• 제목/요약/키워드: Computer science

검색결과 31,656건 처리시간 0.046초

Security Risk Assessment in Conducting Online Exam

  • Danah AlDossary;Danah AlQuaamiz;Fai AlSadlan;Dana AlSharari;Lujain AlOthman;Raghad AlThukair;Ezaz Aldahasi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.77-83
    • /
    • 2023
  • This research is conducted to minimize the potential security risks of conducting online exams to an acceptable level as vulnerabilities and threats to this type of exam are presented. This paper provides a general structure for the risk management process and some recommendations for increasing the level of security.

컴퓨터과학 쇼를 통한 초등학생의 정보교육에 대한 인식변화 (The Elementary Students' Understanding of Computer Science Through The Computer Science Show Program)

  • 한병래
    • 정보교육학회논문지
    • /
    • 제21권2호
    • /
    • pp.209-217
    • /
    • 2017
  • 최근 SW교육이 강조되고 있으나 아직 많은 학생들이 컴퓨터과학을 접할 기회는 많지 않다. 이 논문에서 연구자는 컴퓨터과학에 대한 관심과 이해를 증대시키기 위해 컴퓨터과학 쇼를 구성하였다. 컴퓨터과학 쇼는 이진체계의 이해, 문자 전달하기, 패리티비트 마술, 숫자 카드 찾기, 색깔 모으기(오렌지 게임)들로 구성하였다. 컴퓨터과학 쇼를 초등학생들에게 적용하고 결과를 살펴보았다. 컴퓨터과학 쇼에 참여한 대부분의 학생들은 "컴퓨터과학 쇼에 대한 경험"이 없었다. 컴퓨터과학 쇼 후의 설문조사에서 많은 학생이 "쇼에 대해 재미있다", "컴퓨터과학에 관심이 생겼다", "주변 친구에게 추천 하겠다"라고 응답했다. 연구를 통해 컴퓨터과학 쇼는 초등학생들에게 컴퓨터과학에 대한 흥미를 이끌어 낼 수 있고, 컴퓨터과학에 대한 호기심과 관심을 일으킬 수 있는 방법임을 알게 되었다.

AIMS: AI based Mental Healthcare System

  • Ibrahim Alrashide;Hussain Alkhalifah;Abdul-Aziz Al-Momen;Ibrahim Alali;Ghazy Alshaikh;Atta-ur Rahman;Ashraf Saadeldeen;Khalid Aloup
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.225-234
    • /
    • 2023
  • In this era of information and communication technology (ICT), tremendous improvements have been witnessed in our daily lives. The impact of these technologies is subjective and negative or positive. For instance, ICT has brought a lot of ease and versatility in our lifestyles, on the other hand, its excessive use brings around issues related to physical and mental health etc. In this study, we are bridging these both aspects by proposing the idea of AI based mental healthcare (AIMS). In this regard, we aim to provide a platform where the patient can register to the system and take consultancy by providing their assessment by means of a chatbot. The chatbot will send the gathered information to the machine learning block. The machine learning model is already trained and predicts whether the patient needs a treatment by classifying him/her based on the assessment. This information is provided to the mental health practitioner (doctor, psychologist, psychiatrist, or therapist) as clinical decision support. Eventually, the practitioner will provide his/her suggestions to the patient via the proposed system. Additionally, the proposed system prioritizes care, support, privacy, and patient autonomy, all while using a friendly chatbot interface. By using technology like natural language processing and machine learning, the system can predict a patient's condition and recommend the right professional for further help, including in-person appointments if necessary. This not only raises awareness about mental health but also makes it easier for patients to start therapy.

Applications of 5G and 6G in Smart Health Services

  • Al-Jawad, Fatimah;Alessa, Raghad;Alhammad, Sukainah;Ali, Batoola;Al-Qanbar, Majd;Rahman, Atta-ur
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.173-182
    • /
    • 2022
  • Healthcare organizations are overwhelmingly embracing smart value-based care strategies, which focuses on providing superior treatment at a significantly lower cost and quality of service (QoS). For these purposes, fifth generation (5G) of mobile service provides an innumerable improvement that clearly outperforms previous generations e.g., 3G and 4G. However, as with most advancements, 5G is projected to introduce new challenges, prompting the community to think about what comes next. This research was conducted to examine the most recent smart 5G technology applications and the solutions they provide to the healthcare industry. Finally, the paper discusses how the upcoming 6G technology has the potential to transform the future of healthcare sector even beyond the current 5G systems.

