CHAIN ISSUE III - MAY 2025 (President Ver.)

Page 1


Pioneering the Future: The Faculty of

Artificial Intelligence

The Faculty of Artificial Intelligence supports our university’s vision by advancing academic excellence in the digital age. We offer forward-looking bachelor’s programs in Information and Cyber Security, Digital Forensics Investigations, Data Science, Intelligence Systems and Robots, and Virtual Reality, along with a master’s in Information Security and Cyberspace.

These programs are designed around artificial intelligence as the language of both the present and the future. Every course is project-based, requiring students to build real-world solutions. This hands-on approach develops technical skills, critical thinking, and creativity.

Our seven modern laboratories are regularly upgraded to match current technology. Faculty members, educated at top global universities, bring academic depth and international perspective.

The curriculum evolves constantly to align with industry trends and job market needs. We also provide training in essential soft skills—communication, leadership, and teamwork—to prepare students for the workplace. Strategic partnerships with global tech leaders such as Huawei, Cisco, Oracle, and Fortinet allow students to earn international certifications through specialized academies.

We connect students with employers through job fairs, industry collaborations, and alumni networks. Innovation and competition are core to our culture.

We host robotics and cybersecurity competitions and support national and international participation. Our students recently won the Grand Prize in the Huawei Regional ICT Competition and represented Jordan globally.

They’ve also earned top placements in competitions in China, Saudi Arabia, Egypt, and Japan. We support student ideas and international experiences through ongoing curriculum updates and funding from the King Abdullah II Fund for Development. We aim to produce graduates who build intelligent solutions for real-world problems in Jordan and beyond.

At the Faculty of Artificial Intelligence, we build the future—every day.

General Supervisor

As we turn the page to this special edition of our magazine, it’s with great pride and excitement that we highlight the incredible work of our students in their graduation projects.

This issue is dedicated to showcasing the innovative ideas and groundbreaking research that our future leaders in artificial intelligence have brought to life. Each project is a testament to the hard work, curiosity, and passion that shows how these young minds are shaping the future of technology. This year's projects reflect not only their deep technical knowledge but also their creativity and drive to solve real-world problems. From cutting-edge machine learning algorithms to applications in healthcare and sustainability, our students are setting the stage for future advancements in artificial intelligence.

The diverse range of projects showcases the versatility of AI, where students have applied their skills to solve pressing issues, whether in robotics, data analysis, or even addressing ethical concerns in AI deployment.

Dr Aryaf Aladwan

Dear Readers,

Welcome to the third issue of Chain Magazine! Each page reflects the creativity and vision that drive us to explore and redefine design.

As the owner and head of design, it’s my privilege to share stories, insights, and visuals that inspire you to think differently and create boldly. This issue covers topics ranging from analog and forensics to transformative aesthetics, celebrating ideas that deserve recognition.

This magazine is more than just a publication it’s a platform for ideas, creativity, and innovation Whether you’re here for thought-provoking articles or stunning visuals, there’s something here for you.

Thank you for being part of our journey. Your support motivates us to innovate and deliver excellence. Share your thoughts we’d love to hear them.

Warm regards,

Amin Alsadi

Executive Director WELCOME LETTER

Welcome to the world of CHAIN, where innovation and creativity meet! We are thrilled to present the third issue of our magazine, showcasing the incredible talent, dedication, and hard work of the AI faculty and its students.

With originality at its heart, this issue features thought-provoking articles, groundbreaking graduation projects, and inspiring ideas that challenge the way we think. From fresh perspectives to in-depth research, every page is crafted to engage and inspire you.

As we continue this journey, we invite you to explore, learn, and celebrate the progress we’ve made together. This issue is a reflection of our vibrant community, filled with curiosity and passion for discovery.

You can read our digital magazine by scanning the QR code. Thank you for joining us in this exciting chapter. Let’s explore endless possibilities together!

Thank you for reading!

Owen Sumadi

Abdelaziz SARi

Editor-in-Chief

General Supervisor

Dr. Aryaf AL-Adwan

Managing Director

Karam Yaseen

Editor-in-Chief

Abdelaziz Sari

Logistics

Diala Al-Qudah

Raghad Fadi

Sarah Jaber

Editorial

Jana Maher

Lara Bawaneh

Design

Amin Al-Sadi

Bayan Al-Shuaibat

Contributors

Abdelrhman Abuamashah

Ahmad Al-hasasneh

Aseel Rasheed

Farah Al-Zyadneh

Hind Fakhoury

Issa Sawaged

Lujain Alsmadi

Majd Alassi

Marwa AL-Dhayat

Masa Malkawi

Obadah Abuodeh

Omar Abugosh

O'taymh Abu Taha

Rama Alhiyari

Raya Obaid

Saleh Ghannmah

Salem Tou

Sarah Elasali

Sarah Sweilmeen

Sereen Al-Balawnah

he Hackers’ New Best Friend

evolving world of cybercrime, staying ahead of the curve is critical. The latest buzz in rground hacking scene is a new AI tool called "WarmGPT." Hackers have swapped intimidating tactics for a friendlier approach, declaring: "Phishing season just got cozier.

