can be presented to a court of law for criminal and/or civil proceedings provided that it satisfy this three conditions; comprehensiveness, authenticity and objectivity. Cyber space is recently considered a domain worth exploring and investigating and securing after lithosphere, hydrosphere, biosphere and atmosphere. Cyber threats, attacks and breaches have become a normal incident in day-to-day life of internet users. However, it is noted that cybersecurity is based on confidentiality, integrity and validity of data. In this research work machine learning algorithms applied to cybersecurity and cyber forensics are clearly explored and pave away for further research directions on the application of deep learning, computational intelligence, soft computing to cybersecurity and cyber forensics.
Back to Top Top