• Title/Summary/Keyword: Physical security

Search Result 1,047, Processing Time 0.033 seconds

Digital Marketing Tools for Managing the Development of Park and Recreation Complexes

  • Chaikovska, Maryna;Mashika, Hanna;Mankovska, Ruslana;Liulchak, Zoreslava;Haida, Pavlo;Diakova, Yana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.154-162
    • /
    • 2022
  • Digital marketing tools are actively used in managing the development of park and recreation complexes to familiarize the population with the objects of natural heritage. This article aims to empirically evaluate digital marketing tools for popularizing the park and recreational complexes. The methodology was based on the concept of ecosystem value of park and recreation complexes as a natural heritage site. These methods included: identifying and selecting websites with information about park and recreation complexes in Slovakia and Ukraine. structural analysis of the main channels of online details about natural parks. Assessing the current state of online identity of the studied sites from the perspective of Internet users. The results indicate that to manage the development of park and recreational complexes developed their driven official websites in the Internet space, on which sections structure the information with the allocation of data on tourism and recreational potential. The article identifies additional digital marketing tools for managing the development of park and recreation complexes, particularly social networks and tourist websites. There is a sufficient amount of information about tourist recreation sites within these natural parks and tourist routes. Among the main problems of the websites: the information on the websites is entirely textual, there is a lack of sufficient data on social networks, despite the created official pages, there is no video content, which was more attracted tourists and visitors, allowing a visual assessment of the tourist potential; there is a problem of many communication channels to present the natural heritage of the countries. The research proves that the website is the primary and most common digital marketing tool for natural heritage, structuring information about tourism potential and recreation.

The Importance of Multimedia for Professional Training of Future Specialists

  • Plakhotnik, Oleh;Strazhnikova, Inna;Yehorova, Inha;Semchuk, Svitlana;Tymchenko, Alla;Logvinova, Yaroslava;Kuchai, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.43-50
    • /
    • 2022
  • For high-quality education of the modern generation of students, forms of organizing the educational process and the latest methods of obtaining knowledge that differ from traditional ones are necessary. The importance of multimedia teaching tools is shown, which are promising and highly effective tools that allow the teacher not only to present an array of information in a larger volume than traditional sources of information, but also to include text, graphs, diagrams, sound, animation, video, etc. in a visually integrated form. Approaches to the classification of multimedia learning tools are revealed. Special features, advantages of multimedia, expediency of use and their disadvantages are highlighted. A comprehensive analysis of the capabilities of multimedia teaching tools gave grounds for identifying the didactic functions that they perform. Several areas of multimedia application are described. Multimedia technologies make it possible to implement several basic methods of pedagogical activity, which are traditionally divided into active and passive principles of student interaction with the computer, which are revealed in the article. Important conditions for the implementation of multimedia technologies in the educational process are indicated. The feasibility of using multimedia in education is illustrated by examples. Of particular importance in education are game forms of learning, in the implementation of which educational elements based on media material play an important role. The influence of the game on the development of attention by means of works of media culture, which are very diverse in form and character, is shown. The importance of the role of multimedia in student education is indicated. In the educational process of multimedia students, a number of educational functions are implemented, which are presented in the article. Recommendations for using multimedia are given.

Digitalization and Diversification of Modern Educational Space (Ukrainian case)

