• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.028 seconds

A RST Resistant Logo Embedding Technique Using Block DCT and Image Normalization (블록 DCT와 영상 정규화를 이용한 회전, 크기, 이동 변환에 견디는 강인한 로고 삽입방법)

  • Choi Yoon-Hee;Choi Tae-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.93-103
    • /
    • 2005
  • In this paper, we propose a RST resistant robust logo embedding technique for multimedia copyright protection Geometric manipulations are challenging attacks in that they do not introduce the quality degradation very much but make the detection process very complex and difficult. Watermark embedding in the normalized image directly suffers from smoothing effect due to the interpolation during the image normalization. This can be avoided by estimating the transform parameters using an image normalization technique, instead of embedding in the normalized image. Conventional RST resistant schemes that use full frame transform suffer from the absence of effective perceptual masking methods. Thus, we adopt $8\times8$ block DCT and calculate masking using a spatio-frequency localization of the $8\times8$ block DCT coefficients. Simulation results show that the proposed algorithm is robust against various signal processing techniques, compression and geometrical manipulations.

A Survey on 5G Enabled Multi-Access Edge Computing for Smart Cities: Issues and Future Prospects

  • Tufail, Ali;Namoun, Abdallah;Alrehaili, Ahmed;Ali, Arshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.107-118
    • /
    • 2021
  • The deployment of 5G is in full swing, with a significant yearly growth in the data traffic expected to reach 26% by the year and data consumption to reach 122 EB per month by 2022 [10]. In parallel, the idea of smart cities has been implemented by various governments and private organizations. One of the main objectives of 5G deployment is to help develop and realize smart cities. 5G can support the enhanced data delivery requirements and the mass connection requirements of a smart city environment. However, for specific high-demanding applications like tactile Internet, transportation, and augmented reality, the cloud-based 5G infrastructure cannot deliver the required quality of services. We suggest using multi-access edge computing (MEC) technology for smart cities' environments to provide the necessary support. In cloud computing, the dependency on a central server for computation and storage adds extra cost in terms of higher latency. We present a few scenarios to demonstrate how the MEC, with its distributed architecture and closer proximity to the end nodes can significantly improve the quality of services by reducing the latency. This paper has surveyed the existing work in MEC for 5G and highlights various challenges and opportunities. Moreover, we propose a unique framework based on the use of MEC for 5G in a smart city environment. This framework works at multiple levels, where each level has its own defined functionalities. The proposed framework uses the MEC and introduces edge-sub levels to keep the computing infrastructure much closer to the end nodes.

Acceptance and Effectiveness of Distance Learning in Public Education in Saudi Arabia During Covid19 Pandemic: Perspectives from Students, Teachers and Parents

  • Alkinani, Edrees A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.54-65
    • /
    • 2021
  • The movement control order and shutting down educational institution in Saudi Arabia has jeopardized the teaching and learning process. Education was shifted to distance learning in order to avoid any academic loss. In the middle of the Covid-19 crisis, there is a need to assess the full image of e-learning in Saudi Arabia. To investigate student and teachers' perception and acceptance, parents' attitudes and believes about distance education are the main goals of the study. The mix-method research design was employed to collect data. Three surveys were distributed to 100 students and 50 teachers and 50 parents from different educational institutions in Saudi Arabia, while semi-structured interviews were conducted with 10 parents. Random stratified and convenient sampling methods were adopted. Both descriptive and content analysis was conducted using SPSS25.0 and NVIVO software for quantitative and qualitative data accordingly. The findings showed that students are comfortable with remote education and are receiving enough support from schools and instructors but they think online education can't replace conventional face-to-face learning. Moreover, the results showed that teachers are having challenges in preparing online classes because of the development of conducting online classes and the lack of training. However, parents showed negative attitudes regarding the benefits and values of remote education and preferred conventional learning styles in elementary schools. Parents tended to reject and resist distance learning for several reasons: professional knowledge and lack of time to support their young kids in online classes, the shortcomings of e-learning, young children's inadequate self-regulation. Saudi parents are neither trained nor ready to use e-learning. The study provided suggestion and implications for teacher education and policymakers.

A Review on Advanced Methodologies to Identify the Breast Cancer Classification using the Deep Learning Techniques

