CHAIN - Issue III, MAY 2025

Page 1


Dear Readers,

It is with immense pride that I welcome you to the third edition of CHAIN Magazine, the official publication of the Faculty of Artificial Intelligence at Al-Balqa Applied University (BAU). This special issue celebrates the extraordinary achievements of our students and their pivotal contributions to the ever-advancing fields of technology and innovation. From groundbreaking projects in artificial intelligence and cybersecurity to innovative applications in data science, our students are not only pushing the boundaries of possibility but also demonstrating exceptional leadership in research and development.

At BAU, we are deeply committed to cultivating a culture of scientific excellence and innovation. Guided by a team of distinguished faculty members, our students are conducting transformative research in critical areas such as AI, information security, data science, digital forensics, and virtual reality. These efforts are made possible by the university’s unwavering support, which includes providing essential resources and funding to empower our academic community to address global challenges and drive progress in these vital domains.

As you delve into this edition of CHAIN Magazine, I encourage you to reflect on the remarkable strides our students have made. Their dedication, creativity, and hard work are not only shaping the present but also paving the way for a brighter, more innovative future.

Sincerely,

Pioneering the Future: The Faculty of

Artificial Intelligence

General Supervisor

As we turn the page to this special edition of our magazine, it’s with great pride and excitement that we highlight the incredible work of our students in their graduation projects.

This issue is dedicated to showcasing the innovative ideas and groundbreaking research that our future leaders in artificial intelligence have brought to life. Each project is a testament to the hard work, curiosity, and passion that shows how these young minds are shaping the future of technology. This year's projects reflect not only their deep technical knowledge but also their creativity and drive to solve real-world problems. From cutting-edge machine learning algorithms to applications in healthcare and sustainability, our students are setting the stage for future advancements in artificial intelligence.

The diverse range of projects showcases the versatility of AI, where students have applied their skills to solve pressing issues, whether in robotics, data analysis, or even addressing ethical concerns in AI deployment.

Dr Aryaf Aladwan

WAIT! IT’s ALL CONNECTED !! LIKE A CHAIN ?

Executive Director WELCOME LETTER

Welcome to the world of CHAIN, where innovation and creativity meet! We are thrilled to present the third issue of our magazine, showcasing the incredible talent, dedication, and hard work of the AI faculty and its students.

With originality at its heart, this issue features thought-provoking articles, groundbreaking graduation projects, and inspiring ideas that challenge the way we think. From fresh perspectives to in-depth research, every page is crafted to engage and inspire you.

As we continue this journey, we invite you to explore, learn, and celebrate the progress we’ve made together. This issue is a reflection of our vibrant community, filled with curiosity and passion for discovery.

You can read our digital magazine by scanning the QR code. Thank you for joining us in this exciting chapter. Let’s explore endless possibilities together!

Thank you for reading!

Owen Sumadi

Abdelaziz SARi

Editor-in-Chief

General Supervisor

Dr. Aryaf AL-Adwan

Managing Director

Karam Yaseen

Editor-in-Chief

Abdelaziz Sari

Logistics

Diala Al-Qudah

Raghad Fadi

Sarah Jaber

Editorial

Jana Maher

Lara Bawaneh

Design

Amin Al-Sadi

Bayan Al-Shuaibat

Contributors

Abdelrhman Abuamashah

Ahmad Al-hasasneh

Aseel Rasheed

Farah Al-Zyadneh

Hind Fakhoury

Issa Sawaged

Lujain Alsmadi

Majd Alassi

Marwa AL-Dhayat

Masa Malkawi

Obadah Abuodeh

Omar Abugosh

O'taymh Abu Taha

Rama Alhiyari

Raya Obaid

Saleh Ghannmah

Salem Tou

Sarah Elasali

Sarah Sweilmeen

Sereen Al-Balawnah

CON TEN TS*

he Hackers’ New Best Friend

evolving world of cybercrime, staying ahead of the curve is critical. The latest buzz in rground hacking scene is a new AI tool called "WarmGPT." Hackers have swapped intimidating tactics for a friendlier approach, declaring: "Phishing season just got cozier.