WarmGPT is a rogue adaptation of OpenAI's ChatGPT. Its purpose is clear: to craft phishing emails that are warm, convincing, and disarmingly friendly. Gone are the days of broken-English scams about dubious inheritances from foreign princes. WarmGPT creates emails so authentic that they could fool even the most cautious recipients.

A New Era of Deception

Imagine scrolling through your inbox and spotting an email from your bank. The subject line reads: "A Little Check-In for Our Favorite Customer." It begins: "Hi there, we hope your day is as sunny as your smile! We noticed a small issue with your account. Would you mind confirming your details so we can keep everything running smoothly? You're the best!"

By the time you're halfway through, you might feel inclined to hand over your Social Security number, credit card details, and even your Netflix password. All because they asked nicely.

The Genius of WarmGPT

WarmGPT's brilliance lies in its ability to humanize phishing attempts. Hackers no longer rely on crude scare tactics or poorly designed PDFs stuffed with malware. Instead, they use AI to craft emotionally manipulative messages. WarmGPT writes with the charm of an overly cheerful coworker who always brings cupcakes to meetings.

But WarmGPT's use isn't limited to emails. Hackers also impersonate customer service representatives in live chats. Picture this: you're seeking help with an online order and share personal information with someone who replies, "Oh no! We totally get how frustrating that must feel. Could you just share your password so we can fix it right away?"

Message Warm ChatGPT

The Struggle for Cybersecurity

Cybersecurity experts are scrambling to counter this new threat. "The problem is that WarmGPT's phishing attempts don't look like scams," one analyst explained. "They're polite. They're personal. They even recommend podcasts!"

This wave of AI-enhanced phishing poses a significant challenge. Traditional red flags, like typos or overly formal language, are no longer reliable. WarmGPT's natural-sounding tone blurs the line between genuine communication and scams.

How to Protect Yourself

1. Pause Before Responding: If an email feels unusually warm or personal, verify the sender.

2. Look for Clues: Check email addresses and URLs carefully for inconsistencies.

3. Verify Through Official Channels: Contact companies or banks directly to confirm any suspicious requests.

4. Trust Your Instincts: If something feels off, it probably is.

Albert Einstein once said: "The world will not be destroyed by those who do evil, but by those who watch them without doing anything." While he wasn't talking about phishing, the advice is clear: stay vigilant.

If an email seems too warm and fuzzy to be true, it might be a hacker wrapped in a digital Snuggie. Stay sharp and protect your data.

The greatest threat to your security isn’t technology; it’s misplaced trust in the wrong hands.

THERE IS AN ISSUE WITH YOUR ACCOUNT. PLEASE VERIFY YOUR IDENTITY BY PROVIDING YOUR PASSWORD.

Addressing Student Challenges

Students often need additional explanations during lectures but hesitate to use phones. The AI glasses resolve this with voice-activated commands that provide summaries, note-taking, and personalized flashcards. Tailored reminders help reinforce concepts, reduce cognitive load, and support retention during study sessions.

Future Goals

Beyond educational support, the project aims to expand functionality to include: - Productivity tools: Calendar integration, task tracking, and voice reminders - Mental well-being features: Mood tracking and motivational prompts

The long-term vision is a versatile device acting as a "virtual companion," improving academic success, productivity, and mental health. By seamlessly combining educational, organizational, and emotional support, these glasses aim to enhance users' overall quality of life.

AI-enabled glasses provide students with an innovative, hands-free study assistant. By addressing practical challenges, they create an optimized and efficient learning experience, offering real-time solutions to improve both academic performance and daily productivity.

nalog vs. Digital: The Battle of Modern and Old

Analog and digital systems differ in how they handle, store, and transmit information. Analog relies on continuous signals that mimic natural variations, while digital uses discrete binary codes. Both have strengths and limitations, making the choice between them dependent on specific needs.

Analog: Authentic and Simple

Analog systems use continuous signals that closely represent real-world changes. In audio, for example, analog captures sound as continuous electrical signals, creating an authentic output. Many audiophiles prefer vinyl records for their natural and “warmer” sound compared to digital formats.