  • Bandaru, Satish Babu;Babu, G. Rama Mohan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.420-426
    • /
    • 2022
  • Breast cancer is among the cancers that may be healed as the disease diagnosed at early times before it is distributed through all the areas of the body. The Automatic Analysis of Diagnostic Tests (AAT) is an automated assistance for physicians that can deliver reliable findings to analyze the critically endangered diseases. Deep learning, a family of machine learning methods, has grown at an astonishing pace in recent years. It is used to search and render diagnoses in fields from banking to medicine to machine learning. We attempt to create a deep learning algorithm that can reliably diagnose the breast cancer in the mammogram. We want the algorithm to identify it as cancer, or this image is not cancer, allowing use of a full testing dataset of either strong clinical annotations in training data or the cancer status only, in which a few images of either cancers or noncancer were annotated. Even with this technique, the photographs would be annotated with the condition; an optional portion of the annotated image will then act as the mark. The final stage of the suggested system doesn't need any based labels to be accessible during model training. Furthermore, the results of the review process suggest that deep learning approaches have surpassed the extent of the level of state-of-of-the-the-the-art in tumor identification, feature extraction, and classification. in these three ways, the paper explains why learning algorithms were applied: train the network from scratch, transplanting certain deep learning concepts and constraints into a network, and (another way) reducing the amount of parameters in the trained nets, are two functions that help expand the scope of the networks. Researchers in economically developing countries have applied deep learning imaging devices to cancer detection; on the other hand, cancer chances have gone through the roof in Africa. Convolutional Neural Network (CNN) is a sort of deep learning that can aid you with a variety of other activities, such as speech recognition, image recognition, and classification. To accomplish this goal in this article, we will use CNN to categorize and identify breast cancer photographs from the available databases from the US Centers for Disease Control and Prevention.

Study on Digitalisation of the Tourism Industry in the Regions of the Russian Federation

  • Ivanova, Raisa;Skrobotova, Olga;Polyakova, Irina;Karaseva, Galina;Strelnikova, Marina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.385-391
    • /
    • 2022
  • The relevance of the published study lies in the fact that since the introduction of the first Global Distribution System, new information and communication technologies have constantly been changing the tourism industry. In the context of a current digital environment, travel agencies can't avoid participating in digital transformation processes aimed at rethinking operational models, skills, and organisational structures in the regions. This publication aims to present and provide a critical overview of digitalisation processes in tourism development in the regions of the Russian Federation, as well as to reflect on the challenges to the widespread digitalisation processes in the regional tourism sector. The subject of research is digitalisation processes, as they radically transform the modern tourism industry, in the regions as well. The pragmatic research paradigm was considered the most appropriate for the study of tourism digitalisation processes in the regions, as it does not require the selection of a specific theoretical basis for data collection. The pragmatic approach forms an alternative to classical theoretical approaches and serves as a particular type of grounded theory, combining both inductive and deductive methods. No software was used for the inductive part of the analysis. The deductive part was conducted using the qualitative data analysis software Nvivo 11. Given the wide diversity of interested parties in the regional tourism digital area, a stratified purposive sampling method was preferred due to its ability to adequately represent the full picture of the phenomenon under study. The selection and stratum criteria were chosen to maximise the representation of different perspectives in the regional tourism digital area. The novelty of the study is due to the digitalisation processes, with an implication of new needs, while opening up promising opportunities for more productive tourism business in the regions of the Russian Federation. Currently, e-tourism in the Russian Federation has become a subject of lively debate among scholars and practitioners. However, the involvement of advanced digitalisation technologies in the field of information processes in the regions of the Russian Federation is of a very sporadic character.

Transformation of Legal Personality in the Context of the Development of Modern Digital Technologies

  • Amelin, Roman;Channov, Sergey;Dobrobaba, Marina;Kalinina, Larisa;Kholodnaya, Elena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.294-302
    • /
    • 2022
  • The article explores the prospects and trends for the transformation of some basic concepts of law associated with the development of artificial intelligence systems and the problems of liability for harm caused by a robot. The prospects, conditions and consequences of vesting robots with partial (quasi) or full legal personality are explored. This process should lead to a revision of the concepts of will, subjective side and legal responsibility in the direction of their greater universalization. The legally significant signs of will, legal personality, legal liability in relation to robots, artificial intelligence systems and other complex automated information systems are clarified. The author identifies the following essential factors of legal qualification of an act committed by a robot: goals, reasons for setting goals, connections between the planned result and the action taken, the actual result, the reasons for the difference between the actual result and the planned one. The article pays special attention to the preventive function of legal liability, which, when applied to robot subjects, can be expressed in the following basic procedures. 1. Accounting for legal requirements in the behavior of the robot. 2. Timely adaptation of the robot to changes in legislation and other regulatory legal acts that affect its behavior. 3. Accounting for incidents. 4. Destruction of a series of robots whose actions lead to unacceptable consequences.

Digital Marketing in the Condition of Wartime Posture in Ukraine

  • Dubovyk, Tetiana;Buchatska, Iryna;Diachuk, Iryna;Zerkal, Anastasiia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.206-212
    • /
    • 2022
  • Strengthening global geopolitical instability in the world leads to an aggravation of international conflicts; it destabilizes the domestic political situation in countries, violates the rights and freedoms of man and citizen, and also activates economic crime. The full-scale invasion of the Russian Federation on the territory of Ukraine and the deployment of military operations in a large territory of a sovereign country have created a number of destabilizing factors in the development of digital technologies and negatively affect the state and trends of digital marketing, which allows establishing interaction with a wide audience and facilitating the search for new customers in various places. The purpose of the research lies in substantiating the theoretical and applied principles for studying the features of digital marketing in the conditions of wartime posture in Ukraine. In the course of the research, general and special methods of economic analysis have been used and applied, namely: analysis and synthesis; analogies and comparisons; generalization and systematization; graphic and tabular methods. Regarding the results of the research of digital marketing in the conditions of wartime posture in Ukraine, it has been established that the intensification of the development of digital marketing is caused by the crisis phenomena of social-economic, social-political and military nature, as well as exacerbated by the challenges of the COVID-19 pandemic. It has been proven that highly developed countries use innovative digital technologies more effectively in the field of marketing, which indicates the importance of the Multidimensional Index of Digitization (the USA - MID: 0,92-0,92; the UK - MID: 0,80-0,97; Japan - MID: 0,80-0,88; Canada - MID: 0,78-0,81; Germany - MID: 0,78-0,88; France - MID: 0,72-0,76), however, the developing countries record much lower values (Ukraine - MID: 0,22-0,48). Accordingly, the level of cybersecurity in highly developed countries is also significantly higher than in transitive countries, in particular, in the United States (GCI: 0,919-0,999); Great Britain (GCI: 0,783-0,995); Canada (GCI: 0,818-0,978) and in Ukraine (GCI: 0,501-0,661).