WarmGPT is a rogue adaptation of OpenAI's ChatGPT. Its purpose is clear: to craft phishing emails that are warm, convincing, and disarmingly friendly. Gone are the days of broken-English scams about dubious inheritances from foreign princes. WarmGPT creates emails so authentic that they could fool even the most cautious recipients.

A New Era of Deception

Imagine scrolling through your inbox and spotting an email from your bank. The subject line reads: "A Little Check-In for Our Favorite Customer." It begins: "Hi there, we hope your day is as sunny as your smile! We noticed a small issue with your account. Would you mind confirming your details so we can keep everything running smoothly? You're the best!"

By the time you're halfway through, you might feel inclined to hand over your Social Security number, credit card details, and even your Netflix password. All because they asked nicely.

The Genius of WarmGPT

WarmGPT's brilliance lies in its ability to humanize phishing attempts. Hackers no longer rely on crude scare tactics or poorly designed PDFs stuffed with malware. Instead, they use AI to craft emotionally manipulative messages. WarmGPT writes with the charm of an overly cheerful coworker who always brings cupcakes to meetings.

But WarmGPT's use isn't limited to emails. Hackers also impersonate customer service representatives in live chats. Picture this: you're seeking help with an online order and share personal information with someone who replies, "Oh no! We totally get how frustrating that must feel. Could you just share your password so we can fix it right away?"

Message Warm ChatGPT

The Struggle for Cybersecurity

Cybersecurity experts are scrambling to counter this new threat. "The problem is that WarmGPT's phishing attempts don't look like scams," one analyst explained. "They're polite. They're personal. They even recommend podcasts!"

This wave of AI-enhanced phishing poses a significant challenge. Traditional red flags, like typos or overly formal language, are no longer reliable. WarmGPT's natural-sounding tone blurs the line between genuine communication and scams.

How to Protect Yourself

1. Pause Before Responding: If an email feels unusually warm or personal, verify the sender.

2. Look for Clues: Check email addresses and URLs carefully for inconsistencies.

3. Verify Through Official Channels: Contact companies or banks directly to confirm any suspicious requests.

4. Trust Your Instincts: If something feels off, it probably is.

Albert Einstein once said: "The world will not be destroyed by those who do evil, but by those who watch them without doing anything." While he wasn't talking about phishing, the advice is clear: stay vigilant.

If an email seems too warm and fuzzy to be true, it might be a hacker wrapped in a digital Snuggie. Stay sharp and protect your data.

The greatest threat to your security isn’t technology; it’s misplaced trust in the wrong hands.

THERE IS AN ISSUE WITH YOUR ACCOUNT. PLEASE VERIFY YOUR IDENTITY BY PROVIDING YOUR PASSWORD.

Artificial intelligence has improved daily life by boosting productivity, education, and wellbeing. This project presents AI-enabled glasses, a wearable assistant offering quick

Project Vision and Goals

The first version of the glasses focuses on educational support, particularly for IT students. Key features include: - AI-assisted note-taking - Automated flashcard reminders - Real-time explanations and subject summarization - Instant access to relevant study materials.

For example, if a student struggles with a topic, the glasses can retrieve summaries, explanations, or flashcards instantly. Initially targeting IT fields, the database will expand to other disciplines in future versions. This hands-free wearable ensures students stay engaged without distractions, unlike traditional devices such as smartphones or tablets. The discreet design enables seamless integration into lectures and study sessions. information access, hands-free use, and real-time study support. Inspired by my experience as a student, where AI tools enhanced my academic performance, these glasses aim to simplify complex tasks, improve focus, and deepen understanding of study material.

Practical Advantages Wearable AI offers unique benefits over conventional devices. The glasses' hands-free operation helps students access information unobtrusively, making it ideal for classrooms and study environments. By reducing time spent searching for answers, the glasses optimize study processes, improve focus, and enhance overall academic outcomes.

nalog vs. Digital: The Battle of Modern and Old

Analog and digital systems differ in how they handle, store, and transmit information. Analog relies on continuous signals that mimic natural variations, while digital uses discrete binary codes. Both have strengths and limitations, making the choice between them dependent on specific needs.

