• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.025 seconds

New Cellular Neural Networks Template for Image Halftoning based on Bayesian Rough Sets

  • Elsayed Radwan;Basem Y. Alkazemi;Ahmed I. Sharaf
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.85-94
    • /
    • 2023
  • Image halftoning is a technique for varying grayscale images into two-tone binary images. Unfortunately, the static representation of an image-half toning, wherever each pixel intensity is combined by its local neighbors only, causes missing subjective problem. Also, the existing noise causes an instability criterion. In this paper an image half-toning is represented as a dynamical system for recognizing the global representation. Also, noise is reduced based on a probabilistic model. Since image half-toning is considered as 2-D matrix with a full connected pass, this structure is recognized by the dynamical system of Cellular Neural Networks (CNNs) which is defined by its template. Bayesian Rough Sets is used in exploiting the ideal CNNs construction that synthesis its dynamic. Also, Bayesian rough sets contribute to enhance the quality of the halftone image by removing noise and discovering the effective parameters in the CNNs template. The novelty of this method lies in finding a probabilistic based technique to discover the term of CNNs template and define new learning rules for CNNs internal work. A numerical experiment is conducted on image half-toning corrupted by Gaussian noise.

Cyclic behavior of self-centering braces utilizing energy absorbing steel plate clusters

  • Jiawang Liu;Canxing Qiu
    • Steel and Composite Structures
    • /
    • v.47 no.4
    • /
    • pp.523-537
    • /
    • 2023
  • This paper proposed a new self-centering brace (SCB), which consists of four post-tensioned (PT) high strength steel strands and energy absorbing steel plate (EASP) clusters. First, analytical equations were derived to describe the working principle of the SCB. Then, to investigate the hysteretic performance of the SCB, four full-size specimens were manufactured and subjected to the same cyclic loading protocol. One additional specimen using only EASP clusters was also tested to highlight the contribution of PT strands. The test parameters varied in the testing process included the thickness of the EASP and the number of EASP in each cluster. Testing results shown that the SCB exhibited nearly flag-shape hysteresis up to expectation, including excellent recentering capability and satisfactory energy dissipating capacity. For all the specimens, the ratio of the recovered deformation is in the range of 89.6% to 92.1%, and the ratio of the height of the hysteresis loop to the yielding force is in the range of 0.47 to 0.77. Finally, in order to further understand the mechanism of the SCB and provide additional information to the testing results, the high-fidelity finite element (FE) models were established and the numerical results were compared against the experimental data. Good agreement between the experimental, numerical, and analytical results was observed, and the maximum difference is less than 12%. Parametric analysis was also carried out based on the validated FE model to evaluate the effect of some key parameters on the cyclic behavior of the SCB.

Utilizing Machine Learning Algorithms for Recruitment Predictions of IT Graduates in the Saudi Labor Market

  • Munirah Alghamlas;Reham Alabduljabbar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.113-124
    • /
    • 2024
  • One of the goals of the Saudi Arabia 2030 vision is to ensure full employment of its citizens. Recruitment of graduates depends on the quality of skills that they may have gained during their study. Hence, the quality of education and ensuring that graduates have sufficient knowledge about the in-demand skills of the market are necessary. However, IT graduates are usually not aware of whether they are suitable for recruitment or not. This study builds a prediction model that can be deployed on the web, where users can input variables to generate predictions. Furthermore, it provides data-driven recommendations of the in-demand skills in the Saudi IT labor market to overcome the unemployment problem. Data were collected from two online job portals: LinkedIn and Bayt.com. Three machine learning algorithms, namely, Support Vector Machine, k-Nearest Neighbor, and Naïve Bayes were used to build the model. Furthermore, descriptive and data analysis methods were employed herein to evaluate the existing gap. Results showed that there existed a gap between labor market employers' expectations of Saudi workers and the skills that the workers were equipped with from their educational institutions. Planned collaboration between industry and education providers is required to narrow down this gap.

