Marlon Tayag | Holy Angel University (original) (raw)

Papers by Marlon Tayag

Research paper thumbnail of TOP 10 Cited Computer Science & Information Technology Research Articles From 2009 Issue

The explosive growth of the World Wide Web is making it difficult for a user to locate informatio... more The explosive growth of the World Wide Web is making it difficult for a user to locate information that is relevant to his/her interest. Though existing search engines work well to a certain extent but they still face problems like word mismatch which arises because the majority of information retrieval systems compare query and document terms on lexical level rather than on semantic level and short query: the average length of queries by the user is less than two words. Short queries and the incompatibility between the terms in user queries and documents strongly affect the retrieval of relevant document. Query expansion has long been suggested as a technique to increase the effectiveness of the information retrieval. Query expansion is the process of supplementing additional terms or phrases to the original query to improve the retrieval performance. The central problem of query expansion is the selection of the expansion terms based on which user's original query is expanded....

Research paper thumbnail of Cloud Computing Advances in 2020

Buying a car entails a cost, not counting the day to day high price tag of gasoline. People are l... more Buying a car entails a cost, not counting the day to day high price tag of gasoline. People are looking for viable means of transportation that is cost-effective and can move its way through traffic faster. In the Philippines, motorcycle was the answer to most people transportation needs. With the increasing number of a motorcycle rider in the Philippines safety is the utmost concern. Today technology plays a huge role on how this safety can be assured. We now see advances in connected devices. Devices can sense its surrounding through sensor attach to it. With this in mind, this study focuses on the development of a wearable device named Smart Motorcycle Helmet or simply Smart Helmet, whose main objective is to help motorcycle rider in times of emergency. Utilizing sensors such as alcohol level detector, crash/impact sensor, Internet connection thru 3G, accelerometer, Short Message Service (SMS) and cloud computing infrastructure connected to a Raspberry Pi Zero-W and integrating a...

Research paper thumbnail of Recent Trends In Cloud Computing Articles!!!

The Internet is driving force on how we communicate with one another, from posting messages and i... more The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or "tweeting" your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a...

Research paper thumbnail of Leap Motion Controller Enabled Simulations of Personal Computer Assembly Programs

The merging of both physical and virtual worlds into one seamless reality is an idea that has bee... more The merging of both physical and virtual worlds into one seamless reality is an idea that has been tackled by many disciplines such as computer science, psychology, sociology and even literary genres like science fiction. One such amalgamation is Mixed Reality, which allows for physical and digital objects to co-exist and interact in real time, and it has been used in different areas such as entertainment to military training. This research explores the possibilities for creating collaborative mixed reality in an educational context. In this paper, we developed two (2) simulated realities. The one uses Conventional Screen typically found or see in games and where there are perspective cameras which is First Person Perspective and Third Person Perspective. While the other one is inside Mixed Reality paradigm, where reality and virtual objects co-exist, and used the Leap Motion Controller to support mid-air gestures (controls). We performed comparison between the two simulations and a...

Research paper thumbnail of IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compromising Personal Data Privacy

International Journal of Computer Science and Information Technology, 2020

The Internet is driving force on how we communicate with one another, from posting messages and i... more The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, h...

Research paper thumbnail of Smart Motorcycle Helmet: Real-Time Crash Detection With Emergency Notification, Tracker and Anti-Theft System Using Internet-of-Things Cloud Based Technology

International Journal of Computer Science and Information Technology, 2019

Research paper thumbnail of Compromising Systems: Implementing Hacking Phases

SSRN Electronic Journal, 2019

Research paper thumbnail of Faculty’s perceived readiness, technical competencies, and challenges in online teaching-learning environment

International Journal of Research Studies in Education, 2021

Research paper thumbnail of SMART MOTORCYCLE HELMET: REAL-TIME CRASH DETECTION WITH EMERGENCY NOTIFICATION, TRACKER AND ANTI-THEFT SYSTEM USING INTERNET-OF-THINGS CLOUD BASED TECHNOLOGY

International Journal of Computer Science & Information Technology (IJCSIT) , 2019