  • Oksana, Bohomaz;Inna, Koreneva;Valentyn, Lihus;Yanina, Kambalova;Shevchuk, Victoria;Hanna, Tolchieva
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.11-18
    • /
    • 2022
  • Linking Ukraine's education system with the trends of global digitalization is mandatory to ensure the sustainable, long-term development of the country, as well as to increase the sustainability of the education system and the economy as a whole during the crisis period. Now the main problems of the education system in Ukraine are manifested in a complex context caused by Russian armed aggression. In the context of war, problems include differences in adaptation to online learning among educational institutions, limited access to education for vulnerable groups in the zone of active hostilities, the lack of digital educational resources suitable for online learning, and the lack of basic digital skills and competencies among students and teachers necessary to properly conduct online classes. Some of the problems of online learning were solved in the pandemic, but in the context of war Ukrainian society needs a new vision of education and continuous efforts of all social structures in the public and private environment. In the context of war, concerted action is needed to keep education on track and restore it in active zones, adapting to the needs of a dynamic society and an increasingly digitized economy. Among the urgent needs of the education system are a change in the teaching-learning paradigm, which is based on content presentation, memorization, and reproduction, and the adoption of a new, hybrid educational model that will encourage the development of necessary skills and abilities for students and learners in a digitized society and enable citizens close to war zones to learn.

A Key Redistribution Method for Enhancing Energy Efficiency in Dynamic Filtering based Sensor Networks (동적 여과 기법 기반 센서 네트워크의 에너지 효율을 높이기 위한 키 재분배 결정 방법)

  • Sun, Chung-Il;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.125-131
    • /
    • 2010
  • In wireless sensor networks application, sensor nodes are randomly deployed in wide and opened environment typically. Since sensor networks have these features, it is vulnerable to physical attacks in which an adversary can capture deployed nodes and use them to inject a fabricated report into the network. This threats of network security deplete the limited energy resource of the entire network using injected fabricated reports. A dynamic en-route filtering scheme is proposed to detect and drop the injected fabricated report. In this scheme, node executes the key redistribution to increases the detection power. It is very important to decide the authentication key redistribution because a frequent key redistribution can cause the much energy consumption of nodes. In this paper, we propose a key redistribution determining method to enhance the energy efficiency and maintain the detection power of network. Each node decides the authentication key redistribution using a fuzzy system in a definite period. The proposed method can provide early detection of fabricated reports, which results in energy-efficiency against the massive fabricated report injection attacks.

Comparative Study of US-China Discourse on Cross-border Data Regulation and Cybersecurity: Focusing on ASEAN Development Assistance Cases (미·중 초국경 데이터 규제와 사이버안보 담론 비교: 아세안 개발원조 사례를 중심으로)

  • Kayeon Lee
    • Informatization Policy
    • /
    • v.30 no.1
    • /
    • pp.89-108
    • /
    • 2023
  • Science, technology and innovation (STI) has expanded the activity of actors from the traditional physical territory to the cyberspace. Data-driven platform services and markets advance new discussions on cross-border cooperation and cyber security, as well as discourse on sovereignty in cyberspace. These changes are also affecting the hegemony competition between the US and China. In particular, competition for aid to developing countries that are located along major resource transportation routes, such as natural gas and deep sea resources, is fierce. ASEAN is not only a geopolitical military and security point where the US and China powers collide, but its population of 600 million has great potential for the development of the digital economy due to its data resources. In this regard, this article aims to connect the discourse of liberalism and authoritarianism with data regulation and cybersecurity in international development cooperation, and derive implications for ASEAN integration through this. This study has significance as a convergence study that links international political issues related to big data in terms of global governance.

Volume Control using Gesture Recognition System

  • Shreyansh Gupta;Samyak Barnwal
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.161-170
    • /
    • 2024
  • With the technological advances, the humans have made so much progress in the ease of living and now incorporating the use of sight, motion, sound, speech etc. for various application and software controls. In this paper, we have explored the project in which gestures plays a very significant role in the project. The topic of gesture control which has been researched a lot and is just getting evolved every day. We see the usage of computer vision in this project. The main objective that we achieved in this project is controlling the computer settings with hand gestures using computer vision. In this project we are creating a module which acts a volume controlling program in which we use hand gestures to control the computer system volume. We have included the use of OpenCV. This module is used in the implementation of hand gestures in computer controls. The module in execution uses the web camera of the computer to record the images or videos and then processes them to find the needed information and then based on the input, performs the action on the volume settings if that computer. The program has the functionality of increasing and decreasing the volume of the computer. The setup needed for the program execution is a web camera to record the input images and videos which will be given by the user. The program will perform gesture recognition with the help of OpenCV and python and its libraries and them it will recognize or identify the specified human gestures and use them to perform or carry out the changes in the device setting. The objective is to adjust the volume of a computer device without the need for physical interaction using a mouse or keyboard. OpenCV, a widely utilized tool for image processing and computer vision applications in this domain, enjoys extensive popularity. The OpenCV community consists of over 47,000 individuals, and as of a survey conducted in 2020, the estimated number of downloads exceeds 18 million.