Analog devices like thermometers and early TVs are simple in design. They don’t require complex circuits or software, making them durable and easier to repair in environments lacking advanced tools. However, analog signals degrade over time due to noise, interference, and aging components, reducing their reliability.

Digital technology stands out for its versatility. Devices like smartphones combine multiple functions in one system. Digital tools can also be updated through software without major hardware changes. Storage options, such as solid-state drives and cloud platforms, provide vast, durable storage compared to analog media. However, digital systems sometimes lack the natural quality of analog, especially in areas like audio or video.

Analog and Digital Together

Despite their differences, analog and digital often work together. For example, music studios may record in analog for richness but convert to digital for editing and sharing. Similarly, analog sensors collect real-world data, like temperature or pressure, which digital systems process and analyze.

Analog vs digital.txt

Analog and digital are complementary. Analog excels in authenticity and simplicity, while digital is precise and adaptable. Instead of choosing one, a balanced approach that combines both may unlock their full potential. Which would you prioritize, or do you see value in both?

A CAMERA WITH A MIND AI SURVEILLANCE

he Real-Time Factory Monitoring System, a revolutionizes workplace safety and security. This intelligent surveillance system develops a safer and more effective work environment by incorporating advanced object detection, face recognition, and

emotion analysis. Unlike conventional security measures, which mostly depend on human oversight, this automated system enhances threat detection, reduces human error, and accelerates response times. Factories and warehouses, which house valuable equipment and critical production processes, can greatly benefit from its real-time protection against intrusions and workplace incidents.

Three AI-powered models form the core of the system for comprehensive surveillance. Face detection by MediaPipe model and Cascade Classifier does real-time scanning of employees' faces and matches them with the secure database for granted access only to the restricted areas. If some unknown/ unfamiliar people are traced then, analyzing their emotions it looks for distress or agitated features. The system automatically sends an alert in such conditions to take immediate actions by security teams.

Beyond security

the Real-Time Factory Monitoring System delivers tangible economic and operational benefits. Automating surveillance reduces the need for human security personnel, lowering operational costs while enhancing efficiency. Real-time threat detection minimizes the risk of downtime caused by security breaches or emergencies, keeping production schedules on track. Enhanced safety measures also boost employee morale and productivity, creating a more secure and motivated workforce. Additionally, the system offers in-depth reports and analytics to managers for informed decision-making and to enhance operational planning. The combination of safety, security, and cost-effectiveness that this system assures makes it an invaluable asset to modern factories and warehouses.

While the system offers many advantages there are also some challenges it faces. Some of the key issues to be addressed include object detection in low-light conditions, data privacy concerns, and computational demands related to real-time video processing. In order to meet these challenges, infrared cameras for enhanced night vision will be installed, edge computing to reduce network congestion, and strong encryption protocols for sensitive employee data will be adopted by the development team. Future development could also involve IoT integration, where wearable technology and smart factory sensors add data points to identify anomalies. These would make the system even more powerful, thus becoming an indispensable tool for a modern factory seeking security, productivity, and employee wellbeing.

ARAH AI M N

etʼs be honest weʼve all found ways to cheat during exams ;). Each one of us has our own unique tricks some rely on distraction, others on misdirection, but the goal is always the same: to escape unnoticed. But not all of us know how to do it uncover or hide the tracks. If you've never been caught before, congrats! You've mastered the art of anti-forensics.

What is Anti-Forensics?

Anti-forensics is the craft of making digital evidence vanish. It’s not just about hacking, it's about cleaning up the mess afterward. Think of it like a cyber cleanup crew: deleting files, faking timestamps, wiping logs, and planting decoys to throw off investigators. The mission? Make it look like nothing ever happened.

ModernAnti-ForensicsinAction:AFewoftheClassic

Log and Metadata Manipulation

Sometimes, attackers donʼt need to wipe all traces they just change the story. Attackers alter logs and timestamps to confuse investigators. For example, they might make it look like a hack happened last year, even if it was just yesterday.

Inthedigitalworld,thebestcrime

Artifact Wiping

DIGITALEVIDENCE DIGITALEVIDENCE DIGITALEVIDENCE

When attackers need to vanish, they wipe the evidence clean. This means securely deleting files, browser history, registry entries, or logs using specialized tools. Unlike normal deletion, this process overwrites the data to make recovery nearly impossible no paper trail, no footprints, nothing left to find.

Virtual Machines

Fake worlds, real work! Attackers often create virtual environments to run their malicious operations. By using virtual machines (VMs), they can safely conduct their work without leaving a permanent mark on the host system. Once the job is done, the VM is deleted, erasing all traces poof! Gone without a trace.