Design and Implementation of Fully Automated Solar Powered Irrigation System

  • Mohammad Fawzi Al Ajlouni;Essam Ali Al-Nuaimy;Salman Abdul-Rassak Sultan;Ali Hammod AbdulHussein Twaij;Al Smadi Takialddin
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.197-205
    • /
    • 2024
  • This paper presents a fully automated stand-alone irrigation system with GSM (Global System for Mobile Communication) module. Solar energy is utilized to power the system and it is aimed to conserve water by reducing water losses. The system is based on a DC water pump that draws energy from solar panels along with automated water flow control using a moisture sensor. It is also fitted with alert and protection system that consists of an ultrasonic sensor and GSM messages sender that transmits signals showing the levels of the water in the reservoir and the battery charge. The control system is designed to stop the water pump from pumping water either when the battery level drops to equal or less than 10% of its full charge, or when the water level becomes less than 10 cm high in the reservoir. The experimental results revealed that the system is appropriate to use in remote areas with water scarcity and away from the national grid.

Relevance of E- Learning and Quality Development in Higher Education

  • Arshi Naim;Sahar Mohammed Alshawaf
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.187-195
    • /
    • 2024
  • This is an extended paper explaining the role of E-learning and quality development in the current situation. Amid Covid:19, E-Learning has achieved a new miles stone in imparting education and all levels of institutions have transformed their learning platform from face to face to virtual learning. In this scenario E-Learning is facing two major challenges, first to ensure the ability of computer systems or software to exchange and make use of information on virtual platform (interoperability) and secondly, developing quality learning through e-Learning. To impart learning and teaching (L&T) through E-learning, Middle East University (MEU) has adopted Learning Management Services (LMS) through Blackboard. The university has three types of L&T methods; full online, Blended and Supportive. This research studies the concept, scope and dimensions of interoperability (InT) of E-Learning in MEU then the connection and interdependence between with quality development. In this paper we have described the support and the importance of finest standards and specifications for the objectives of InT of E-Learning and quality development in MEU. The research is based principally on secondary data observed from MEU E-Learning deanship. Also sample of 20 E-Learning experts at MEU were given closed ended as well as semi closed questionnaires for evaluating the assurance of InT of E-Learning and quality development. These experts are mainly certified online facilitators and admin staff. Results provide the verification of application and presence of InT of E-Learning and assured the quality development process in MEU.

Modern Innovative Research in the Field of Education

  • Ganna Taran;Dmytro Chornomordenko;Nataliia Bondarenko;Danylo Bohatyrov;Mykola Spiridonov;Vasyl Matviiv
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.145-150
    • /
    • 2023
  • The main purpose of the study is to identify the key aspects of modern innovative research in the field of education. In the modern informatized world, education is becoming a decisive factor in social development and an important component in the development of the human personality, increasing respect for human rights and freedoms. Today it is quite obvious that without the necessary education a person will not be able to provide himself with proper living conditions and realize himself as a person. The high level of education of the population is an important factor that positively influences the creation of favorable conditions for the full realization of the rights and freedoms of man and citizen. Today, active and interactive teaching methods are widely used. The use of interactive teaching methods ensures complete immersion of students in the learning process and is the main source of learning. The radical difference between traditional and interactive learning is that the student not only replenishes and strengthens his knowledge, but also complements and constructs new ones. The methodology includes a number of theoretical methods. As a result of the study, current trends and prerequisites of modern innovative research in the field of education were investigated.

Improved Key-Recovery Attacks on HMAC/NMAC-MD4 (HMAC/NMAC-MD4에 대한 향상된 키 복구 공격)

  • Kang, Jin-Keon;Lee, Je-Sang;Sung, Jae-Chul;Hong, Seok-Hie;Ryu, Heui-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.63-74
    • /
    • 2009
  • In 2005, Wang et al. discovered devastating collision attacks on the main hash functions from the MD4 family. After the discovery of Wang, many analysis results on the security of existing hash-based cryptographic schemes are presented. At CRYPTO'07, Fouque, Leurent and Nguyen presented full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5[4]. Such attacks are based on collision attacks on the underlying hash function, and the most expensive stage is the recovery of the outer key. At EUROCRYPT'08, Wang, Ohta and Kunihiro presented improved outer key recovery attack on HMAC/NMAC-MD4, by using a new near collision path with a high probability[2]. This improves the complexity of the full key-recovery attack on HMAC/NMAC-MD4 which proposed by Fouque, Leurent and Nguyen at CRYPTO'07: The MAC queries decreases from $2^{88}$ to $2^{72}$, and the number of MD4 computations decreases from $2^{95}$ to $2^{77}$. In this paper, we propose improved outer key-recovery attack on HMAC/NMAC-MD4 with $2^{77.1246}$ MAC queries and $2^{37}$ MD4 computations, by using divide and conquer paradigm.