Analog: Authentic and Simple

Analog systems use continuous signals that closely represent real-world changes. In audio, for example, analog captures sound as continuous electrical signals, creating an authentic output. Many audiophiles prefer vinyl records for their natural and “warmer” sound compared to digital formats.

Analog devices like thermometers and early TVs are simple in design. They don’t require complex circuits or software, making them durable and easier to repair in environments lacking advanced tools. However, analog signals degrade over time due to noise, interference, and aging components, reducing their reliability.

Digital technology stands out for its versatility. Devices like smartphones combine multiple functions in one system. Digital tools can also be updated through software without major hardware changes. Storage options, such as solid-state drives and cloud platforms, provide vast, durable storage compared to analog media. However, digital systems sometimes lack the natural quality of analog, especially in areas like audio or video.

Analog and Digital Together

Despite their differences, analog and digital often work together. For example, music studios may record in analog for richness but convert to digital for editing and sharing. Similarly, analog sensors collect real-world data, like temperature or pressure, which digital systems process and analyze.

Analog vs digital.txt

Analog and digital are complementary. Analog excels in authenticity and simplicity, while digital is precise and adaptable. Instead of choosing one, a balanced approach that combines both may unlock their full potential. Which would you prioritize, or do you see value in both?

A CAMERA WITH A MIND AI SURVEILLANCE

he Real-Time Factory Monitoring System, a revolutionizes workplace safety and security. This intelligent surveillance system develops a safer and more effective work environment by incorporating advanced object detection, face recognition, and

emotion analysis. Unlike conventional security measures, which mostly depend on human oversight, this automated system enhances threat detection, reduces human error, and accelerates response times. Factories and warehouses, which house valuable equipment and critical production processes, can greatly benefit from its real-time protection against intrusions and workplace incidents.

Three AI-powered models form the core of the system for comprehensive surveillance. Face detection by MediaPipe model and Cascade Classifier does real-time scanning of employees' faces and matches them with the secure database for granted access only to the restricted areas. If some unknown/ unfamiliar people are traced then, analyzing their emotions it looks for distress or agitated features. The system automatically sends an alert in such conditions to take immediate actions by security teams.

Beyond security

the Real-Time Factory Monitoring System delivers tangible economic and operational benefits. Automating surveillance reduces the need for human security personnel, lowering operational costs while enhancing efficiency. Real-time threat detection minimizes the risk of downtime caused by security breaches or emergencies, keeping production schedules on track. Enhanced safety measures also boost employee morale and productivity, creating a more secure and motivated workforce. Additionally, the system offers in-depth reports and analytics to managers for informed decision-making and to enhance operational planning. The combination of safety, security, and cost-effectiveness that this system assures makes it an invaluable asset to modern factories and warehouses.

While the system offers many advantages there are also some challenges it faces. Some of the key issues to be addressed include object detection in low-light conditions, data privacy concerns, and computational demands related to real-time video processing. In order to meet these challenges, infrared cameras for enhanced night vision will be installed, edge computing to reduce network congestion, and strong encryption protocols for sensitive employee data will be adopted by the development team. Future development could also involve IoT integration, where wearable technology and smart factory sensors add data points to identify anomalies. These would make the system even more powerful, thus becoming an indispensable tool for a modern factory seeking security, productivity, and employee wellbeing.

ARAH AI M N

etʼs be honest weʼve all found ways to cheat during exams ;). Each one of us has our own unique tricks some rely on distraction, others on misdirection, but the goal is always the same: to escape unnoticed. But not all of us know how to do it uncover or hide the tracks. If you've never been caught before, congrats! You've mastered the art of anti-forensics.

What is Anti-Forensics?

Anti-forensics is the craft of making digital evidence vanish. It’s not just about hacking, it's about cleaning up the mess afterward. Think of it like a cyber cleanup crew: deleting files, faking timestamps, wiping logs, and planting decoys to throw off investigators. The mission? Make it look like nothing ever happened.

ModernAnti-ForensicsinAction:AFewoftheClassic

Log and Metadata Manipulation

Sometimes, attackers donʼt need to wipe all traces they just change the story. Attackers alter logs and timestamps to confuse investigators. For example, they might make it look like a hack happened last year, even if it was just yesterday.

