• Title/Summary/Keyword: Information Security Learning

Search Result 1,001, Processing Time 0.026 seconds

A Unicode based Deep Handwritten Character Recognition model for Telugu to English Language Translation

  • BV Subba Rao;J. Nageswara Rao;Bandi Vamsi;Venkata Nagaraju Thatha;Katta Subba Rao
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.101-112
    • /
    • 2024
  • Telugu language is considered as fourth most used language in India especially in the regions of Andhra Pradesh, Telangana, Karnataka etc. In international recognized countries also, Telugu is widely growing spoken language. This language comprises of different dependent and independent vowels, consonants and digits. In this aspect, the enhancement of Telugu Handwritten Character Recognition (HCR) has not been propagated. HCR is a neural network technique of converting a documented image to edited text one which can be used for many other applications. This reduces time and effort without starting over from the beginning every time. In this work, a Unicode based Handwritten Character Recognition(U-HCR) is developed for translating the handwritten Telugu characters into English language. With the use of Centre of Gravity (CG) in our model we can easily divide a compound character into individual character with the help of Unicode values. For training this model, we have used both online and offline Telugu character datasets. To extract the features in the scanned image we used convolutional neural network along with Machine Learning classifiers like Random Forest and Support Vector Machine. Stochastic Gradient Descent (SGD), Root Mean Square Propagation (RMS-P) and Adaptative Moment Estimation (ADAM)optimizers are used in this work to enhance the performance of U-HCR and to reduce the loss function value. This loss value reduction can be possible with optimizers by using CNN. In both online and offline datasets, proposed model showed promising results by maintaining the accuracies with 90.28% for SGD, 96.97% for RMS-P and 93.57% for ADAM respectively.

Reverse-Update Adversarial Data for Enhancing Adversarial Attack and Adversarial Training Performance (적대적 공격 및 방어 기술의 성능 향상을 위한 역방향 적대적 데이터 생성 연구)

  • Jung Yup Rhee;Wonyoung Cho;Leo Hyun Park;Taekyoung Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.981-991
    • /
    • 2024
  • Adversarial attacks, which induce malfunctions in AI technologies, can be applied to various domains and models, easily compromising SOTA (State-of-the-Art) models. Although adversarial defense techniques have been developed to counter these attacks, their applicability is limited due to constraints. Consequently, not only is the adoption of AI technology delayed, but also advanced research is restricted. To address this issue, this paper introduces a novel concept of adversarial data by reversing the sign of the loss function update in adversarial attacks. Experiments were conducted by applying the reverse-update adversarial data to data poisoning and adversarial training environments, showing that it can reduce the model's performance up to 72% and is most effective in enhancing robustness in 6 out of 9 environments. Ultimately, the proposed data can stimulate extensive research on adversarial attacks and defenses, further promoting the advancement of defense technology and contributing to the safe adoption of AI.

European Experience in Implementing Innovative Educational Technologies in the Field of Culture and the Arts: Current Problems and Vectors of Development

  • Kdyrova, I.O.;Grynyshyna, M.O.;Yur, M.V.;Osadcha, O.A.;Varyvonchyk, A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.39-48
    • /
    • 2022
  • The main purpose of the work is to analyze modern innovative educational practices in the field of culture and art and their effectiveness in the context of the spread of digitalization trends. The study used general scientific theoretical methods of analysis, synthesis, analogy, comparative, induction, deduction, reductionism, and a number of others, allowing you to fully understand the pattern of modern modernization processes in a long historical development and demonstrate how the rejection of the negativity of progress allows talented artists to realize their own potential. The study established the advantages and disadvantages of involving innovative technologies in the educational process on the example of European experience and outlined possible ways of implementing digitalization processes in Ukrainian institutions of higher education, formulated the main difficulties encountered by teachers and students in the use of technological innovation in the pandemic. The rapid development of digital technologies has had a great impact on the sphere of culture and art, both visual, scenic, and musical in all processes: creation, reproduction, perception, learning, etc. In the field of art education, there is a synthesis of creative practices with digital technologies. In terms of music education, these processes at the present stage are provided with digital tools of specially developed software (music programs for composition and typing of musical text, recording, and correction of sound, for quality listening to the whole work or its fragments) for training programs used in institutional education and non-institutional learning as a means of independent mastering of the theory and practice of music-making, as well as other programs and technical tools without which contemporary art cannot be imagined. In modern stage education, the involvement of video technologies, means of remote communication, allowing realtime adjustment of the educational process, is actualized. In the sphere of fine arts, there is a transformation of communicative forms of interaction between the teacher and students, which in the conditions of the pandemic are of two-way communication with the help of information and communication technologies. At this stage, there is an intensification of transformation processes in the educational industry in the areas of culture and art.

