An expert system imitates the decision–making adeptness of a human expert. They are intended to answer complicated questions characterized mainly as if–then rules instead of traditional procedural code. A major problem facing the cultivation of rubber (Hevea brasiliensis) in developing countries is the destructive effect of pathogens which result in about fifty percent (50%) loss in crop yield. This problem persists, due to a communication gap between agricultural researchers, such that field extension officers, and farmers are hampered by various operational and logistic challenges. This paper is an effort to bridge this gap, and hence features an expert system that can be accessed online by farmers. The expert system allows farmers to select disease symptoms presented in categories from a JAVA based user friendly graphical interface. The output generated by the rule–base engine, diagnoses the diseases of the rubber crop, and suggests curative and preventive measures. The main source of information for developing the expert system’ knowledge–base was the Rubber Research Institute, Iyanomo, Edo State, Nigeria.
Cybersecurity is crucial to digital marketing hence dealing with security threats in cyberspace is essential for success in digital marketing which is an online business. The cornerstone of any online business is security. The primary objective of any form of online marketing business is to connect a business or organization with its target audience via digital channels. This paper identifies strategies put in place for a successful digital marketing business in the midst of incessant cyber threats. Online survey was used to collect data from those involved in one form of digital marketing or the other. This includes social media promotion, mobile phone advertising, content marketing, influencer advertising, third-party merchant marketing, search engine optimization, paid channel advertising. Usable data was collected from 680 participants who were members of a Facebook group of 34,000 digital marketers. The data gathered was evaluated using (SPSS). Responses from digital marketers indicated major cybersecurity threats and the different ways digital marketers have been able to explore them were exposed.
Computers are involved in every aspect of modern society and have become an essential part of our lives, but their vulnerability is of increasing concern to us. Security flaws are inherent in the operation of computers Most flaws are caused by errors in the process of software engineering or unforeseen mishaps and it is difficult to solve these problems by conventional methods. A radical way of constantly monitoring the system for newly disclosed vulnerabilities is required. In order to devise such a system, this work draws an analogy between computer immune systems and the human immune system. The computer immune system is the equivalent of the human immune system. The primary objective of this paper is to use an intrusion detection system in the design and implementation of a computer immune system that would be built on the framework of the human immune system. This objective is successfully realized and in addition a prevention mechanism using the windows IP Firewall feature has been incorporated. Hence the system is able to perform intrusion detection and prevention. Data was collected about events occurring in a computer network that violate predefined security policy, such as attempts to affect the confidentiality, integrity or its availability using Snort rules for known attacks and adaptive detection for the unknown attacks. The system was tested using real-time data and Intrusion Detection evaluation (IDEVAL) Department of Defense Advanced Research Projects Agency (DARPA) data set. The results were quite encouraging as few false positive were recorded.
In this work the impact of the 6to4 tunnels is considered. In order for traffic to flow from an Internet Protocol version 4(IPv4) website to a native Internet Protocol version 6(IPv6) website, an additional configuration must be added to the network, as this cannot be done by default. The Riverbed Modeler Academic Version 17.5 is used to build and evaluate network efficiency with optimized 6to4 tunnels. The performance of the network is assessed based on the traffic received and sent by Internet Protocol (Version 6), Voice Called Traffic and the Sent and Received Traffic of the configured applications. The flow of traffic from servers to workstations in native IPv6 sites shows the effect of the tunnel configured.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.