Journal of
Systemics, Cybernetics and Informatics

 ISSN: 1690-4524 (Online)    DOI: 10.54808/JSCI


Behavior of Cell on Micro Ridge Pattern After Continuous Stimulation of Tangential Force
Shigehiro Hashimoto, Yu Morita, Hiroki Yonezawa, Yuji Endo
Pages: 1-7
The behavior of each cell on the micro ridge pattern after the continuous stimulation by a tangential force has been studied in vitro. The stripe-pattern (0.7 μm height, 3 μm width, and 3 μm interval) was made on the surface of the scaffold plate to control the orientation of each cell during the force field stimulation. Variation was made on the angle between the longitudinal direction of the ridge and the direction of the tangential force: 0 degrees, 45 degrees, and 90 degrees. Myoblast (C2C12: mouse myoblast cell line) was used in the experiment. To apply the tangential force field to the cells, the scaffold plate was set in the tube in a conventional centrifugal machine placed in an incubator. After centrifugation for 5 hours, the behavior of each cell at the time-lapse microscope images was traced for 10 hours. The experimental results show that cells on the ridge-lines oriented perpendicular to the tangential force field have the higher activity (migration, and deformation) after stimulation.

Electromagnetic Security Vulnerabilities and Instruction Disassembly of Controller in Adaptive Controllers
Varghese Mathew Vaidyan, Akhilesh Tyagi
Pages: 8-13
A controller in adaptive control theory is a critical part in mission critical applications in military and computer-controlled systems. An ability to identify and follow the binary instruction execution in the controller part enables fault identification and malware detection in safety critical applications. Electromagnetic field emission based identification of controllers execution state from distance will help ascertain security vulnerabilities early on. machine learning models for instruction identification, Principal Component Analysis (PCA), Adaptive Boosting (AB) and Naïve Bayes (NB) were developed to meet this goal. Our preliminary results of implementation on a 2-stage pipelined controller processor architecture demonstrate that the EM side-channel classification approach identifies a controller execution state in Adaptive control with 93% success rate.

Constraint Programming as an AI Option
Russ Abbott, Jung Soo Lim
Pages: 14-22
We examine the history of Artificial Intelligence, from its audacious beginnings to the current day. We argue that constraint programming (a) is the rightful heir and modern-day descendent of that early work and (b) offers a more stable and reliable platform for AI than deep machine learning.

We offer a tutorial on constraint programming solvers that should be accessible to most software developers. We show how constraint programming works, how to implement constraint programming in Python, and how to integrate a Python constraint-programming solver with other Python code.

Power Grid Vulnerability Analysis with Rising Renewables Infiltration
Saikat Das, Zhifang Wang
Pages: 23-32
The increasing penetration of renewable energy has a significant impact on the performance and reliability of the power grid. This is largely because of the uncertainty of the renewable resources and the complex nature of the power system infrastructure. This paper analyzed power grids’ vulnerability to cascading failures with respect to the penetration level of renewable energy into the grid. In this paper, a novel power balance technique is used for cascading failure analysis and power grid vulnerability measurement. The proposed approach incorporates a modified optimal power flow algorithm in the grid vulnerability analysis study which accurately reflects the most probable path of cascading failure evolution process with uncertain renewable generation. The simulation results on IEEE 118 bus system, IEEE 300 bus system and 500 bus system showed that increasing penetration of renewable energy have proportionally higher impact on grid vulnerability to cascading failures due to injection of higher uncertainties into the grid. It was also evident that after a certain level of RE penetration, some system might deteriorate rapidly and preventive measures should be taken if and when RE penetration level exceeds that limit.

Enterprise Systems and Threats
Risa Blair
Pages: 33-36
The scenario included a medium-sized international company. The guidelines were to select and include three enterprise systems that were based on databases, one cloud-based and one that was not SQL-based. Systems were accessible via a browser and included mobile applications. Of key importance for this project was to research potential and known vulnerabilities for these three enterprise systems. The systems selected were ADP Streamline Payroll, Salesforce, and MongoDB. There are numerous threats described in this project, including excessive privileges, SQLi attacks, weak auditing, storage media exposure, unnecessary features enabled, broken configurations, and buffer overflows. Enterprise systems are a potential magnet for hackers on the black market and the Dark Web, as they provide extensive confidential data, particularly in the technology, finance, government, education, healthcare, and retail sectors. It was impressive to see how both ADP and Salesforce provided up-to-date known and potential vulnerabilities. What was the most interesting throughout the research was uncovering the Mongo Lock ransomware and the Salesforce Meatpistol malware. What is worse is that the Salesforce team provided a talk in Las Vegas in July of 2017, where they explained how Salesforce attacked its own system to see how well it would hold up against cyber attacks. The talk focused on Meat pistol, a malware too for making it easier to conduct the attacks from the standpoint of infrastructure automation, implant creating, and interaction. The intent was to make it easier for the Salesforce teams to conduct their attacks. They utilized the methodology of the well-known tool, Metasploit, which does not exploit systems or launch attacks. It just provides the framework for hackers to control systems after they have been able to access what they choose. The duo of “red team” inside hackers explained their process for access the system through the utilization of Meatpistol, against the advice of their superiors. Immediately after the presentation, they were fired.