The Role of Innovative Activities in Training Students Using Computer Technologies

  • Minenok, Antonina;Donets, Ihor;Telychko, Tetiana;Hud, Hanna;Smoliak, Pavlo;Kurchatova, Angelika;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.105-112
    • /
    • 2022
  • Innovation is considered as an implemented innovation in education - in the content, methods, techniques and forms of educational activity and personality education (methods, technologies), in the content and forms of organizing the management of the educational system, as well as in the organizational structure of educational institutions, in the means of training and education and in approaches to social services in education, distance and multimedia learning, which significantly increases the quality, efficiency and effectiveness of the educational process. The classification of currently known pedagogical technologies that are most often used in practice is shown. The basis of the innovative activity of a modern teacher is the formation of an innovative program-methodical complex in the discipline. Along with programmatic and content provision of disciplines, the use of informational tools and their didactic properties comes first. It combines technical capabilities - computer and video technology with live communication between the lecturer and the audience. In pedagogical innovation, the principles reflecting specific laws and regularities of the implementation of innovative processes are singled out. All principles are elements of a complex system of organization and management of innovative activities in the field of education and training. They closely interact with each other, which enhances the effect of each of them due to the synergistic effect. To improve innovative activities in the training of students, today computer technologies are widely used in pedagogy as a science, as well as directly in the practice of the pedagogical process. They have gained the most popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, searching for information on the network for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a unified scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The article considers computer technologies as the main building material for the entire society. In the modern world, there is a need to prepare a person for life in a multimedia environment. This process should be started as early as possible, because the child's contact with the media is present almost from the moment of his birth.

Machine Learning Based Automated Source, Sink Categorization for Hybrid Approach of Privacy Leak Detection (머신러닝 기반의 자동화된 소스 싱크 분류 및 하이브리드 분석을 통한 개인정보 유출 탐지 방법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.657-667
    • /
    • 2020
  • The Android framework allows apps to take full advantage of personal information through granting single permission, and does not determine whether the data being leaked is actual personal information. To solve these problems, we propose a tool with static/dynamic analysis. The tool analyzes the Source and Sink used by the target app, to provide users with information on what personal information it used. To achieve this, we extracted the Source and Sink through Control Flow Graph and make sure that it leaks the user's privacy when there is a Source-to-Sink flow. We also used the sensitive permission information provided by Google to obtain information from the sensitive API corresponding to Source and Sink. Finally, our dynamic analysis tool runs the app and hooks information from each sensitive API. In the hooked data, we got information about whether user's personal information is leaked through this app, and delivered to user. In this process, an automated Source/Sink classification model was applied to collect latest Source/Sink information, and the we categorized latest release version of Android(9.0) with 88.5% accuracy. We evaluated our tool on 2,802 APKs, and found 850 APKs that leak personal information.

Information Technologies as an Incentive to Develop the Creative Potential of the Educational Process