Buying a car entails a cost, not counting the day to day high price tag of gasoline. People are l... more Buying a car entails a cost, not counting the day to day high price tag of gasoline. People are looking for viable means of transportation that is cost-effective and can move its way through traffic faster. In the Philippines, motorcycle was the answer to most people transportation needs. With the increasing number of a motorcycle rider in the Philippines safety is the utmost concern. Today technology plays a huge role on how this safety can be assured. We now see advances in connected devices. Devices can sense its surrounding through sensor attach to it. With this in mind, this study focuses on the development of a wearable device named Smart Motorcycle Helmet or simply Smart Helmet, whose main objective is to help motorcycle rider in times of emergency. Utilizing sensors such as alcohol level detector, crash/impact sensor, Internet connection thru 3G, accelerometer, Short Message Service (SMS) and cloud computing infrastructure connected to a Raspberry Pi Zero-W and integrating a separate Arduino board for the anti-theft tracking module is used to develop the propose Internet-of Things (IoT) device. Using quantitative method and descriptive type research, the researchers validated the results from the inputs of the participant who tested the smart helmet during the alpha and beta testing process. Taking into account the ethical consideration of the volunteers, who will test the Smart Helmet. To ensure the reliability of the beta and alpha testing, ISO 25010 quality model was used for the assessment focusing on the device accuracy, efficiency and functionality. Based on the inputs and results gathered, the proposed Smart Helmet IoT device can be used as a tool in helping a motorcycle rider when an accident happens to inform the first-responder of the accident location and informing the family of the motorcycle rider.

Research paper thumbnail of IoT Security: Penetration Testing of White-Label Cloud-Based IoT Camera Compromising Personal Data Privacy

International Journal of Computer Science & Information Technology (IJCSIT), 2020

The Internet is driving force on how we communicate with one another, from posting messages and i... more The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, hacks into the Cloud-based IoT Camera sees everything we do, without us knowing about it. Invading our personal digital privacy. This study focuses on the vulnerabilities found on White-label Cloud-based IoT Camera on the market specifically on a Chinese brand sold by Shenzhen Gwelltimes Technology. How this IoT device can be compromised and how to protect our selves from such cyber-attacks.

Research paper thumbnail of COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES

AIRCC Publishing Corporation, 2019

In the cyber world more and more cyber-attacks are being perpetrated. Hackers have now become the... more In the cyber world more and more cyber-attacks are being perpetrated. Hackers have now become the warriors of the internet. They attack and do harmful things to compromised system. This paper will show the methodology use by hackers to gained access to system and the different tools used by them and how they are group based on their skills. It will identify exploits that can be used to attack a system and find mitigation to those exploits. In addition, the paper discusses the actual implementation of the hacking phases with the virtual machines use in the process. The virtual machines specification is also listed. it will also provide means and insights on how to protect one system from being compromised.

Research paper thumbnail of Perceptions of Grade VII Pupils Tablet PC as a Replacement for Mathematics Textbook

Research paper thumbnail of TOP 10 Cited Computer Science & Information Technology Research Articles From 2009 Issue

The explosive growth of the World Wide Web is making it difficult for a user to locate informatio... more The explosive growth of the World Wide Web is making it difficult for a user to locate information that is relevant to his/her interest. Though existing search engines work well to a certain extent but they still face problems like word mismatch which arises because the majority of information retrieval systems compare query and document terms on lexical level rather than on semantic level and short query: the average length of queries by the user is less than two words. Short queries and the incompatibility between the terms in user queries and documents strongly affect the retrieval of relevant document. Query expansion has long been suggested as a technique to increase the effectiveness of the information retrieval. Query expansion is the process of supplementing additional terms or phrases to the original query to improve the retrieval performance. The central problem of query expansion is the selection of the expansion terms based on which user's original query is expanded....

Research paper thumbnail of Cloud Computing Advances in 2020

Buying a car entails a cost, not counting the day to day high price tag of gasoline. People are l... more Buying a car entails a cost, not counting the day to day high price tag of gasoline. People are looking for viable means of transportation that is cost-effective and can move its way through traffic faster. In the Philippines, motorcycle was the answer to most people transportation needs. With the increasing number of a motorcycle rider in the Philippines safety is the utmost concern. Today technology plays a huge role on how this safety can be assured. We now see advances in connected devices. Devices can sense its surrounding through sensor attach to it. With this in mind, this study focuses on the development of a wearable device named Smart Motorcycle Helmet or simply Smart Helmet, whose main objective is to help motorcycle rider in times of emergency. Utilizing sensors such as alcohol level detector, crash/impact sensor, Internet connection thru 3G, accelerometer, Short Message Service (SMS) and cloud computing infrastructure connected to a Raspberry Pi Zero-W and integrating a...

Research paper thumbnail of Recent Trends In Cloud Computing Articles!!!

The Internet is driving force on how we communicate with one another, from posting messages and i... more The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or "tweeting" your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a...