Inthedigitalworld,thebestcrime

n today’s business world, prediction and pattern recognition are crucial for decisionmaking and future planning. Machine learning helps extract this information from datasets and has achieved significant success in recent years. According to the Harvard

Business Review, companies that implement machine learning in their decision-making processes are 5–10% more likely to achieve higher profit margins than their competitors.

However, not everyone is familiar with programming, especially those whose expertise lies outside AI and data science. This is where

automated machine learning plays a vital role, making machine learning easier and more accessible to a broader audience.

AutoML automates complex tasks such as data preprocessing, feature selection, and model tuning. These tools accelerate the development of machine learning models and enable people with limited coding or data science skills to build predictive models.

The AutoML process is typically straightforward and often uses web applications with user-friendly interfaces. AutoML handles tasks like:

- Cleaning and preparing raw data, including handling missing values, outliers, and normalization.

- Testing various machine learning models and algorithms to find the best performer.

- Automating hyperparameter tuning, such as optimizing learning rates.

- Evaluating models using metrics like accuracy and precision to avoid overfitting.

After training, AutoML delivers the best-performing model, ready for deployment with minimal effort. Some well-known AutoML platforms include Google Cloud AutoML, H2O.ai, and Microsoft Azure AutoML.

Despite its benefits, AutoML has limitations:

- Black-box nature: AutoML often generates high-performing models without offering insights into their internal workings, which can hinder trust and interpretability.

- Overfitting risks: AutoML may fail to detect overfitting, especially with small or complex datasets, which could impact the reliability of predictions.

In summary, AutoML is a valuable tool that automates the development of machine learning models. It helps businesses integrate AI efficiently, but users should be mindful of its limitations.

D3AJ D3AJ D3AJ

In a world plagued by conflicts, landmines remain a major challenge, threatening lives and obstructing progress. Enter "D3aj," a groundbreaking robot combining artificial intelligence and advanced technology to address this global issue.

"D3aj" is no ordinary machine. It is a smart, specialized tool designed to detect landmines using Computer Vision technology. This enables it to precisely identify landmine locations and transmit their coordinates to specialized teams through a secure wireless communication system, ensuring fast and safe action.

A Mechanical Design Built for Tough Challenges

"D3aj" is built to withstand rugged terrains and harsh environments. Its robust mechanical design allows it to move seamlessly across sand, rocks, and muddy ground. Equipped with advanced vibration sensors, it detects deeply buried landmines, while thermal cameras identify subtle temperature differences. These features significantly enhance its detection accuracy.

Sustainable and Environmentally Friendly

"D3aj" is an innovation rooted in sustainability. It runs primarily on solar energy, with a backup electromagnetic-powered battery for uninterrupted operation. This design makes it ideal for remote areas lacking traditional power sources, aligning with global efforts toward sustainable technological solutions.

A Versatile Tool Beyond Landmine Detection

"D3aj" does more than locate landmines. It creates detailed terrain maps using remote sensing technology, providing field teams with precise analysis tools. This versatility expands its potential uses to fields like disaster management and environmental restoration, broadening its impact on humanitarian efforts.

The Digital Forensics Simulator is a virtual reality system that is built entirely using the unity development engine, Our goal is to showcase that local talent can produce innovative, world-class

This project proves the endless capabilities of Jordan’s young pioneers, and that we own the expertise and the facilities to create such advanced systems and that we can confidently keep up with the rapid growth of emerging technologies

projects, highlighting self-sufficiency and to demonstrate that our youth are fully capable of contributing to global advancements

This Forensic investigation simulation is a one of a kind virtual reality project that is designed to train the individuals in solving crime scenes and collecting evidence. developed entirely in Unity, this project provides a really realistic and immersive experience for users, which closes the gap between theoretical knowledge and hands-on practice. our goal is to create an effective tool for teaching essential investigative skills while showing the talent and creativity of Jordanian youth.