Anonymity Networks

Attackers avoid using their own network to stay untraceable. They chain VPNs, hop on public Wi-Fi, and route traffic through Tor, sometimes adding layers of proxies across countries to throw off investigators.

Some take it further with Tails, a bootable OS that runs in RAM and erases all traces after shutdown. Others use Whonix, a virtual machine that forces traffic through Tor, locking in anonymity even if mistakes happen.

In Summary: Stay Hidden, Stay Ahead

Anti-forensics isn’t just about covering tracks it’s about leaving nothing to find. Smart attackers layer tools like VPNs, Tor, burners, timestamp tricks, Tails, and Whonix. Each layer adds distance from the evidence. In this game, only the wellhidden survive. sceneistheonethatneverexisted.

n today’s business world, prediction and pattern recognition are crucial for decisionmaking and future planning. Machine learning helps extract this information from datasets and has achieved significant success in recent years. According to the Harvard

Business Review, companies that implement machine learning in their decision-making processes are 5–10% more likely to achieve higher profit margins than their competitors.

However, not everyone is familiar with programming, especially those whose expertise lies outside AI and data science. This is where

automated machine learning plays a vital role, making machine learning easier and more accessible to a broader audience.

AutoML automates complex tasks such as data preprocessing, feature selection, and model tuning. These tools accelerate the development of machine learning models and enable people with limited coding or data science skills to build predictive models.

The AutoML process is typically straightforward and often uses web applications with user-friendly interfaces. AutoML handles tasks like:

- Cleaning and preparing raw data, including handling missing values, outliers, and normalization.

- Testing various machine learning models and algorithms to find the best performer.

- Automating hyperparameter tuning, such as optimizing learning rates.

- Evaluating models using metrics like accuracy and precision to avoid overfitting.

D3AJ D3AJ D3AJ

In a world plagued by conflicts, landmines remain a major challenge, threatening lives and obstructing progress. Enter "D3aj," a groundbreaking robot combining artificial intelligence and advanced technology to address this global issue.

"D3aj" is no ordinary machine. It is a smart, specialized tool designed to detect landmines using Computer Vision technology. This enables it to precisely identify landmine locations and transmit their coordinates to specialized teams through a secure wireless communication system, ensuring fast and safe action.

A Mechanical Design Built for Tough Challenges

"D3aj" is built to withstand rugged terrains and harsh environments. Its robust mechanical design allows it to move seamlessly across sand, rocks, and muddy ground. Equipped with advanced vibration sensors, it detects deeply buried landmines, while thermal cameras identify subtle temperature differences. These features significantly enhance its detection accuracy.

Sustainable and Environmentally Friendly

"D3aj" is an innovation rooted in sustainability. It runs primarily on solar energy, with a backup electromagnetic-powered battery for uninterrupted operation. This design makes it ideal for remote areas lacking traditional power sources, aligning with global efforts toward sustainable technological solutions.

A Versatile Tool Beyond Landmine Detection

"D3aj" does more than locate landmines. It creates detailed terrain maps using remote sensing technology, providing field teams with precise analysis tools. This versatility expands its potential uses to fields like disaster management and environmental restoration, broadening its impact on humanitarian efforts.

Driven by a Humanitarian Vision

"D3aj" is not just a robot; it represents technology serving humanity. The ultimate goal is to expand its deployment globally, saving lives and fostering a safer, more sustainable world.

With its advanced design, operational efficiency, and noble mission, "D3aj" stands out as a pioneering model in robotics. It showcases how innovative technology can address pressing global challenges while upholding humanitarian values.

This remarkable innovation demonstrates the power of human ingenuity in creating solutions that save lives and protect the planet.

The Digital Forensics Simulator is a virtual reality system that is built entirely using the unity development engine, Our goal is to showcase that local talent can produce innovative, world-class

This project proves the endless capabilities of Jordan’s young pioneers, and that we own the expertise and the facilities to create such advanced systems and that we can confidently keep up with the rapid growth of emerging technologies

projects, highlighting self-sufficiency and to demonstrate that our youth are fully capable of contributing to global advancements

This Forensic investigation simulation is a one of a kind virtual reality project that is designed to train the individuals in solving crime scenes and collecting evidence. developed entirely in Unity, this project provides a really realistic and immersive experience for users, which closes the gap between theoretical knowledge and hands-on practice. our goal is to create an effective tool for teaching essential investigative skills while showing the talent and creativity of Jordanian youth.

