• Title/Summary/Keyword: Concept Network

Search Result 1,790, Processing Time 0.022 seconds

How Can Self Love Lead to Spying on Ex-Partners on Facebook? -The Effects of Ego Factors on Facebook Surveillance -

  • Furbee, Brittany;Ahn, Hongmin
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.187-193
    • /
    • 2019
  • In this study, we attempted to identify the personality traits that influence one's likelihood to stalk an ex-partner on Facebook. Specifically, we focused on self-concept-related traits, given that the motivations for using social network sites (SNS) are highly associated with the concept of self. These include self-esteem, narcissism, and self-efficacy. To assess these factors, we controlled for extraneous variables while assessing the predictive power of personality traits, such as Facebook usage, length of the relationship, and time since the break-up. The results of a self-administered, web-based survey (N=207) showed that self-esteem, narcissism, and self-efficacy are all traits that can predict the stalking of an ex-partner on Facebook. More specifically, we showed a negative association between self-esteem and one's likelihood to stalk an ex-partner on Facebook, while it showed positive relationships between Facebook stalking and both narcissism and self-efficacy.

A Study on the Low-Pass Filter Design Using the Concept of FDNR (FDNR개념을 이용한 저역Filter에 관한 연구)

  • 이성백;김인재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.7 no.1
    • /
    • pp.29-36
    • /
    • 1982
  • This paper investigates the utilization of the concept of FDNR first proposed by L. T. Bruton to eliminate the necessity of inductance in a network. A new FDNR with single OP-Amp is also introduces to simplify the network in this paper. The efficiency of the new contrivance is also proved through experimented confirmation of its frequency when applied to on active eliptic low pass filter.

  • PDF

Pedagogical Innovations: Problems, Tendencies of Development of Modern Education

  • Dziubenko, Iryna;Semenog, Olena;Lokshyna, Olena;Dzhurylo, Alina;Hlushko, Oksana;Starokozhko, OIga
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.173-178
    • /
    • 2021
  • The article reveals the essence of the concept of "pedagogical innovation" and identifies trends in the development of a modern educational institution. A qualitative analysis of the scientific literature in the field of innovation science has been carried out. The essence of the concept of "pedagogical innovation" is revealed. The modern classification of pedagogical innovations is given. The factors of the success of the introduction of pedagogical innovations are determined. The main trends in the development of modern educational institutions are outlined.

The Concept of the Formation of the Teacher's Innovative Competence in the Space of Lifelong Education

  • Boiko, Olha;Oborska, Svitlana;Kyrylenko, Kateryna;Cherevko, Svitlana;Lebid, Olha;Kulko, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.59-64
    • /
    • 2021
  • The article proposes the process of formation of the teacher's innovative competence in the space of lifelong education the foundations of the formation of the teacher's innovative competence in the space of continuous education. The concept of the formation of the teacher's innovative competence in the space of lifelong education is proposed; it includes initial ideas, goals, objectives, patterns, principles, stages, content and technologies implementation of this process.

Contactless Smart Card as a Cache for Geocaching

  • Burda, Karel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.205-210
    • /
    • 2021
  • In this paper, the possibility of using a contactless smart card as a cache for geocaching is analyzed. Geocaching is an outdoor game in which players search for hidden boxes, or caches based on geographical coordinates. The problems with this game are the possibility of players cheating and the need to maintain the caches. And then there is the problem of the ignorant public accidentally discovering a cache and considering it an explosive device. This paper proposes a concept for a possible solution to the above problems by replacing the boxes with conventional contactless smart cards. Also, this concept makes geocaching more attractive by using various games. This paper proposes a system architecture as well as the cryptographic protocol required for secure communication between the player's smartphone and the card.