Traditional ways of forensic training are mostly expensive limited and risky due to the sensitivity of real cases. this project will solve the challenges by offering a virtual environment that trainees can practice in, in a safe manner, without constraints. it will replicate different crime scenes, including interior as well as exterior settings, And also will require the users to approach in a professional way, tasks such as identifying, Collecting, and preserving evidence are included, which will allow users to follow real investigations.

One of the most important aspects of the simulation is its realism. The scenes are designed to resemble actual crime environments, complete with evidence that must be documented, analyzed, and linked to reconstruct events. Users must employ forensic tools, take photographs, This approach ensures that trainees develop not only technical skills but also critical thinking and problem-solving abilities.

It sounds like science fiction, but with the rise of Brain-Computer Interfaces (BCIs), this could become a real concern. BCIs allow people to control devices with their minds, helping those with disabilities and improving communication. However, like any technology, BCIs can be hacked, raising serious security and privacy risks. In this blog, we will explore what BCIs are, how they can be attacked, and how we can protect our minds from cyber threats.

What Are Brain-Computer Interfaces (BCIs)?

BCIs are devices that create a direct link between the brain and a computer. They work by detecting brain signals and translating them into actions. There are three main types of BCIs: Non-invasive BCIs: These use devices like headsets to read brain activity without surgery.

Partially invasive BCIs: These are placed on the surface of the brain and provide more accurate readings. Invasive BCIs: These are implanted directly into the brain for the highest precision.

"We've got ... three humans with Neuralinks and all are working well."

- Elon musk

Companies like Neuralink and BrainGate are working on BCIs to help people with medical conditions, improve gaming, and even enhance intelligence. But as this technology grows, so do its risks.

How Hackers Can Attack BCIs?

Stealing Thoughts: Hackers can extract brain data, revealing emotions, memories, and decisions, which can be used for blackmail, manipulation, or identity theft.

Mind Control & Fake Memories: Malicious actors could inject false memories or alter perceptions, making individuals believe things that never happened.

Brain Ransomware: Hackers could block memory access or induce pain, demanding payment to restore normal brain function.

BCI Phishing Attacks: Hidden signals could manipulate users into revealing sensitive data or performing unintended actions.

Movement Control: Attackers could hijack motor functions, forcing victims to sign documents, transfer funds, or commit crimes unknowingly.

Protect

BCIs from Hackers:

Encrypt Data: Protect brain signals with strong encryption.

Brain Firewalls: Block unauthorized access with specialized software.

Strong Authentication: Use biometrics to ensure only authorized users access BCIs.

Legal Protections: Establish laws against brain hacking and neural data misuse. User Education: Teach users to recognize and prevent BCI cyber threats.

On the calm night of October 10, 2024, under a sky filled with shining stars, I found myself captivated by a moment of discovery. As I sat preparing university lessons, a bright white light eflected off my computer screen. Tracing the source, I glanced out the window and was met with the breathtaking sight of the moon-a luminous pearl adorning the sky. Its beauty sparked a deep curiosity within me, compelling me to delve into its mysteries.

This momentary fascination led me to explore the intersection of artificial intelligence (AI) and space science. My journey uncovered a wealth of information about how AI has revolutionized humanity's approach to the vast, complex realm of space exploration.

The Role of AI in Space Science

AI-powered robots like Curiosity and Perseverance navigate Mars' rugged terrain, conducting experiments and collecting data. Space generates immense amounts of data that are beyond human capacity to analyze. AI processes millions of astronomical observations, identifies patterns, uncovers new insights about the universe, and pinpoints locations for future exploration.

AI systems analyze images from satellites and telescopes to discover new planets and stars and locate resources on extraterrestrial surfaces. NASA uses AI to predict the movements of celestial bodies, forecasting planetary and asteroid paths to prevent potential collisions with Earth.

In manned space missions, AI systems like CIMON on the International Space Station (ISS) act as personal assistants, managing tasks, solving technical issues, operating equipment, and answering questions. AI also tracks astronauts' biometric data, ensuring their health is managed effectively during long missions.

Projects like SETI use AI to analyze deep-space signals for potential signs of extraterrestrial life. Machine learning identifies potentially habitable planets by analyzing data from advanced telescopes like the James Webb Space Telescope. AI also oversees satellite performance, adjusts orbits to avoid collisions with space debris, captures and analyzes images for weather prediction and environmental monitoring, and aids in climate change studies and tracking ice melting.