Interdisciplinary Skills Development Through Final Qualification Assessment: Survey Study for European and Oriental Languages Programs
Rusudan Makhachashvili, Ivan Semenist
Pages: 37-48
Foreign Languages Acquisition and Linguistic Education assessment are fundamentally interdisciplinary processes, informed by the nature of linguistic content and types of communicative and professional activities. Cross-sectorial factors of societal change, that provide the backdrop for an interdisciplinary skillset critical transformation, crucial for the COVID-19 emergency educational framework, are considered. The study is based on identification of various interdisciplinary competency principles, derivative of 21st century skills for university staff members and projected digital literacy requirements. It is determined how in the situation of the COVID-19 pandemic lockdown (March 2020 through December 2020) all elements of the Final Qualification Assessment at Borys Grinchenko Kyiv University, Ukraine, for European and Oriental Languages programs have been relegated to the digital, remote or hybrid format with the use of ICT tools and skills that comprise an interdisciplinary realm of Foreign Languages acquisition and assessment. Every step of the procedure adaptation to digital format required accelerated dynamic development of interdisciplinary skills of all participants and officials and cross-sectorial activities, otherwise not carried out through assessment of Foreign Languages programs.

Artificial Intelligence and Neuroscience: The Impact on Data Protection and Privacy
Nicola Fabiano
Pages: 49-57
Starting from a multidisciplinary approach, we want to investigate the kind of impact of high technologies used in neuroscience on humans to analyse the effects on data privacy and protection domain. It is still a field under a due course of deepening, and probably there are few scientific pieces of evidence, but it certainly is one of the most relevant challenges of our times although some people think this is a topic of the future. Neuroscience, data protection and privacy are current aspects, and we should deal with them now to avoid unrecoverable consequences or distorted findings. What will be the destiny of privacy and data protection in the neuroscience domain? Our approach is not technical, and thus we will not describe or propose specific technical solutions. Still, our goal is to warn about the possible effects on data protection and privacy, essentially on human dignity, hoping scientists would consider the principles laid down by the current laws and Ethics. Indeed, here comes into play also another fundamental aspect which is exactly Ethics. There is some very innovative research on the human brain in the neuroscience field, where scientists decided to use high-technologies and artificial intelligence to investigate and deepen the effects on human behaviour. We are facing a challenge, and we already heard about "neuroprivacy". This new term entails examining another privacy sector to deal with, and it led us to create a neologism which we defined as "neuroprivacy rights". Hence, there is needing to investigate all the legal effects on data protection and privacy derived from applied technologies in the neuroscience field to clarify whether we have a new category of rights. We think it is crucial to apply the Data Protection and Privacy Relationships Model (its acronym is DAPPREMO) in this deepening path.

Experiment of Music Therapy Conducted at a Classical Music Recital - Measurement of Pulse Wave, Blood Pressure and Mind Orientation -
Hirotoshi Hishida, Riku Kasahara, Keiko Hishida, Yamato Fujii, Yasuhiro Hishida, Hina Etoh, Mitsuhiro Hishida
Pages: 58-65
It is widely known that music affects physical and mental condition, and attempts to prescribe music instead of medicine are being made in various places. However, there are large individual differences in effects of music. Authors consider that general prescription method has not been established yet. In the present study, a music therapy experiment was conducted at an actual concert held in public. It was a piano recital commemorating the 250th anniversary of Beethoven's birth, and all the pieces played were Beethoven's. Twenty-eight subjects was women and men, aged 19 to 68. They were classified into four groups according to whether they liked classical music and whether they knew the pieces to be performed. Their blood pressure, pulse wave, cardiac orientation, hand sweat, salivary amylase, and muscle hardness were measured. Results suggested that Beethoven's piano pieces generally provide a relaxing effect on the listeners. In this paper, the experimental results are discussed, which is mainly on the pulse wave measurement conducted on four subjects, on the blood pressure, and on the directivity of the mind conducted on all subjects. Furthermore, it turned out that the method needed to be improved when experiments were conducted at an actual concert.

Interpersonal Tensions within Organizations – A Systemic Approach for Personal Development
Philipp Belcredi, Tilia Stingl de Vasconcelos Guedes
Pages: 66-72
This paper aims to contribute to the design of a new conceptual model for coping with obtrusive interpersonal tensions in the context of a systemic organizational development process. The model integrates notions of the Value and Development Square (VDS) into a structured process, with ideas from the hypnosystemic work and solution-focused questions. This results in an approach that can be taught to and applied by those seeking solutions for interpersonal tensions within an organization. For the model's educational applicability, we developed a conceptual bridge: we split the attentiveness process—which occurs during the search for solutions for an unpleasant tension—into interrelated dimensions. In doing so, the process using the VDS can be observed in "small steps," and, if necessary, suitable interventions can be developed.

This paper provides ideas for using this augmented version of the square, including specific questions for those involved in adverse interpersonal tensions that induce reflection and/or inspire a perspective change. With this adaption of the original VDS, we aim to offer a valuable tool for leaders, coaches, mediators, and employees. It aids in rapidly structuring complex situations where stressful tensions persist and assists those engaged in interpersonal tensions to transform those tensions into useful levers for collective goals.