• Title/Summary/Keyword: Platform security

Search Result 821, Processing Time 0.026 seconds

New Trends and Strategies For the Integration of Information and Communication Technologies in Educational Activities

  • Vasіutina, Tеtіana;Cherednyk, Lidiia;Klymenko, Oksana;Sokur, Olena;Shevchuk, Anatolii;Zatserkivna, Maryna
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.169-172
    • /
    • 2021
  • The article discusses the results of a quantitative analysis of open educational resources in the field of information technology. Study is based on a study of the content of ten platforms that provide access to open resources (OPs). To achieve this goal, we used the following methods: theoretical analysis and generalization of Internet sources to determine the popularity of educational platforms and resources on them; quantitative data analysis to determine the relative proportion of IT courses in various parameters: the relative weight of courses in the IT field in general and on each platform in particular, the language of instruction, the quantitative content by thematic areas. The following platforms providing access to open educational resources were subjected to quantitative analysis: Coursera, Edx, Udemy, MIT OpenCourseWare, OpenLearn, Intuit, Prometheus, UoPeople, Open Learning Initiative, Maidan Open University.

실시간 지문식별을 위한 하드웨어 구현 (A Hardware Implementation for Real-Time Fingerprint Identification)

  • 김기철;김민;정용화;반성범
    • 정보보호학회논문지
    • /
    • 제14권6호
    • /
    • pp.79-89
    • /
    • 2004
  • 지문 식별은 데이터베이스에 사용자의 지문 정보를 저장하는 사용자 등록 과정과 입력된 사용자의 지문 정보에 대하여 유사한 후보자 목록을 작성하는 식별 과정으로 구성된다. 그러나 대규모 데이터베이스에 저장된 사용자 지문 정보를 전체적으로 순차 검색할 경우 오랜 수행 시간이 요구된다는 문제가 있다. 이러한 문제점을 해결하기 위하여 본 논문에서는 실시간으로 지문을 식별하기 위한 지문 식별 전용 하드웨어를 설계하였다. 설계된 지문 식별 전용 하드웨어는 PCI 보드에 대용량 FPGA와 SDRAM을 실장하여 지문 검색을 병렬로 처리한다. 설계된 하드웨어에 대한 성능평가 결과, 등록자 수 증가에 따른 높은 확장성을 보이며 지문 식별을 실시간에 처리할 수 있음을 확인하였다.

Intelligent Android Malware Detection Using Radial Basis Function Networks and Permission Features

  • Abdulrahman, Ammar;Hashem, Khalid;Adnan, Gaze;Ali, Waleed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.286-293
    • /
    • 2021
  • Recently, the quick development rate of apps in the Android platform has led to an accelerated increment in creating malware applications by cyber attackers. Numerous Android malware detection tools have utilized conventional signature-based approaches to detect malware apps. However, these conventional strategies can't identify the latest apps on whether applications are malware or not. Many new malware apps are periodically discovered but not all malware Apps can be accurately detected. Hence, there is a need to propose intelligent approaches that are able to detect the newly developed Android malware applications. In this study, Radial Basis Function (RBF) networks are trained using known Android applications and then used to detect the latest and new Android malware applications. Initially, the optimal permission features of Android apps are selected using Information Gain Ratio (IGR). Appropriately, the features selected by IGR are utilized to train the RBF networks in order to detect effectively the new Android malware apps. The empirical results showed that RBF achieved the best detection accuracy (97.20%) among other common machine learning techniques. Furthermore, RBF accomplished the best detection results in most of the other measures.

헬스케어 디바이스에서의 신뢰성 기반 메시지 전달 시스템 (Reliability-based Message Transmission System in Healthcare Devices)

