• Title/Summary/Keyword: Multi-level security

Search Result 219, Processing Time 0.019 seconds

Perceived Risk in Online Purchase of Sporting Goods (스포츠용품 인터넷 구매의 위험지각에 관한 연구)

  • Min Dai-Hwan;Lee Seung-Yeop;Rim Seong-Taek
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.2
    • /
    • pp.127-143
    • /
    • 2006
  • As the number of Internet users increases, online shopping malls are gradually flourishing and sales are continuously growing. However, since consumers are not able to check what they purchase when buying products on the Internet, they are bound to have higher risk perception than buying directly from off-line stores. Especially, sporting goods require a special attention because a preliminary test is important. Therefore, the risk perception is much higher when people purchase sporting goods online. This study first identifies the multi-dimensionality of risk perception. Then, it investigates whether online purchasing experience of sporting goods makes differences in the level of risk perception. In addition, it examines whether the risk perception by those who had an experience in purchasing sporting goods online affects the customer satisfaction. This study has identified five dimensions in the concept of risk perception, such as financial risk, performance risk, security risk, delivery risk, and psychological/physical risk. A statistical analysis shows that people without an experience in purchasing sporting goods online have perceived significantly higher performance risk, security risk, and psychological/physical risk than those with online purchasing experiences. Finally, this study has found that delivery risk, financial risk, and psychological/physical risk have significant negative influences on the customer satisfaction.

  • PDF

Performance Evaluation of Various Normalization Methods and Score-level Fusion Algorithms for Multiple-Biometric System (다중 생체 인식 시스템을 위한 정규화함수와 결합알고리즘의 성능 평가)

  • Woo Na-Young;Kim Hak-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.115-127
    • /
    • 2006
  • The purpose of this paper is evaluation of various normalization methods and fusion algorithms in addition to pattern classification algorithms for multi-biometric systems. Experiments are performed using various normalization functions, fusion algorithms and pattern classification algorithms based on Biometric Scores Set-Releasel(BSSR1) provided by NIST. The performance results are presented by Half Total Error Rate (WTER). This study gives base data for the study on performance enhancement of multiple-biometric system by showing performance results using single database and metrics.

Obesity Level Prediction Based on Data Mining Techniques

  • Alqahtani, Asma;Albuainin, Fatima;Alrayes, Rana;Al muhanna, Noura;Alyahyan, Eyman;Aldahasi, Ezaz
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.103-111
    • /
    • 2021
  • Obesity affects individuals of all gender and ages worldwide; consequently, several studies have performed great works to define factors causing it. This study develops an effective method to trace obesity levels based on supervised data mining techniques such as Random Forest and Multi-Layer Perception (MLP), so as to tackle this universal epidemic. Notably, the dataset was from countries like Mexico, Peru, and Colombia in the 14- 61year age group, with varying eating habits and physical conditions. The data includes 2111 instances and 17 attributes labelled using NObesity, which facilitates categorization of data using Overweight Levels l I and II, Insufficient Weight, Normal Weight, as well as Obesity Type I to III. This study found that the highest accuracy was achieved by Random Forest algorithm in comparison to the MLP algorithm, with an overall classification rate of 96.7%.

Water Detection in an Open Environment: A Comprehensive Review

  • Muhammad Abdullah, Sandhu;Asjad, Amin;Muhammad Ali, Qureshi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2023
  • Open surface water body extraction is gaining popularity in recent years due to its versatile applications. Multiple techniques are used for water detection based on applications. Different applications of Radar as LADAR, Ground-penetrating, synthetic aperture, and sounding radars are used to detect water. Shortwave infrared, thermal, optical, and multi-spectral sensors are widely used to detect water bodies. A stereo camera is another way to detect water and different methods are applied to the images of stereo cameras such as deep learning, machine learning, polarization, color variations, and descriptors are used to segment water and no water areas. The Satellite is also used at a high level to get water imagery and the captured imagery is processed using various methods such as features extraction, thresholding, entropy-based, and machine learning to find water on the surface. In this paper, we have summarized all the available methods to detect water areas. The main focus of this survey is on water detection especially in small patches or in small areas. The second aim of this survey is to detect water hazards for unmanned vehicles and off-sure navigation.

A Survey on 5G Enabled Multi-Access Edge Computing for Smart Cities: Issues and Future Prospects

  • Tufail, Ali;Namoun, Abdallah;Alrehaili, Ahmed;Ali, Arshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.107-118
    • /
    • 2021
  • The deployment of 5G is in full swing, with a significant yearly growth in the data traffic expected to reach 26% by the year and data consumption to reach 122 EB per month by 2022 [10]. In parallel, the idea of smart cities has been implemented by various governments and private organizations. One of the main objectives of 5G deployment is to help develop and realize smart cities. 5G can support the enhanced data delivery requirements and the mass connection requirements of a smart city environment. However, for specific high-demanding applications like tactile Internet, transportation, and augmented reality, the cloud-based 5G infrastructure cannot deliver the required quality of services. We suggest using multi-access edge computing (MEC) technology for smart cities' environments to provide the necessary support. In cloud computing, the dependency on a central server for computation and storage adds extra cost in terms of higher latency. We present a few scenarios to demonstrate how the MEC, with its distributed architecture and closer proximity to the end nodes can significantly improve the quality of services by reducing the latency. This paper has surveyed the existing work in MEC for 5G and highlights various challenges and opportunities. Moreover, we propose a unique framework based on the use of MEC for 5G in a smart city environment. This framework works at multiple levels, where each level has its own defined functionalities. The proposed framework uses the MEC and introduces edge-sub levels to keep the computing infrastructure much closer to the end nodes.