Traditional ways of forensic training are mostly expensive limited and risky due to the sensitivity of real cases. this project will solve the challenges by offering a virtual environment that trainees can practice in, in a safe manner, without constraints. it will replicate different crime scenes, including interior as well as exterior settings, And also will require the users to approach in a professional way, tasks such as identifying, Collecting, and preserving evidence are included, which will allow users to follow real investigations.

One of the most important aspects of the simulation is its realism. The scenes are designed to resemble actual crime environments, complete with evidence that must be documented, analyzed, and linked to reconstruct events. Users must employ forensic tools, take photographs, This approach ensures that trainees develop not only technical skills but also critical thinking and problem-solving abilities.

It sounds like science fiction, but with the rise of Brain-Computer Interfaces (BCIs), this could become a real concern. BCIs allow people to control devices with their minds, helping those with disabilities and improving communication. However, like any technology, BCIs can be hacked, raising serious security and privacy risks. In this blog, we will explore what BCIs are, how they can be attacked, and how we can protect our minds from cyber threats.

What Are Brain-Computer Interfaces (BCIs)?

BCIs are devices that create a direct link between the brain and a computer. They work by detecting brain signals and translating them into actions. There are three main types of BCIs: Non-invasive BCIs: These use devices like headsets to read brain activity without surgery.

Partially invasive BCIs: These are placed on the surface of the brain and provide more accurate readings. Invasive BCIs: These are implanted directly into the brain for the highest precision.

"We've got ... three humans with Neuralinks and all are working well."

- Elon musk

Companies like Neuralink and BrainGate are working on BCIs to help people with medical conditions, improve gaming, and even enhance intelligence. But as this technology grows, so do its risks.

How Hackers Can Attack BCIs?

Stealing Thoughts: Hackers can extract brain data, revealing emotions, memories, and decisions, which can be used for blackmail, manipulation, or identity theft.

Mind Control & Fake Memories: Malicious actors could inject false memories or alter perceptions, making individuals believe things that never happened.

Brain Ransomware: Hackers could block memory access or induce pain, demanding payment to restore normal brain function.

BCI Phishing Attacks: Hidden signals could manipulate users into revealing sensitive data or performing unintended actions.

Movement Control: Attackers could hijack motor functions, forcing victims to sign documents, transfer funds, or commit crimes unknowingly.

Protect

BCIs from Hackers:

Encrypt Data: Protect brain signals with strong encryption.

Brain Firewalls: Block unauthorized access with specialized software.

Strong Authentication: Use biometrics to ensure only authorized users access BCIs.

Legal Protections: Establish laws against brain hacking and neural data misuse. User Education: Teach users to recognize and prevent BCI cyber threats.

On the calm night of October 10, 2024, under a sky filled with shining stars, I found myself captivated by a moment of discovery. As I sat preparing university lessons, a bright white light eflected off my computer screen. Tracing the source, I glanced out the window and was met with the breathtaking sight of the moon-a luminous pearl adorning the sky. Its beauty sparked a deep curiosity within me, compelling me to delve into its mysteries.

This momentary fascination led me to explore the intersection of artificial intelligence (AI) and space science. My journey uncovered a wealth of information about how AI has revolutionized humanity's approach to the vast, complex realm of space exploration.

The Role of AI in Space Science

AI-powered robots like Curiosity and Perseverance navigate Mars' rugged terrain, conducting experiments and collecting data. Space generates immense amounts of data that are beyond human capacity to analyze. AI processes millions of astronomical observations, identifies patterns, uncovers new insights about the universe, and pinpoints locations for future exploration.

AI systems analyze images from satellites and telescopes to discover new planets and stars and locate resources on extraterrestrial surfaces. NASA uses AI to predict the movements of celestial bodies, forecasting planetary and asteroid paths to prevent potential collisions with Earth.

In manned space missions, AI systems like CIMON on the International Space Station (ISS) act as personal assistants, managing tasks, solving technical issues, operating equipment, and answering questions. AI also tracks astronauts' biometric data, ensuring their health is managed effectively during long missions.

Projects like SETI use AI to analyze deep-space signals for potential signs of extraterrestrial life. Machine learning identifies potentially habitable planets by analyzing data from advanced telescopes like the James Webb Space Telescope. AI also oversees satellite performance, adjusts orbits to avoid collisions with space debris, captures and analyzes images for weather prediction and environmental monitoring, and aids in climate change studies and tracking ice melting.

AI systems predict and address spacecraft or satellite failures before they occur, ensuring missions continue smoothly and reducing downtime. AI optimizes spacecraft design by simulating material performance in harsh space environments and enhancing efficiency in weight and energy use.

