• 제목/요약/키워드: Emerging Security

검색결과 363건 처리시간 0.02초

스마트폰 어플리케이션을 이용한 실내 가스 모니터링 시스템 (Indoor Gas Monitoring System Using Smart Phone Application)

  • 최성열;최장식;김상춘
    • 융합보안논문지
    • /
    • 제12권1호
    • /
    • pp.49-54
    • /
    • 2012
  • 최근 스마트폰의 등장과 무선 통신의 발전으로 원격지의 정보를 활용하여 사용자에게 편리한 서비스를 제공하는 연구가 활발하게 진행되고 있으나, 각 서비스 응용 및 센서 노드들의 특징에 따라 별도 모니터링 시스템을 설계 및 구축이 필요하다. 따라서 본 논문은 이러한 비효율성을 해결하기 위해 제안된 모니터링 시스템이 타 센서 네트워크 시스템에서 연동이 가능하도록 설계하였으며, 가스센서의 정보를 센서 네트워크를 통해 실내 가스 상태를 판단하여 위험 수준v및 상황을 스마트폰 사용자에게 알려주는 실내 가스 모니터링 시스템 제안한다.

DoS Attack Control Design of IoT System for 5G Era

  • Rim, Kwangcheol;Lim, Dongho
    • Journal of information and communication convergence engineering
    • /
    • 제16권2호
    • /
    • pp.93-98
    • /
    • 2018
  • The Internet of Things (IoT) is a form of the emerging 4th industry in the 5G era. IoT is expected to develop naturally in our daily life in the 5G era in which high-speed communication will be completed. Along with the rise of IoT, concerns about security and malicious attacks are also increasing. This paper examines DoS attacks, which are one of the representative security threats of IoT and proposes a local detection and blocking system that are suitable for response to such attacks. First, systems of the LoRaWAN type, which are most actively researched in the IoT system field and DoS attacks that can occur in such systems were examined. Then, the inverse order tree algorithm using regional characteristics was designed as a cluster analysis form. Finally, a system capable of defending denial-of-service attacks in the 5G IoT system using local detection and blocking with the Euclidean distance was designed.

Mainstreaming of Students with Intellectual Disability in the Kingdom of Saudi Arabia: Special Education Teachers' Perceptions

  • Bagadood, Nizar H.;Sulaimani, Mona F.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.183-188
    • /
    • 2022
  • Educators have been making strides in the research into and practices supporting the policy of mainstreaming students with disability. A move towards including students with intellectual disability in community schools with all the other students can be seen in many countries' education systems, including that of the Kingdom of Saudi Arabia. The 'rights of the child' has been the main argument put forward by advocates of this policy in an attempt to move from the medical to the social model. This study argues that, although mainstreaming can be viewed as a positive trend toward effective education, its implementation remains somewhat problematic. It is believed that more investigative research into professionals' attitudes is needed to improve service provision and inform the administration of mainstreaming practices. The attitudes of special education teachers on the policy of mainstreaming are examined and emerging key themes discussed. Furthermore, challenges that continue to inhibit mainstreaming practices in Saudi Arabia are identified.

HetNet Characteristics and Models in 5G Networks

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.27-32
    • /
    • 2022
  • The fifth generation (5G) mobile communication technology is designed to meet all communication needs. Heterogeneous networks (HetNets) are a new emerging network structure. HetNets have greater potential for radio resource reuse and better service quality than homogeneous networks since they can evolve small cells into macrocells. Effective resource allocation techniques reduce inter-user interference while optimizing the utilization of limited spectrum resources in HetNets. This article discusses resource allocation in 5G HetNets. This paper explains HetNets and how they work. Typical cell types in HetNets are summarized. Also, HetNets models are explained in the third section. The fourth component addresses radio resource control and mobility management. Moreover, future study in this subject may benefit from this article's significant insights on how HetNets function.

Internet of Things Fundamentals, Architectures, Challenges and Solutions: A Survey

  • Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.189-198
    • /
    • 2022
  • As the number of people using the Internet increases, a new application known as the Internet of Things (IoT) has been emerged. Internet of Things makes it easier for machines and objects to exchange, compute, and coordinate information autonomously without human interference. It is a tool for attaching intelligence to a variety of contemporary objects in houses, hospitals, buildings, vehicles, and even cities. As a new emerging technology, the focus in current IoT surveys does not shed the light on deep understanding for IoT fundamentals, architectures, challenges, and solutions. For this reason, the objective of this paper is to introduce specifications for IoT definitions, characteristics, functional blocks, and different architectures as a cement for better understanding. Additionally, we present current documented IoT challenges, with the existing available solution for each challenge.