AI systems predict and address spacecraft or satellite failures before they occur, ensuring missions continue smoothly and reducing downtime. AI optimizes spacecraft design by simulating material performance in harsh space environments and enhancing efficiency in weight and energy use.

The Growing Reliance on AI

The integration of AI into space science reflects its broader importance in various fields. AI has transformed how we explore the cosmos, understand our universe, and develop advanced technologies. Its ability to process vast data, predict outcomes, and solve complex problems makes it an essential tool for reaching and exploring new worlds.

Looking Ahead

How might AI further expand its role in helping us explore uncharted territories? Will it become a bridge to not only understanding the universe but also solving critical challenges on Earth? AI's transformative potential suggests that its applications will continue to grow, shaping the future of humanity in space and beyond.

TARS

The TARS robot is an extraordinary educational innovation designed by Saleh Ghannmah and Marwa Al-Dhayat. This project provides students with hands-on experience in robotics and artificial intelligence (AI). By simulating the features of a Martian exploration robot, TARS bridges the gap between theoretical knowledge and practical application, offering an interactive approach to space exploration technology.

Inspiration from Interstellar

The name TARS is inspired by the robot featured in Christopher Nolan's film Interstellar. In the movie, TARS demonstrates exceptional adaptability and intelligence under extreme space conditions. This choice of name reflects the mission of the robot: to inspire students and bring the wonders of space exploration closer to their learning experience. TARS combines imagination with cutting-edge technology, making it a perfect educational tool for the field of robotics.

Imagine stepping into a virtual world where your gaze becomes the most powerful tool. With just a glance, you can unlock doors, aim weapons, or spark conversations. This isn’t science fiction—it’s the groundbreaking reality of eye gaze technology in Virtual Reality (VR). As VR continues to evolve, the integration of eye tracking is not just enhancing immersion; it’s revolutionizing how we interact, communicate, and learn in digital realms.

What Makes Eye Gaze Technology Revolutionary?

Eye gaze technology elevates your experience by tracking your eye movements and instantly adapting to the virtual world around you. What seems like a simple concept actually creates a profound connection between you and the digital realm. Dynamic focus sharpens and enhances the area you're looking at, just like your eyes focus in the real world. Forget about controllers your eyes become your navigation tool, effortlessly guiding you through the virtual environment. Best of all, interacting with virtual characters or objects feels as natural as engaging with the real world, making each moment more immersive, intuitive, and captivating. This innovative technology transforms how we interact with digital worlds, making the virtual feel just as real. This technology doesn’t just bring VR to life; it makes it feel alive.

Where VR Meets Eye Gaze: Transformative Applications

Eye gaze technology in VR is transforming multiple fields with innovative applications. In gaming, it allows players to aim or solve puzzles simply by looking, creating a faster and more intuitive experience. In healthcare, it provides accessibility for patients with physical disabilities, enabling them to navigate virtual environments and communicate using only their eyes. Therapists can analyze eye patterns to better understand emotions or cognitive states, leading to more tailored treatments. In education and training, eye tracking monitors focus and guides trainees, such as surgeons, to critical areas during simulations, ensuring better skill mastery. In human interaction, it enhances virtual communication by detecting subtle eye cues, creating more realistic avatars and improving engagement in virtual meetings or classrooms.

A Glimpse of Tomorrow

The combination of VR and eye gaze technology is paving the way for a future where the virtual world feels as real as the physical one. Whether in gaming, healthcare, education, or social interactions, this innovation bridges the gap between human intention and digital response, creating deeply personal and intuitive experiences. As VR and eye tracking evolve, they may soon be as inseparable as the headset itself. The possibilities are endless—because the future of VR isn’t just something we’ll see, it’s something that will see us too.

S A

The Kernel Today:

A Modern Superhero The Linux kernel now powers everything from smartphones to space stations (yes, NASA uses Linux!. Itʼs fast, flexible, and free whatʼs not to love? And if youʼre a techie, youʼve probably heard of two popular Linux-based operating systems: Linux Mint and Manjaro. Letʼs see what makes them so cool.