The Growing Reliance on AI

The integration of AI into space science reflects its broader importance in various fields. AI has transformed how we explore the cosmos, understand our universe, and develop advanced technologies. Its ability to process vast data, predict outcomes, and solve complex problems makes it an essential tool for reaching and exploring new worlds.

Looking Ahead

How might AI further expand its role in helping us explore uncharted territories? Will it become a bridge to not only understanding the universe but also solving critical challenges on Earth? AI's transformative potential suggests that its applications will continue to grow, shaping the future of humanity in space and beyond.

TARS

The TARS robot is an extraordinary educational innovation designed by Saleh Ghannmah and Marwa Al-Dhayat. This project provides students with hands-on experience in robotics and artificial intelligence (AI). By simulating the features of a Martian exploration robot, TARS bridges the gap between theoretical knowledge and practical application, offering an interactive approach to space exploration technology.

Inspiration from Interstellar

The name TARS is inspired by the robot featured in Christopher Nolan's film Interstellar. In the movie, TARS demonstrates exceptional adaptability and intelligence under extreme space conditions. This choice of name reflects the mission of the robot: to inspire students and bring the wonders of space exploration closer to their learning experience. TARS combines imagination with cutting-edge technology, making it a perfect educational tool for the field of robotics.

Detailed Components of the TARS Robot

The TARS robot is designed to simulate Martian exploration challenges, focusing on durability and functionality for education. It has a strong metal frame that withstands rough terrains and complex environments, ensuring reliability in simulations. With six motorized wheels, it provides stability and precise control for smooth navigation on uneven surfaces. Three H-Bridge motor drivers regulate power flow, ensuring seamless movement and responsive direction control. A Raspberry Pi unit serves as the brain, handling data processing, multi-functional management, and AI tasks. TARS features a high-resolution camera with object detection, allowing it to analyze its surroundings and provide students with hands-on experience in computer vision and machine learning. Its NLP capabilities enable it to understand and respond to voice commands, improving interaction and demonstrating AI’s role in language processing. The robot runs on rechargeable lithium batteries with a portable charger, ensuring continuous operation during educational activities.

Future Plans

The development team has ambitious plans to enhance TARS’ design and functionality. These include redesigning the robot’s external structure with sustainable, eco-friendly materials, adding a renewable energy source to align with green technology principles, upgrading the suspension system for better stability on challenging terrains, incorporating a drone at the robot’s rear to scan a 500-meter radius, identify optimal paths, and return to its charging dock, and adding a robotic arm for sample collection and an onboard laboratory for real-time analysis, with results transmitted via the internet or other communication methods.

Applications and Conclusion

TARS serves as a versatile tool with applications in various fields. It can assist explorers by navigating remote and challenging terrains, provide students with an engaging platform to learn programming, robotics, and AI, and support military missions requiring durable and intelligent robotic systems. Combining innovative design with educational value, TARS fosters creativity and equips students with the skills needed to excel in robotics and AI. As its capabilities evolve, TARS aims to remain a leading example of how technology can inspire and educate future generations.

WHAT’S A KERNEL ANYWAY ?

root@mint:~

eet the Kernel —the invisible hero of the tech world!

Think of it as the brain of your operating system, working behind the scenes to manage everything from apps to hardware. It's like a super-organized conductor making sure all the instruments in the orchestra-your computer-play in harmony. Without the kernel, your laptop would just be an expensive paperweight

How It All Started:

The kernel was created to act like the main "boss" of a computer. it helps different parts of the system talk to each other without fighting. making sure each program gets the power, memory, and time it needs. By handling these basics, it lets other programs do their jobs more easily. It allows the different parts of this system to communicate with one another without fighting.

How It All Started The kernel was created to act like the main "boss" of a computer. it helps different parts of the system talk to each other without fighting. making sure each program gets the power, memory, and time it needs. By handling these basics, it lets other programs do their jobs more easily. It allows the different parts of this system to communicate with one another without fighting.

The Kernel Today:

A Modern Superhero The Linux kernel now powers everything from smartphones to space stations (yes, NASA uses Linux!. Itʼs fast, flexible, and free whatʼs not to love? And if youʼre a techie, youʼve probably heard of two popular Linux-based operating systems: Linux Mint and Manjaro. Letʼs see what makes them so cool.

How It All Started

The kernel was created to act like the main "boss" of a computer. it helps different parts of the system talk to each other without fighting. making sure each program gets the power, memory, and time it needs. By handling these basics, it lets other programs do their jobs more easily. It allows the different parts of this system to communicate with one another without fighting.