Efficient Sign Language Recognition and Classification Using African Buffalo Optimization Using Support Vector Machine System

  • Karthikeyan M. P.;Vu Cao Lam;Dac-Nhuong Le
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.8-16
    • /
    • 2024
  • Communication with the deaf has always been crucial. Deaf and hard-of-hearing persons can now express their thoughts and opinions to teachers through sign language, which has become a universal language and a very effective tool. This helps to improve their education. This facilitates and simplifies the referral procedure between them and the teachers. There are various bodily movements used in sign language, including those of arms, legs, and face. Pure expressiveness, proximity, and shared interests are examples of nonverbal physical communication that is distinct from gestures that convey a particular message. The meanings of gestures vary depending on your social or cultural background and are quite unique. Sign language prediction recognition is a highly popular and Research is ongoing in this area, and the SVM has shown value. Research in a number of fields where SVMs struggle has encouraged the development of numerous applications, such as SVM for enormous data sets, SVM for multi-classification, and SVM for unbalanced data sets.Without a precise diagnosis of the signs, right control measures cannot be applied when they are needed. One of the methods that is frequently utilized for the identification and categorization of sign languages is image processing. African Buffalo Optimization using Support Vector Machine (ABO+SVM) classification technology is used in this work to help identify and categorize peoples' sign languages. Segmentation by K-means clustering is used to first identify the sign region, after which color and texture features are extracted. The accuracy, sensitivity, Precision, specificity, and F1-score of the proposed system African Buffalo Optimization using Support Vector Machine (ABOSVM) are validated against the existing classifiers SVM, CNN, and PSO+ANN.

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar;Deborah U. Ebem;Francis S. Bakpo;Modesta Ezema
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.207-215
    • /
    • 2024
  • Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.

Practices for Readiness of Future Specialists for Professional Self-Determination in the Information Society

  • Olena Kochubei;Mykola Dubinka;Inna Knysh;Ihor Poliakov;Olga Tsokur;Vasyl Tiahur;Oleksandr Kuchai
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.129-136
    • /
    • 2023
  • Professional self-determination of the individual is a complex and lengthy process of finding and realizing yourself in the profession. The main goal of professional self-determination is clarified. The basic concepts of readiness for professional self-determination of future specialists in the modern information society are revealed. The following approaches to the consideration of the concept of readiness are defined: functional-psychological, personal, activity-based. Based on the components of readiness identified by the researchers, it can be assumed that the structure of professional self-determination of the future specialist contains motivational, cognitive and activity components. Self-determination is defined as a multidimensional process that can be considered from different points of view: as a series of tasks, that society sets for the emerging individual, and which the individual must solve in a certain period. As a process of step-by-step decision-making, with the help of which the individual forms a balance between his desires and inclinations, on the one hand, and the needs of society, on the other; as a process of forming an individual lifestyle, part of which is professional activity. A number of tasks of professional self-determination of a future specialist in the information society are formulated. Diagnostic practices for determining the degree of readiness of future specialists for future professional success are characterized. Practices are developed as a basis for creating an individually oriented correctional and development program to promote the formation of future specialists' focus on future professional success. Their task is to ensure control over the dynamics of this process, assess the effectiveness of this career guidance work. Practices are aimed at identifying the degree of thorough knowledge of the conditions for achieving professional success in the chosen field of activity among future specialists.