컴퓨터 전공 신입생의 성공적 적응 요인 분석 (Analysis of Successful Adaptation Factors of Computer Science Freshmen Students)

  • 박우창
    • 공학교육연구
    • /
    • 제17권4호
    • /
    • pp.95-101
    • /
    • 2014
  • As other major, students have difficulties to be successfully adapted to computer science major without some interest and skill to computer programming. In this paper, we try to find successful factors for computer science major freshmen students to computer programming. The factors we focused are programming experience before college entrance, taking liberal arts/natural science courses at high school, application motivations to computer major, existence of mentors, satisfaction to his/her computer department, student's holland job aptitude code. After analysis, taking liberal arts/natural science courses at high school, satisfaction to computer department, some holland job aptitude code are significant to their successful adaptation to computer major. Also, we found the holland job apptitude code is closely related to student's satisfaction to their major for engineering students including computer science students. Our analysis results will be a suggestion for designing computer science education program with students who enters college without some aptitude or preparation to his major.

SYN Flood DoS Detection System Using Time Dependent Finite Automata

  • Noura AlDossary;Sarah AlQahtani;Reem Alzaher;Atta-ur-Rahman
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.147-154
    • /
    • 2023
  • Network intrusion refers to any unauthorized penetration or activity on a computer network. This upsets the confidentiality, integrity, and availability of the network system. One of the major threats to any system's availability is a Denial-of-Service (DoS) attack, which is intended to deny a legitimate user access to resources. Therefore, due to the complexity of DoS attacks, it is increasingly important to abstract and describe these attacks in a way that will be effectively detected. The automaton theory is used in this paper to implement a SYN Flood detection system based on Time-Dependent Finite Automata (TDFA).

A Simple Proposal For Ain Makkah Almukkarmah An Application Using Augmented Reality Technology

  • Taghreed Alotaibi;Laila Alkabkabi;Rana Alzahrani;Eman Almalki;Ghosson Banjar;Kholod Alshareef;Olfat M. Mirza
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.115-122
    • /
    • 2023
  • Makkah Al-Mukarramah is the capital of Islamic world. It receives special attention from the Saudi government's rulers to transform it into a smart city for the benefit of millions of pilgrims. One of the 2030 vision objectives is to transform specific cities to smart ones with advanced technological facilitation, Makkah is one of these cities. The history of Makkah is not well known for some Muslims. As a result, we built the concepts of our application "Ain Makkah" to enable visitors of Makkah to know the history of Makkah by using technology. In particular "Ain Makkah" uses Augmented Reality to view the history of Al-Kaaba. A 3D model will overlay Al-Kaaba to show it in the last years. Our project will use Augmented Reality to build a 3D model to overlay Al-Kaaba. Future work will expand the number of historical landmarks of Makkah.

Integration of Blockchain and Cloud Computing in Telemedicine and Healthcare

  • Asma Albassam;Fatima Almutairi;Nouf Majoun;Reem Althukair;Zahra Alturaiki;Atta Rahman;Dania AlKhulaifi;Maqsood Mahmud
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.17-26
    • /
    • 2023
  • Blockchain technology has emerged as one of the most crucial solutions in numerous industries, including healthcare. The combination of blockchain technology and cloud computing results in improving access to high-quality telemedicine and healthcare services. In addition to developments in healthcare, the operational strategy outlined in Vision 2030 is extremely essential to the improvement of the standard of healthcare in Saudi Arabia. The purpose of this survey is to give a thorough analysis of the current state of healthcare technologies that are based on blockchain and cloud computing. We highlight some of the unanswered research questions in this rapidly expanding area and provide some context for them. Furthermore, we demonstrate how blockchain technology can completely alter the medical field and keep health records private; how medical jobs can detect the most critical, dangerous errors with blockchain industries. As it contributes to develop concerns about data manipulation and allows for a new kind of secure data storage pattern to be implemented in healthcare especially in telemedicine fields is discussed diagrammatically.

비전공자 컴퓨터교육과 학습보조 자료의 활용 (Computer Science Education and Use of Learning Materials)

  • 나정은
    • 공학교육연구
    • /
    • 제22권6호
    • /
    • pp.21-27
    • /
    • 2019
  • In the last few years, interest in computer science education has increased significantly. The curriculum is being revised to introduce computer science. Although interest has focused on coding as the main subject, in fact the computer science includes much more than coding. It engages people in being creative with technology as well as understanding the fundamental principles of computer science. Therefore, it is important to consider the curriculum to provide a foundation by teaching and learning computer science. The curriculum is required the development of courses to teach computer science for non-majors in general education. To think like a computer scientist on the knowledge of computer science is computational thinking. In order to maximize the effectiveness of teaching and learning for computational thinking, various teaching methods and supplementary learning materials, and activities should be developed and provided.