Application of the IoT Concept in the Field of Medical Devices: Development of a Prototype of a Mechanotherapeutic Simulator and Software for Its Control

  • Lasek, Mikhail Petrovich;Karmanov, Vladislav Nikolaevich;Makarov, Roman Vladimirovich;Makarov, Pavel Andreevich;Gryaznov, Dmitriy Yurievich;Ustyugov, Vladimir Aleksandrovich
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.63-66
    • /
    • 2022
  • The article discusses the application of the IoT concept in the sensitive field of medical devices on the example of a developed prototype of a mechanotherapeutic simulator. Mechanotherapy is a complex of therapeutic, preventive, and restorative exercises conducted using simulators, specially designed for developing movements in individual joints. Mechanotherapy is used for the early and painless restoration of joint mobility, to prevent complications associated with prolonged immobilization of the injured area of extremities. Using the mechanotherapy simulator allows developing the joint painlessly, which accelerates the metabolism in the injured area, and soft tissues are restored to normal. The article provides information about the electronic components that ensure the wireless operation of the device and describes in detail the applied software as well as the client application for a mobile device.

The Concept of Siāsa Shar'iyyah As a Basis of Applying Sharia Law

  • Almarashi, Majdi Saeed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.352-356
    • /
    • 2022
  • The purpose of this paper is the clarify the concept of Siāsa Shar'iyyah-the foundational principle of the application of Islamic law-and the occasion and methodology of the Muslim community in the implementation of Sharia. The paper deals with two important issues in terms of the impact of Sharia implementation. The first is the impact of applying Siāsa Shar'iyyah in terms of detailed rulings in Sharia. The second is the overall impact Siāsa Shar'iyyah has on the application of Sharia as a country's political system.

A Procedure for Determining The Locating Chromatic Number of An Origami Graphs

  • Irawan, Agus;Asmiati, Asmiati;Utami, Bernadhita Herindri Samodra;Nuryaman, Aang;Muludi, Kurnia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.31-34
    • /
    • 2022
  • The concept of locating chromatic number of graph is a development of the concept of vertex coloring and partition dimension of graph. The locating-chromatic number of G, denoted by χL(G) is the smallest number such that G has a locating k-coloring. In this paper we will discussed about the procedure for determine the locating chromatic number of Origami graph using Python Programming.

Theoretical Analysis Of The Problem Of Leadership In Professional And Management Activities

  • Desiatnyk, Kateryna;Novakivska, Lyudmyla;Pryma, Viktoriia;Klochko, Larysa;Vdovina, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.192-198
    • /
    • 2022
  • The article is devoted to current problems of the concept leadership. The essence of the concept of "leadership" is considered and leadership theories. The authors of the article conducted a multifaceted analysis of leadership theories, analyzed the factors of their formation and identified their relationship. Also, the reasons for the difference and connection between leadership and leadership. Styles were presented leadership and their role in building effective leadership. To form the basis of effective leadership was compared to the main criteria inherent in this theories. The following research methods were used in the work: theoretical (analysis of regulatory documents and scientific literature on the problem under study, comparison, generalization, modeling), empirical (diagnostics of the level of formation of managerial competencies of students of the system, questioning, observation, peer review, comparative qualitative and quantitative analysis of diagnostic results the level of formation of managerial competencies).

From Multimedia Data Mining to Multimedia Big Data Mining

  • Constantin, Gradinaru Bogdanel;Mirela, Danubianu;Luminita, Barila Adina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.381-389
    • /
    • 2022
  • With the collection of huge volumes of text, image, audio, video or combinations of these, in a word multimedia data, the need to explore them in order to discover possible new, unexpected and possibly valuable information for decision making was born. Starting from the already existing data mining, but not as its extension, multimedia mining appeared as a distinct field with increased complexity and many characteristic aspects. Later, the concept of big data was extended to multimedia, resulting in multimedia big data, which in turn attracted the multimedia big data mining process. This paper aims to survey multimedia data mining, starting from the general concept and following the transition from multimedia data mining to multimedia big data mining, through an up-to-date synthesis of works in the field, which is a novelty, from our best of knowledge.