Evolutionary Theory Of Management In Education

  • Moskalenko-Vysotska, Olena;Melnyk, Emiliia;Tovstenko-Zabelin, Serhii;Lehka, Svitlana;Didenko, Maryna;Hrubych, Kostiantyn
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.312-318
    • /
    • 2022
  • The article notes that one of the reasons for the crisis in education was the sharp discrepancy between the emerging new forms and content and the model of macro-management that has developed over the decades. The level of management of the educational system did not emerge as a specific activity characterized by its own mechanisms and processes, just as qualified carriers of this activity - professionals - managers - did not appear. At the same time, there is practically no theoretical and methodological model of the macrolevel of education management, that is, management of the educational system as an integral structure.

Distance Learning for Students with Intellectual Disability during the Emerging Coronavirus Pandemic: Opportunities and Challenges from Parents' Perspectives

  • Alnefaie, Adhwaa M.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.85-92
    • /
    • 2021
  • Distance learning for students with intellectual disabilities can prove beneficial, particularly if adjusted to their educational characteristics and needs. This study seeks to identify the views of parents living in Saudi Arabia, regarding the opportunities offered by distance learning for students with intellectual disabilities, alongside their challenges during the Covid-19 pandemic. The research employed qualitative methods using semi-structured interviews with six parents of students with intellectual disabilities. The results revealed a number of both opportunities and challenges, including issues related to the family, in addition, the data highlighted difficulties related to the educational process (i.e. a lack of variety of educational methods) and technical issues related to access to the Internet and the insufficient computer skills of both teachers and students. The findings have several important implications for future practice, including the need for training workshops for parents concerning the online platform, as well as further research to determine students' perspectives of their experiences with distance learning.

Presentation Attack Detection (PAD) for Iris Recognition System on Mobile Devices-A Survey

  • Motwakel, Abdelwahed;Hilal, Anwer Mustafa;Hamza, Manar Ahmed;Ghoneim, Hesham E.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.415-426
    • /
    • 2021
  • The implementation of iris biometrics on smartphone devices has recently become an emerging research topic. As the use of iris biometrics on smartphone devices becomes more widely adopted, it is to be expected that there will be similar efforts in the research community to beat the biometric by exploring new spoofing methods and this will drive a corresponding requirement for new liveness detection methods. In this paper we addresses the problem of presentation attacks (Spoofing) against the Iris Recognition System on mobile devices and propose novel Presentation Attack Detection (PAD) method which suitable for mobile environment.

Reasons for Adopting Weak Opinions in Islamic Jurisprudence

  • Alharthy, Meshal Qabbas
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.323-327
    • /
    • 2022
  • The field of this study is in Islamic jurisprudence. Taking the preferred saying is contrary to the original, and takes it if necessity or need arises. There are reasons for adopting the preferred saying that were mentioned in this research so that the mufti and jurist know when to take the preferred saying, and when to act with the most correct saying. The origin is the work of the jurist and mufti by saying the most correct. If the necessity or the need that prompted the mufti to take the preferred saying ceases, then he returns to work with the most correct saying, and gives it precedence over the most preferred opinion. The researcher recommends that this topic be given more attention from researchers, and that it is taken care of in jurisprudential developments; So that the embarrassment of the nation is lifted, and the jurists clarify the legal ruling on emerging issues.

A Hybrid Learning Model to Detect Morphed Images

  • Kumari, Noble;Mohapatra, AK
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.364-373
    • /
    • 2022
  • Image morphing methods make seamless transition changes in the image and mask the meaningful information attached to it. This can be detected by traditional machine learning algorithms and new emerging deep learning algorithms. In this research work, scope of different Hybrid learning approaches having combination of Deep learning and Machine learning are being analyzed with the public dataset CASIA V1.0, CASIA V2.0 and DVMM to find the most efficient algorithm. The simulated results with CNN (Convolution Neural Network), Hybrid approach of CNN along with SVM (Support Vector Machine) and Hybrid approach of CNN along with Random Forest algorithm produced 96.92 %, 95.98 and 99.18 % accuracy respectively with the CASIA V2.0 dataset having 9555 images. The accuracy pattern of applied algorithms changes with CASIA V1.0 data and DVMM data having 1721 and 1845 set of images presenting minimal accuracy with Hybrid approach of CNN and Random Forest algorithm. It is confirmed that the choice of best algorithm to find image forgery depends on input data type. This paper presents the combination of best suited algorithm to detect image morphing with different input datasets.