• Title/Summary/Keyword: Context based Dynamic Security

Search Result 15, Processing Time 0.019 seconds

Integration of Logistics Systems of Developing Countries into International Logistics Channels

  • Hassan Ali Al-Ababneh;Ilona Yu. Dumanska;Ella M. Derkach;Anna V. Sokhetska;Liliia H. Kemarska
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.87-100
    • /
    • 2024
  • Modern logistics significantly influences the globalization and internationalization processes. Logistics systems are becoming increasingly important in today's rapidly changing environment. On the other hand, the development of global economic integration, business globalization contributes to the creation and development of international logistics systems and global supply chains towards the international market. The aim of the article was to investigate the national logistics systems of developing countries in the context of their integration capabilities. The main methods used in this study are statistical analysis, index, graphical and analytical methods, methods for estimating structural dynamic shifts, comparisons. Commonly used methods of economic research, as well as statistical analysis and interstate comparisons, economic modelling (trend analysis to determine the forecast level of LPI for Ukraine), etc. were also involved. It is noted that the problem of development of logistics systems in developing countries was insufficiently covered in scientific research. The study suggests that the integration capabilities of national logistics systems are determined by the logistics performance of each country and the favourable logistics environment for integration transformations. This allowed analysing the state of the logistics systems of Poland, Bulgaria, India and Ukraine, and identifying the factors that determine it. The logistics environment of Poland, Bulgaria, India and Ukraine, as well as the factors of its formation are evaluated. The components of the logistic portrait of the country in the context of integration capabilities of the logistic system are offered. Trend analysis of LPI was carried out on the example of Ukraine, which showed positive trends in the logistics system and allowed drawing conclusions about increasing integration into international logistics channels based on its geopolitical location, improving the characteristics of the logistics environment, including customs regulation, and improving the efficiency of the national logistics system. Prospects for further research involve studies of the impact of pandemics, globalization, digitalization on logistics systems, including that of developing countries.

Model Multiplicity (UML) Versus Model Singularity in System Requirements and Design

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.103-114
    • /
    • 2021
  • A conceptual model can be used to manage complexity in both the design and implementation phases of the system development life cycle. Such a model requires a firm grasp of the abstract principles on which a system is based, as well as an understanding of the high-level nature of the representation of entities and processes. In this context, models can have distinct architectural characteristics. This paper discusses model multiplicity (e.g., unified modeling language [UML]), model singularity (e.g., object-process methodology [OPM], thinging machine [TM]), and a heterogeneous model that involves multiplicity and singularity. The basic idea of model multiplicity is that it is not possible to present all views in a single representation, so a number of models are used, with each model representing a different view. The model singularity approach uses only a single unified model that assimilates its subsystems into one system. This paper is concerned with current approaches, especially in software engineering texts, where multimodal UML is introduced as the general-purpose modeling language (i.e., UML is modeling). In such a situation, we suggest raising the issue of multiplicity versus singularity in modeling. This would foster a basic appreciation of the UML advantages and difficulties that may be faced during modeling, especially in the educational setting. Furthermore, we advocate the claim that a multiplicity of views does not necessitate a multiplicity of models. The model singularity approach can represent multiple views (static, behavior) without resorting to a collection of multiple models with various notations. We present an example of such a model where the static representation is developed first. Then, the dynamic view and behavioral representations are built by incorporating a decomposition strategy interleaved with the notion of time.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

Design Self-Organization Routing Protocol for supporting Data Security in Healthcare Sensor Network (헬스케어 센서 네트워크에서 데이터 보안을 지원한 자기구성 라우팅 프로토콜 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.517-520
    • /
    • 2008
  • Wireless sensor network supporting healthcare environment should provide customized service in accordance with context information such as continuous location change and status information for people or movable object. In addition, we should consider data transmission guarantees a person's bio information and privacy security provided through sensor network. In this paper analyzes LEACH protocol which guarantees the dynamic self-configuration, energy efficiency through configuration of inter-node hierarchical cluster between nodes and key distribution protocol used for security for data transmission between nodes. Based on this analysis result, we suggested self-configuration routing protocol supporting node mobility which is weakness of the existing LEACH protocol and data transmission method by applying key-pool pre-distribution method whose memory consumption is low, cluster unit public key method to sensor node.

  • PDF

Formation of New Approaches to the Use of Information Technology and Search For Innovative Methods of Training Specialists within the Pan-European Educational Space

  • Stratan-Artyshkova, Tetiana;Kozak, Khrystyna;Syrotina, Olena;Lisnevska, Nataliya;Sichkar, Svitlana;Pertsov, Oleksandr;Kuchai, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.97-104
    • /
    • 2022
  • European integration processes have acted as a catalyst for the emergence of a new type of educational environment, which is characterized by competent flexibility of specialists. Therefore, the article focuses on professional training of teachers in the context of European integration processes using information technology and the search for innovative methods of training specialists. One of the educational priorities in Europe is to create a new model of a teacher who has an academic education, knows innovative methods, is able to perform functions and tasks efficiently and professionally, adequately, quickly and correctly respond to changes and innovations. The tasks facing education in the European dimension are formulated. The main trends in the education of teachers in modern Europe are described: the need to deepen and expand subject training programs in pedagogical institutions of Higher Education, which will allow autonomy of activity, awareness of responsibility for independent creative decisions, create favorable conditions for the development of professionalism through the use of Information Technology and the search for innovative methods of training specialists. At the present stage, various models of teacher training are being developed based on the University and practical concept using information technology and searching for innovative methods of training specialists. On this basis, two different theories of perception of teacher education were formed: as preparation of teachers for work throughout their professional career; as preparation for the first years of professional work, which is periodically repeated in the process of continuous professional training and improvement. Among the advantages that the use of Information Technology and the search for innovative methods of training specialists to implement the learning process, it is worth mentioning the following: simultaneous use of several channels of perception of the student or student in the learning process, thanks to which the integration of information processed by different sensory organs is achieved; the ability to simulate complex real experiments; visualization of abstract information by dynamic representation of processes, etc.