KERNEL ANYWAY ?

Linux Mint vs. Manjaro: A Fun Face-off:

Linux Mint is a reliable operating system designed for beginners and anyone who needs a simple, hassle-free experience. It comes with essential software like media players and office tools pre-installed, so you can start using it immediately. Mint is stable and rarely has issues, making it ideal for people who want their system to "just work" without constant updates or troubleshooting.

Manjaro is for users who like to explore and customize their system. It provides rolling updates to keep your software up-to-date and access to the Arch User Repository AUR for a wide range of applications. Manjaro is great for those who enjoy tweaking their setup and are comfortable with a bit of extra effort to create a personalized experience.

So, Which One Should You Pick?

If you want an easy, no drama OS that just works: Go for Linux Mint. If you're into experimenting and love being on the tech frontier: Manjaro is your jam.

kernel under attack The kernel can be one of the first targets for attackers, as seen in privilege escalation attacks, where vulnerabilities in the kernel are exploited to gain unauthorized access to system-level privileges. For example, in Dirty COW Copy On-Write attacks, attackers exploit a race condition in the kernel to overwrite read-only files and execute malicious code. Such attacks are highly effective because compromising the kernel grants control over the entire operating system, making it a critical target for cyber threats.

The kernel may not be the flashiest part of your computer, but itʼs the glue that holds everything together. Whether youʼre using a reliable system like Linux Mint or exploring the wild side with Manjaro, remember this: the kernel is your tech soulmate, always working hard to keep things running smoothly. So next time you boot up your laptop, give a little nod of appreciation to the kernel—itʼs earned it!

“Every great idea starts as a small kernel of thought, waiting to grow into something powerful enough to change the world.ˮ

THE AI REVOLUTION AT EVERY INTERSECTION

Traffic congestion is a universal problem. Long waits, idling engines, and urban gridlock frustrate millions daily. But what if traffic lights could adapt and optimize vehicle flow in real-time?

This idea is now a reality. Intelligent Traffic Lights (ITLs), powered by artificial intelligence (AI) and computer vision, are reshaping urban mobility. Developed by a team from AlBalqa Applied University—Ahmad Omar Ahmad Al-Hasasneh, Abdelrhman Mohammad Khalil AbuAmashah, Lujain Madi Ali Al-Smadi, and Farah Marwan Ali Alzyadneh—this innovation promises a smarter and more efficient future for cities.

Why Current Systems Fail

Traditional traffic lights rely on fixed schedules, failing to respond to real-time traffic. This inefficiency increases fuel consumption, emissions, and driver frustration. Recognizing these issues, the team designed ITLs to leverage AI and live data, dynamically optimizing traffic flow.

How ITLs Work

Smart Vision: Cameras at intersections capture live traffic data. AI algorithms like YOLOv8 analyze vehicle density and movement.

Dynamic Adjustments: Green light durations adapt in real-time, reducing idle times and improving traffic flow.

Integrated Systems: ITLs connect seamlessly with smart city infrastructure, creating a unified traffic management network.

The Impact ITLs offer transformative benefits:

- Shorter Commutes: Vehicles move efficiently, reducing travel times.

- Lower Emissions: Optimized traffic cuts fuel waste and emissions.

- Energy Efficiency: Dynamic adjustments reduce power consumption.

- New Revenue: LED screens on traffic lights display advertisements during red lights, generating income for cities.

Conclusion

As cities grow, Intelligent Traffic Lights (ITLs) offer a smart solution to traffic challenges. By using AI and IoT, they connect traffic systems, reduce delays, cut emissions, and ease commutes.

Developed by Al-Balqa Applied University, this project sets the stage for smarter, sustainable cities where technology improves everyday life.