How It All Started The kernel was created to act like the main "boss" of a computer. it helps different parts of the system talk to each other without fighting. making sure each program gets the power, memory, and time it needs. By handling these basics, it lets other programs do their jobs more easily. It allows the different parts of this system to communicate with one another without fighting.

S A

The Kernel Today:

A Modern Superhero The Linux kernel now powers everything from smartphones to space stations (yes, NASA uses Linux!. Itʼs fast, flexible, and free whatʼs not to love? And if youʼre a techie, youʼve probably heard of two popular Linux-based operating systems: Linux Mint and Manjaro. Letʼs see what makes them so cool.

KERNEL ANYWAY ?

Linux Mint vs. Manjaro: A Fun Face-off:

Linux Mint is a reliable operating system designed for beginners and anyone who needs a simple, hassle-free experience. It comes with essential software like media players and office tools pre-installed, so you can start using it immediately. Mint is stable and rarely has issues, making it ideal for people who want their system to "just work" without constant updates or troubleshooting.

Manjaro is for users who like to explore and customize their system. It provides rolling updates to keep your software up-to-date and access to the Arch User Repository AUR for a wide range of applications. Manjaro is great for those who enjoy tweaking their setup and are comfortable with a bit of extra effort to create a personalized experience.

So, Which One Should You Pick?

If you want an easy, no drama OS that just works: Go for Linux Mint. If you're into experimenting and love being on the tech frontier: Manjaro is your jam.

kernel under attack The kernel can be one of the first targets for attackers, as seen in privilege escalation attacks, where vulnerabilities in the kernel are exploited to gain unauthorized access to system-level privileges. For example, in Dirty COW Copy On-Write attacks, attackers exploit a race condition in the kernel to overwrite read-only files and execute malicious code. Such attacks are highly effective because compromising the kernel grants control over the entire operating system, making it a critical target for cyber threats.

The kernel may not be the flashiest part of your computer, but itʼs the glue that holds everything together. Whether youʼre using a reliable system like Linux Mint or exploring the wild side with Manjaro, remember this: the kernel is your tech soulmate, always working hard to keep things running smoothly. So next time you boot up your laptop, give a little nod of appreciation to the kernel—itʼs earned it!

“Every great idea starts as a small kernel of thought, waiting to grow into something powerful enough to change the world.ˮ

THE AI REVOLUTION AT EVERY INTERSECTION

Traffic congestion is a universal problem. Long waits, idling engines, and urban gridlock frustrate millions daily. But what if traffic lights could adapt and optimize vehicle flow in real-time?

This idea is now a reality. Intelligent Traffic Lights (ITLs), powered by artificial intelligence (AI) and computer vision, are reshaping urban mobility. Developed by a team from AlBalqa Applied University—Ahmad Omar Ahmad Al-Hasasneh, Abdelrhman Mohammad Khalil AbuAmashah, Lujain Madi Ali Al-Smadi, and Farah Marwan Ali Alzyadneh—this innovation promises a smarter and more efficient future for cities.

Why Current Systems Fail

Traditional traffic lights rely on fixed schedules, failing to respond to real-time traffic. This inefficiency increases fuel consumption, emissions, and driver frustration. Recognizing these issues, the team designed ITLs to leverage AI and live data, dynamically optimizing traffic flow.

How ITLs Work

Smart Vision: Cameras at intersections capture live traffic data. AI algorithms like YOLOv8 analyze vehicle density and movement.

Dynamic Adjustments: Green light durations adapt in real-time, reducing idle times and improving traffic flow.

Integrated Systems: ITLs connect seamlessly with smart city infrastructure, creating a unified traffic management network.

The Impact ITLs offer transformative benefits:

- Shorter Commutes: Vehicles move efficiently, reducing travel times.

- Lower Emissions: Optimized traffic cuts fuel waste and emissions.

- Energy Efficiency: Dynamic adjustments reduce power consumption.

- New Revenue: LED screens on traffic lights display advertisements during red lights, generating income for cities.

Conclusion

As cities grow, Intelligent Traffic Lights (ITLs) offer a smart solution to traffic challenges. By using AI and IoT, they connect traffic systems, reduce delays, cut emissions, and ease commutes.

Developed by Al-Balqa Applied University, this project sets the stage for smarter, sustainable cities where technology improves everyday life.

he transformation of Brighton FC from a modest club to a Premier League powerhouse is a testament to innovation, foresight, and a strategic embrace of technology. At the core of this revolution stands Tony Bloom, the club’s owner and the mastermind

behind its data-driven approach to football management Drawing on his background as a professional gambler and hedge fund manager, Bloom has brought the analytical rigor of highstakes financial markets to the football world. His vision has turned Brighton into a model for using AI and data science to drive success.