Self-Encoded Spread Spectrum and Turbo Coding

  • Jang, Won-Mee;Nguyen, Lim;Hempel, Michael
    • Journal of Communications and Networks
    • /
    • v.6 no.1
    • /
    • pp.9-18
    • /
    • 2004
  • Self-encoded multiple access (SEMA) is a unique realization of random spread spectrum. As the term implies, the spreading code is obtained from the random digital information source instead of the traditional pseudo noise (PN) code generators. The time-varying random codes can provide additional security in wireless communications. Multi-rate transmissions or multi-level grade of services are also easily implementable in SEMA. In this paper, we analyze the performance of SEMA in additive white Gaussian noise (AWGN) channels and Rayleigh fading channels. Differential encoding eliminates the BER effect of error propagations due to receiver detection errors. The performance of SEMA approaches the random spread spectrum discussed in literature at high signal to noise ratios. For performance improvement, we employ multiuser detection and Turbo coding. We consider a downlink synchronous system such as base station to mobile communication though the analysis can be extended to uplink communications.

An Efficient Secure Routing Protocol Based on Token Escrow Tree for Wireless Ad Hoc Networks (무선 애드 혹 네트워크에서 보안성을 고려한 Token Escrow 트리 기반의 효율적인 라우팅 프로토콜)

  • Lee, Jae Sik;Kim, Sung Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.4
    • /
    • pp.155-162
    • /
    • 2013
  • Routing protocol in ad hoc mobile networking has been an active research area in recent years. However, the environments of ad hoc network tend to have vulnerable points from attacks, because ad hoc mobile network is a kind of wireless network without centralized authentication or fixed network infrastructure such as base stations. Also, existing routing protocols that are effective in a wired network become inapplicable in ad hoc mobile networks. To address these issues, several secure routing protocols have been proposed: SAODV and SRPTES. Even though our protocols are intensified security of networks than existing protocols, they can not deal fluidly with frequent changing of wireless environment. Moreover, demerits in energy efficiency are detected because they concentrated only safety routing. In this paper, we propose an energy efficient secure routing protocol for various ad hoc mobile environment. First of all, we provide that the nodes distribute security information to reliable nodes for secure routing. The nodes constitute tree-structured with around nodes for token escrow, this action will protect invasion of malicious node through hiding security information. Next, we propose multi-path routing based security level for protection from dropping attack of malicious node, then networks will prevent data from unexpected packet loss. As a result, this algorithm enhances packet delivery ratio in network environment which has some malicious nodes, and a life time of entire network is extended through consuming energy evenly.

The Effect of Female Employment and Prejudice against Women on Justification of Family Violence: A Multi-Level Analysis (여성취업률과 여성에 대한 편견이 가정폭력 정당화에 미치는 영향: 개인과 국가 수준의 위계선형 분석)

  • Jang, Cho-Rok;Hong, Myeong-Gi;Hwang, Eui-Gab
    • Korean Security Journal
    • /
    • no.52
    • /
    • pp.11-40
    • /
    • 2017
  • This study analyzed individual-level and country-level factors affecting justification of domestic violence amid emerging social significance of family violence. For individual-level variables, prejudice against women in economic and social roles were used from the World Value Survey data. As for country-level variables, total of 36 countries were analyzed with indices that represents gender equality such as women's employment rate and democracy index. Women's employment rate was gathered from the Labour Market Database of the World Bank and democracy index was from the Economist Intelligence Unit. Results showed that both individual-level, prejudice against women in economic and social roles and country-level variables such as women's employment rate and democracy index had significant effects on justification of domestic violence. This result implies the importance of creating positive social culture which promotes positive attitudes towards perceptions of gender role and gender equality. As well, country-level endeavors to raise gender equality in employment deem important. Based on these findings, policy implications and recommendations for future research were discussed.

  • PDF

A Study of Satisfaction with the children of multi-cultural family through Taekwondo program (태권도 교육 프로그램을 통한 다문화가정 자녀들의 만족도 연구)

  • An, Sang-Yun
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.535-543
    • /
    • 2017
  • This study aimed to improve the satisfaction of multi-cultural children by encouraging their participation in healthy exercises, and confirm the level of changes in their school life, the satisfaction with happiness. In order to achieve this purpose, dividing the participants in this program into an experimental group of 20 who participate in taekwondo training program and a comparison group of 20 who do not do sports activity, the study was conducted with a binary mixed design by three repeated measures by group. The conclusions made through these measures were as follows: According to the measurement time between the experimental group who participated in taekwondo training program and the comparison group who did not do sports activity, there were differences in changes in satisfaction of school life, leisure satisfaction, and satisfaction with happiness. Namely, the change in the experimental group was more than that of the comparison group. In conclusion, for multi-cultural children, it can be assessed that as the duration of participation in the taekwondo training program increases, the effect was clear, and it was found that satisfaction of school life, leisure satisfaction, and happiness satisfaction have changed statistically and significantly.

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

  • Mondal, Arindom;Alam, Kazi Md. Rokibul;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2698-2717
    • /
    • 2019
  • This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.