Specifics of Speech Development of Children with Cerebral Palsy

  • Zavitrenko, Dolores;Rizhniak, Renat;Snisarenko, Iryna;Pasichnyk, Natalia;Babenko, Tetyana;Berezenko, Natalia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.157-162
    • /
    • 2022
  • Cerebral palsy is one of the most serious forms of disorders of the psychophysical development of children, which manifests itself in disturbances of motor functions, which are often combined with speech disorders, other complications of the formation of higher mental functions, and often with a decrease in intelligence. The article will discuss the speech disorder in children with cerebral palsy. Emphasis is placed on some important aspects, which should bear in mind, investigating the problem of specifics of speech development of children with cerebral palsy. In particular at the heart of speech disorders in the cerebral palsy is not only damage to certain structures of the brain, but also the later formation or underdevelopment of those parts of the cerebral cortex, which are of major importance in linguistic and mental activity. This is an ontogenetically young region of the cerebral cortex, which is most rapidly developing after birth (premotor, frontal, temmono-temporal). It is important to take into account, that children with cerebral palsy have disturbances of phonemic perception. Often, children do not distinguish between hearing sounds, cannot repeat component rows, allocate sounds in words. At dysarthria, there are violations of pronunciation of vowel and consonant sounds, tempo of speech, modulation of voice, breathing, phonation, as well as asynchronous breathing, alignment and articulation. As a result, we identified the main features and specifics of the speech development of children with cerebral palsy and described the conditions necessary for the full development of language. Language disturbances in children's cerebral palsy depend on the localization and severity of brain damage. Great importance in the mechanism of speech disorders has a pathology that limits the ability of movement and knowledge of the world.

A Study on Preferences and Utilities of Digital Signature Certificate Choice Factors Using Conjoint Analysis (컨조인트 분석을 이용한 인증서 선택요인 및 효용가치에 대한 연구)

  • Whanchul Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.117-128
    • /
    • 2023
  • Due to the full revision of the Digital Signature Act (enforcement on December 10, 2020), various certificates are being released and competing in the market. Under fierce competition, the certificate market share of large IT platform companies is increasing, and it is predicted that they will eventually monopolize the market. Therefore, identifying the consumer's certificate choice factors and understanding the difference in importance between the choice factors are essential elements for establishing a company's strategy for the certificate market and product positioning, and are key points in setting the government's certificate policy direction. In this study, consumers' certificate choice factors were extracted based on the details of preceding papers and surveys, and based on the extracted choice factors, 4 choice factors (reliability of issuer, program installation, certificate usage method(how to use), versatility(where to use)) were identified through a Delphi survey. As a result of conjoint analysis by conducting a consumer survey with selected choice factors, the reliability of the issuer was found to be the most important utility value. In order of importance, the certificate usage method(how to use), program installation, and versatility(where to use) appeared.

Towards Statistical Judgements of Occupational Stressor versus Performance Indication with Impact on Mental and Physical Health of Female College Teachers

  • Anjum Shaheen;Hussain Saleem;Abida Siddiqui;Samina Saleem;Uzma M. Panhwar;Jamshed Butt
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.73-78
    • /
    • 2024
  • The present world is full of challenges and opportunities for the women at work. Every woman works hard for academic growth and professional development. For the same reason they also face challenges every day such as stresses, tensions, problems and competitions. When these factors exceed above the strengths, the capabilities of a woman start drowning under stress. Stress is generally thought negative characteristic, but stress or tension maintained up to some level is necessary and effective towards work done at job. This paper covers the study relationship between job stressor and female teacher's performance. The study was carried out in Government Colleges of District Hyderabad, Pakistan. The teacher student relationship was selected as a stressor for female teachers. The study is descriptive in nature followed by method of correlation. A five point "Likert Scale" was developed to collect the data from the sample size of 158 college teachers drawn randomly and the collected data was assessed quantitatively. The relationship between the "teacher student" (as an indicator of job stress) and "female teachers' performance" was calculated by Pearson Correlation formula. The findings of the study show the significant correlations between the teacher student relationship and job stress in female teachers' performance where it is found that the stressor caused the poor Physical and Mental health of female teachers working in colleges.