Bloom’s expertise in gambling and sports betting led to the founding of Starlizard, a consultancy that uses complex algorithms to predict sports outcomes. These same tools have been applied on Brighton’s operations, particularly in player recruitment. The club’s approach is carful : potential signings are assessed through vast datasets, analyzing everything from physical performance to tactical compatibility. This system ensures that every player brought in has both immediate value and the potential for long-term profit.

The results have been remarkable. Players like Moises Caicedo, Marc Cucurella, and Alexis Mac Allister were signed for modest fees, developed within the club, and later sold for recordbreaking amounts. Caicedo, for instance, was acquired from Ecuador for just £5 million and sold to Chelsea for an astounding £115 million. Such transactions not only highlight Brighton’s eye for talent but also its ability to leverage data to maximize returns. The club’s seamless transitions— replacing departing stars with equally promising talent—ensure consistent performance on the pitch.

Brighton’s use of AI and data science extends beyond player recruitment. Bloom has revolutionized how the club identifies and develops its coaching staff.

Using similar predictive models, Brighton evaluates potential coaches based on their tactical philosophies, adaptability, and ability to align with the club’s vision. The appointment of Graham Potter is a prime example of this strategy. Known for his innovative and progressive tactics, Potter was a perfect fit for Brighton’s data-centric ethos. Even his departure didn’t disrupt the club’s momentum, as successors were identified and prepared well in advance.

Behind these successes lies Bloom’s understanding of risk and reward, gained during his years in the gambling and hedge fund industries. His ability to calculate probabilities and make informed decisions has been seamlessly translated into football. By treating player recruitment, coaching, and performance analysis as interconnected variables in a larger system, Bloom has created a sustainable and highly effective model for success.

What sets Brighton apart is its consistency and ability to innovate faster than its competitors. While other clubs have tried to replicate Bloom’s methods, few have achieved the same level of sophistication. Brighton’s system is not merely about data collection but about the integration of insights into actionable strategies, both on and off the pitch.

Tony Bloom’s impact on Brighton & Hove Albion and football as a whole cannot be overstated. He has shown that in an era where data is king, success belongs to those who not only gather information but know how to use it effectively. Brighton’s rise is more than a football story—it is a case study in how technology and vision can redefine an entire industry. As the club continues to punch above its weight, it serves as a beacon for what is possible when innovation meets ambition.

ANALOG VS DIGITAL

Difference Between Analog and Digital Signals: https://www.quora.com/What-is-the-differencebetween-an-analog-and-a-digital-signal-and-how-are-they-used-in-electronic-circuits

Khan Academy: Analog vs. Digital: https://www.khanacademy.org/science/msphysics/x1baed5db7c1bb50b:waves/x1baed5db7c1bb50b:digital-signals/v/analog-vs-digital-signals

Specific Examples and Applications

Audiophiles and Analog Sound: https://www.reddit.com/r/audiophile/comments/fknjq9/would_you_prefer_analogue_or_digital_audio_ and_why/

Digital Signal Processing: https://www.dspguide.com/whatdsp.htm

Quantum Computing: https://www.ibm.com/topics/quantum-computing

Neuromorphic Computing: https://en.wikipedia.org/wiki/Neuromorphic_computing

Anti-Forensics

Tails OS: https://tails.boum.org/ - Official website of Tails OS, a privacy-focused operating system. DDoS Attacks: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/1 - Explanation of Distributed Denial of Service (DDoS) attacks.

Steganography: https://en.wikipedia.org/wiki/Steganography - Wikipedia article on steganography, the art of hiding secret messages within other data.

AUTO MACHINE LEARNING

Tails OS: https://tails.boum.org/ - Official website of Tails OS, a privacy-focused operating system. DDoS Attacks: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/1 - Explanation of Distributed Denial of Service (DDoS) attacks.

Steganography: https://en.wikipedia.org/wiki/Steganography - Wikipedia article on steganography, the art of hiding secret messages within other data.

LET’S EXPLORE NEW WORLD

Explore NASA's AI-powered space missions: NASA Space Flight Center

Learn about AI in the search for extraterrestrial life: SETI Institute

See how SpaceX uses AI for autonomous spacecraft navigation: SpaceX

Discover ESA's AI applications in space exploration: European Space Agency (ESA) Find research on AI in space: Google Scholar (Search keywords: "AI in space exploration," "machine learning in astronomy," or "artificial intelligence in space missions")

AI

CH N

TECHNOLOGY - SCIENCE - ENTERTAINMENT

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.