BY AHMAD AL HASASNEH

ABDELRHMAN ABUAMASHAH

LUJAIN

AL-SMADI

FARAH ALZYADNEH

Our aim was to create a system that goes beyond managing traffic to anticipating it in real time

he transformation of Brighton FC from a modest club to a Premier League powerhouse is a testament to innovation, foresight, and a strategic embrace of technology. At the core of this revolution stands Tony Bloom, the club’s owner and the mastermind

behind its data-driven approach to football management Drawing on his background as a professional gambler and hedge fund manager, Bloom has brought the analytical rigor of highstakes financial markets to the football world. His vision has turned Brighton into a model for using AI and data science to drive success.

Bloom’s expertise in gambling and sports betting led to the founding of Starlizard, a consultancy that uses complex algorithms to predict sports outcomes. These same tools have been applied on Brighton’s operations, particularly in player recruitment. The club’s approach is carful : potential signings are assessed through vast datasets, analyzing everything from physical performance to tactical compatibility. This system ensures that every player brought in has both immediate value and the potential for long-term profit.

The results have been remarkable. Players like Moises Caicedo, Marc Cucurella, and Alexis Mac Allister were signed for modest fees, developed within the club, and later sold for recordbreaking amounts. Caicedo, for instance, was acquired from Ecuador for just £5 million and sold to Chelsea for an astounding £115 million. Such transactions not only highlight Brighton’s eye for talent but also its ability to leverage data to maximize returns. The club’s seamless transitions— replacing departing stars with equally promising talent—ensure consistent performance on the pitch.

Brighton’s use of AI and data science extends beyond player recruitment. Bloom has revolutionized how the club identifies and develops its coaching staff.

Using similar predictive models, Brighton evaluates potential coaches based on their tactical philosophies, adaptability, and ability to align with the club’s vision. The appointment of Graham Potter is a prime example of this strategy. Known for his innovative and progressive tactics, Potter was a perfect fit for Brighton’s data-centric ethos. Even his departure didn’t disrupt the club’s momentum, as successors were identified and prepared well in advance.

Behind these successes lies Bloom’s understanding of risk and reward, gained during his years in the gambling and hedge fund industries. His ability to calculate probabilities and make informed decisions has been seamlessly translated into football. By treating player recruitment, coaching, and performance analysis as interconnected variables in a larger system, Bloom has created a sustainable and highly effective model for success.

What sets Brighton apart is its consistency and ability to innovate faster than its competitors. While other clubs have tried to replicate Bloom’s methods, few have achieved the same level of sophistication. Brighton’s system is not merely about data collection but about the integration of insights into actionable strategies, both on and off the pitch.

Tony Bloom’s impact on Brighton & Hove Albion and football as a whole cannot be overstated. He has shown that in an era where data is king, success belongs to those who not only gather information but know how to use it effectively. Brighton’s rise is more than a football story—it is a case study in how technology and vision can redefine an entire industry. As the club continues to punch above its weight, it serves as a beacon for what is possible when innovation meets ambition.

UNLOCKING VIRTUAL WORLD

Tobii: A leading provider of eye tracking technology for VR/AR applications. https://www.tobii.com/ https://www.sciencedirect.com/science/article/abs/pii/S1077314204001109

WHAT'S A KERNEL ANYWAY?

Linux Kernel: https://www.kernel.org/ - Official website of the Linux Kernel. Linux Mint: https://www.linuxmint.com/ - Official website of Linux Mint. Manjaro Linux: https://manjaro.org/ - Official website of Manjaro Linux. Arch Linux: https://archlinux.org/ - The base distribution for Manjaro Linux.

Imagine if someone could steal your thoughts or change your memories without you knowing https://braininformatics.springeropen.com/articles/10.1186/s40708-023-00199-3? utm_source=chatgpt.comtext

https://www.livescience.com/health/neuroscience/elon-musks-neuralink-has-concerning-lack-oftransparency-and-could-be-vulnerable-to-hacking-ethicists-warn? https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5138265& https://www.compassitc.com/blog/can-neuralink-be-hacked-cybersecurity-experts-discuss-potentialrisks?

https://www.weforum.org/stories/2024/06/the-brain-computer-interface-market-is-growing-but-whatare-the-risks/

THANKS FOR READING :)

AI

CH N

TECHNOLOGY - SCIENCE - ENTERTAINMENT

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
CHAIN - Issue III, MAY 2025 by CHAIN - Issuu