Research paper thumbnail of Leap Motion Controller Enabled Simulations of Personal Computer Assembly Programs

The merging of both physical and virtual worlds into one seamless reality is an idea that has bee... more The merging of both physical and virtual worlds into one seamless reality is an idea that has been tackled by many disciplines such as computer science, psychology, sociology and even literary genres like science fiction. One such amalgamation is Mixed Reality, which allows for physical and digital objects to co-exist and interact in real time, and it has been used in different areas such as entertainment to military training. This research explores the possibilities for creating collaborative mixed reality in an educational context. In this paper, we developed two (2) simulated realities. The one uses Conventional Screen typically found or see in games and where there are perspective cameras which is First Person Perspective and Third Person Perspective. While the other one is inside Mixed Reality paradigm, where reality and virtual objects co-exist, and used the Leap Motion Controller to support mid-air gestures (controls). We performed comparison between the two simulations and a...

Research paper thumbnail of IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compromising Personal Data Privacy

International Journal of Computer Science and Information Technology, 2020

The Internet is driving force on how we communicate with one another, from posting messages and i... more The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, h...

Research paper thumbnail of Smart Motorcycle Helmet: Real-Time Crash Detection With Emergency Notification, Tracker and Anti-Theft System Using Internet-of-Things Cloud Based Technology

International Journal of Computer Science and Information Technology, 2019

Research paper thumbnail of Compromising Systems: Implementing Hacking Phases

SSRN Electronic Journal, 2019

Research paper thumbnail of Faculty’s perceived readiness, technical competencies, and challenges in online teaching-learning environment

International Journal of Research Studies in Education, 2021

Research paper thumbnail of SMART MOTORCYCLE HELMET: REAL-TIME CRASH DETECTION WITH EMERGENCY NOTIFICATION, TRACKER AND ANTI-THEFT SYSTEM USING INTERNET-OF-THINGS CLOUD BASED TECHNOLOGY

International Journal of Computer Science & Information Technology (IJCSIT) , 2019

Buying a car entails a cost, not counting the day to day high price tag of gasoline. People are l... more Buying a car entails a cost, not counting the day to day high price tag of gasoline. People are looking for viable means of transportation that is cost-effective and can move its way through traffic faster. In the Philippines, motorcycle was the answer to most people transportation needs. With the increasing number of a motorcycle rider in the Philippines safety is the utmost concern. Today technology plays a huge role on how this safety can be assured. We now see advances in connected devices. Devices can sense its surrounding through sensor attach to it. With this in mind, this study focuses on the development of a wearable device named Smart Motorcycle Helmet or simply Smart Helmet, whose main objective is to help motorcycle rider in times of emergency. Utilizing sensors such as alcohol level detector, crash/impact sensor, Internet connection thru 3G, accelerometer, Short Message Service (SMS) and cloud computing infrastructure connected to a Raspberry Pi Zero-W and integrating a separate Arduino board for the anti-theft tracking module is used to develop the propose Internet-of Things (IoT) device. Using quantitative method and descriptive type research, the researchers validated the results from the inputs of the participant who tested the smart helmet during the alpha and beta testing process. Taking into account the ethical consideration of the volunteers, who will test the Smart Helmet. To ensure the reliability of the beta and alpha testing, ISO 25010 quality model was used for the assessment focusing on the device accuracy, efficiency and functionality. Based on the inputs and results gathered, the proposed Smart Helmet IoT device can be used as a tool in helping a motorcycle rider when an accident happens to inform the first-responder of the accident location and informing the family of the motorcycle rider.

Research paper thumbnail of IoT Security: Penetration Testing of White-Label Cloud-Based IoT Camera Compromising Personal Data Privacy

International Journal of Computer Science & Information Technology (IJCSIT), 2020

The Internet is driving force on how we communicate with one another, from posting messages and i... more The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, hacks into the Cloud-based IoT Camera sees everything we do, without us knowing about it. Invading our personal digital privacy. This study focuses on the vulnerabilities found on White-label Cloud-based IoT Camera on the market specifically on a Chinese brand sold by Shenzhen Gwelltimes Technology. How this IoT device can be compromised and how to protect our selves from such cyber-attacks.

Research paper thumbnail of COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES

AIRCC Publishing Corporation, 2019

In the cyber world more and more cyber-attacks are being perpetrated. Hackers have now become the... more In the cyber world more and more cyber-attacks are being perpetrated. Hackers have now become the warriors of the internet. They attack and do harmful things to compromised system. This paper will show the methodology use by hackers to gained access to system and the different tools used by them and how they are group based on their skills. It will identify exploits that can be used to attack a system and find mitigation to those exploits. In addition, the paper discusses the actual implementation of the hacking phases with the virtual machines use in the process. The virtual machines specification is also listed. it will also provide means and insights on how to protect one system from being compromised.

Research paper thumbnail of Perceptions of Grade VII Pupils Tablet PC as a Replacement for Mathematics Textbook