  • Natalia, Vdovychenko;Volodymyr, Kukorenchuk;Alina, Ponomarenko;Mykola, Honcharenko;Eduard, Stranadko
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.408-416
    • /
    • 2022
  • The new millennium is characterized by an unprecedented breakthrough in knowledge and information and communication technologies, and the challenges of the XXI century require modernized paradigms of interaction in all spheres of life. Education continues to play a key role in national and global growth. The key role of education and its leadership in developing creative potential, as the main paradigm of the countries' stability, have significantly influenced educational centers. The developers of educational programs use information technologies as an incentive to develop creative potential of educational process. Professional training of the educational candidate is enhanced by the use of information technologies, so the educational applicants should develop technological skills to be productive members of society. Using the latest achievements in the field of information technologies for the organization of the educational process helps to form the operational style of education applicants' thinking, which provides the ability to acquire skills of processing information, that is presented in the text, graphic, tabular form, and increase the level of general and informational culture necessary for better orientation in the modern information space. The purpose of the research is to determine the effectiveness of information technologies as an incentive to develop creative potential of educational process on the basis of the survey, to establish advantages and ability to provide high-quality education in the context of using information technologies. Methods of research: comparative analysis; systematization; generalization, survey. Results. Based on the survey conducted among students and teachers, it has been found out that the teachers use the following information technologies for the development of creative potential of the educational process: to provide video and audio communication process (100%), Moodle (95,6%), Duolingo (89,7%), LinguaLeo (89%), Google Forms (88%) and Adobe Captivate Prime (80,6%). It is determined that modular digital learning environments (97,9%), interactive exercises tools (96,3%), ICT for video and audio communication (96%) and interactive exercises tools (95,1%) are most conducive to the development of creative potential of the educational process. As a result of the research, it was revealed that implementation of information technologies for the development of creative potential of educational process in educational institutions is a complex process due to a large number of variables, which should be taken into account both on the educational course and on the individual level. It has been determined that the using the model of implementation information technologies for the development of creative potential in educational process, which is stimulated due to this model, benefits both students and teachers by establishing a reliable bilateral connection between teacher and education applicant.

The Usage of Modern Information Technologies for Conducting Effective Monitoring of Quality in Higher Education

  • Oseredchuk, Olga;Nikolenko, Lyudmyla;Dolynnyi, Serhii;Ordatii, Nataliia;Sytnik, Tetiana;Stratan-Artyshkova, Tatiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.113-120
    • /
    • 2022
  • Information technologies in higher education are the basis for solving the tasks set by monitoring the quality of higher education. The directions of aplying information technologies which are used the most nowadays have been listed. The issues that should be addressed by monitoring the quality of higher education with the use of information technology have been listed. The functional basis for building a monitoring system is the cyclical stages: Observation; Orientation; Decision; Action. The monitoring system's considered cyclicity ensures that the concept of independent functioning of the monitoring system's subsystems is implemented.. It also ensures real-time task execution and information availability for all levels of the system's hierarchy of vertical and horizontal links, with the ability to restrict access. The educational branch uses information and computer technologies to monitor research results, which are realized in: scientific, reference, and educational output; electronic resources; state standards of education; analytical materials; materials for state reports; expert inferences on current issues of education and science; normative legal documents; state and sectoral programs; conference recommendations; informational, bibliographic, abstract, review publications; digests. The quality of Ukrainian scientists' scientific work is measured using a variety of bibliographic markers. The most common is the citation index. In order to carry out high-quality systematization of information and computer monitoring technologies, the classification has been carried out on the basis of certain features: (processual support for implementation by publishing, distributing and using the results of research work). The advantages and disadvantages of using web-based resources and services as information technology tools have been discussed. A set of indicators disclosed in the article evaluates the effectiveness of any means or method of observation and control over the object of monitoring. The use of information technology for monitoring and evaluating higher education is feasible and widespread in Ukrainian education, and it encourages the adoption of e-learning. The functional elements that stand out in the information-analytical monitoring system have been disclosed.

A Key Management Technique Based on Topographic Information Considering IoT Information Errors in Cloud Environment (클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법)

  • Jeong, Yoon-Su;Choi, Jeong-hee
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.233-238
    • /
    • 2020
  • In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning.

Detection of Traffic Anomalities using Mining : An Empirical Approach (마이닝을 이용한 이상트래픽 탐지: 사례 분석을 통한 접근)

  • Kim Jung-Hyun;Ahn Soo-Han;Won You-Jip;Lee Jong-Moon;Lee Eun-Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.201-217
    • /
    • 2006
  • In this paper, we collected the physical traces from high speed Internet backbone traffic and analyze the various characteristics of the underlying packet traces. Particularly, our work is focused on analyzing the characteristics of an anomalous traffic. It is found that in our data, the anomalous traffic is caused by UDP session traffic and we determined that it was one of the Denial of Service attacks. In this work, we adopted the unsupervised machine learning algorithm to classify the network flows. We apply the k-means clustering algorithm to train the learner. Via the Cramer-Yon-Misses test, we confirmed that the proposed classification method which is able to detect anomalous traffic within 1 second can accurately predict the class of a flow and can be effectively used in determining the anomalous flows.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.