Malware Application Classification based on Feature Extraction and Machine Learning for Malicious Behavior Analysis in Android Platform (안드로이드 플랫폼에서 악성 행위 분석을 통한 특징 추출과 머신러닝 기반 악성 어플리케이션 분류)

  • Kim, Dong-Wook;Na, Kyung-Gi;Han, Myung-Mook;Kim, Mijoo;Go, Woong;Park, Jun Hyung
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.27-35
    • /
    • 2018
  • This paper is a study to classify malicious applications in Android environment. And studying the threat and behavioral analysis of malicious Android applications. In addition, malicious apps classified by machine learning were performed as experiments. Android behavior analysis can use dynamic analysis tools. Through this tool, API Calls, Runtime Log, System Resource, and Network information for the application can be extracted. We redefined the properties extracted for machine learning and evaluated the results of machine learning classification by verifying between the overall features and the main features. The results show that key features have been improved by 1~4% over the full feature set. Especially, SVM classifier improved by 10%. From these results, we found that the application of the key features as a key feature was more effective in the performance of the classification algorithm than in the use of the overall features. It was also identified as important to select meaningful features from the data sets.

A Study on the Protection for Personal Information in Private Security Provider's (경비업자의 개인정보보호에 관한 연구)

  • Ahn, Hwang-Kwon;Kim, Il-Gon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.99-108
    • /
    • 2011
  • The purpose of this study is to profile actual conditions of personal information protection systems operated in overseas countries and examine major considerations of personal information that security service providers must know in the capacity of privacy information processor, so that it may contribute to preventing potential occurrence of any legal disputes in advance. Particularly, this study further seeks to describe fundamental idea and principle of said Personal Information Protection Act; enhancement of various safety measures (e.g. collection / use of privacy data, processing of sensitive information / personal ID information, and encryption of privacy information); restrictions on installation / operation of video data processing devices; and penal regulations as a means of countermeasure against leakage of personal information, while proposing possible solutions to cope with these matters. Using cases among foreign countries for this study. Possible solutions proposed by this study can be summed up as follows: By changing minds with sufficient legal reviews, it is required for security service providers to 1) clearly and further specify any purposes of collecting and using privacy information, if possible, 2) obtain any privacy information by legitimate means as it is necessary to collect such information, 3) stop providing any personal information for the 3rd parties or for any other purposes except fundamental purposes of using privacy information, and 4) have full knowledge about duty of safety measure in accordance with safe maintenance of privacy information and protect any personal information from unwanted or intentional leakage to others.

Secure Communication in Multiple Relay Networks Through Decode-and-Forward Strategies

  • Bassily, Raef;Ulukus, Sennur
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.352-363
    • /
    • 2012
  • In this paper, we study the role of cooperative relays to provide and improve secure communication rates through decodeand-forward (DF) strategies in a full-duplex multiple relay network with an eavesdropper. We consider the DF scheme as a basis for cooperation and propose several strategies that implement different versions of this scheme suited for cooperation with multiple relays. Our goal is to give an efficient cooperation paradigm based on the DF scheme to provide and improve secrecy in a multiple relay network. We first study the DF strategy for secrecy in a single relay network. We propose a suboptimal DF with zero forcing (DF/ZF) strategy for which we obtain the optimal power control policy. Next, we consider the multiple relay problem. We propose three different strategies based on DF/ZF and obtain their achievable secrecy rates. The first strategy is a single hop strategy whereas the other two strategies are multiple hop strategies. In the first strategy, we show that it is possible to eliminate all the relays' signals from the eavesdropper's observation (full ZF), however, the achievable secrecy rate is limited by the worst source-relay channel. Our second strategy overcomes the drawback of the first strategy, however, with the disadvantage of enabling partial ZF only. Our third strategy provides a reasonable compromise between the first two strategies. That is, in this strategy, full ZF is possible and the rate achieved does not suffer from the drawback of the first strategy. We conclude our study by a set of numerical results to illustrate the performance of each of the proposed strategies in terms of the achievable rates in different practical scenarios.