  • 이영동
    • 융합신호처리학회논문지
    • /
    • 제21권3호
    • /
    • pp.142-147
    • /
    • 2020
  • 사물인터넷(IoT)은 개인, 공공, 산업 등 국가 사회 현안 해결의 수단으로 활용 가치가 있으며, 특히, 헬스케어산업에 사물인터넷 기술을 적용되고 있다. 사물인터넷 기반 헬스케어 서비스를 위해서는 신뢰성 및 보안성 보장이 중요하며, IoT 헬스케어 디바이스에 적합한 통신 프로토콜, 무선 송수신 기법, 신뢰성 기반 메시지 전달 등의 필요성이 요구된다. 본 논문에서는 oneM2M 기반 헬스케어 서비스 적용 모델을 제안하고 헬스케어 서비스에 적용하기 위해 체온, 가속도 센서를 통해 체온 및 활동량에 대한 상태를 측정하여 oneM2M을 기반으로 개발된 Mobius 플랫폼으로 전달하도록 시스템을 설계하고 구현하였다.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • 제9권1호
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Regulatory Policy: Bibliometric Analysis Using the VOSviewer Program

  • Zhavoronok, Artur;Chub, Anton;Yakushko, Inna;Kotelevets, Dmytro;Lozychenko, Oleksandr;Kupchyshynа, Olga
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.39-48
    • /
    • 2022
  • Today the regulation of socio-economic development has been the subject of active scientific debate. The modern paradigm of regulatory policy in foreign countries involves a change in the role and strategy of the state, which determines the relevance of this topic. The aim of the article is to study the current state of regulatory policy research. The article is based on a bibliographic analysis of the study of regulatory policy. The study is based on the data search functions of the Scopus platform. It uses a set of VOSviewer program, online visualization of keywords in the titles of scientific journals and citations of publications. The study led to the conclusion that the number of publications that directly study the nature and features of regulatory policy is insignificant, but constantly growing. In our opinion, further research should determine the essence of regulatory policy as a separate category, a description of its features and factors of formation. It is also necessary to develop a common concept that governments should be actively involved in ensuring the quality of regulation, rather than responding to the shortcomings of regulation, which is evolving into regulatory governance.

Distinction between HAPS and LEO Satellite Communications under Dust and Sand Storms Levels and other Attenuations

  • Harb, Kamal
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.382-388
    • /
    • 2022
  • Satellite communication for high altitude platform stations (HAPS) and low earth orbit (LEO) systems suffer from dust and sand (DU&SA) storms in the desert regions such as Saudi Arabia. These attenuations have a distorting effect on signal fidelity at high frequency of operations. This results signal to noise ratio (SNR) to dramatically decreasing and leads to wireless transmission error. The main focus in this paper is to propose common relations between HAPS and LEO for the atmospheric impairments affecting the satellite communication networks operating above Ku-band crossing the propagation path. A double phase three dimensional relationship for HAPS and LEO systems is then presented. The comparison model present the analysis of atmospheric attenuation with specific focus on sand and dust based on particular size, visibility, adding gaseous effects for different frequency, and propagation angle to provide system operations with a predicted vision of satellite parameters' values. Skillful decision and control system (SD&CS) is proposed to control applied parameters that lead to improve satellite network performance and to get the ultimate receiving wireless signal under bad weather condition.

Digital Transformation in Summer Training Process at King Abdulaziz University: Action Design Research in Practice

  • Bahaddad, Adel;Bitar, Hind
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.171-180
    • /
    • 2022
  • In the knowledge development of online assessment in learning management systems (LMSs), many assessments are evaluated weekly in the summer training course for undergraduate students in the Faculty of Computing and Information Technology at King Abdul-Aziz University in Saudi Arabia. The number of performance assessments in the summer training course reaches 15 weeks. Many of them, however, are sent or done informally or through unreliable ways and cannot be verified by third parties. Therefore, applying the concept of digital transformation is essential. This research study reported herein used the action design research (ADR) method to build a new information technology system that could assist in the digital transformation. An electronic platform was designed, developed, implemented, and evaluated using the ADR method so that the main people involved in the summer training process (i.e., students, academic supervisors, and administrators) would have a high level of satisfaction with it. The study was conducted on 452 students, 105 academic supervisors, and 15 administrative staff and was conducted during the summer semester of 2020. All the training processes were digitally transformed and automated to control and raise the level and reliability of the training. All involved people were satisfied, thus, shifting the process to be in a digital form assist in achieving the high-level goal.

Organization of Independent Work of Students of Higher Pedagogical Universities of Ukraine by Means of Moodle

  • Alla, Lukіianchuk;Dmytro, Yefimov;Oksana, Biletska;Andrii, Hrytsenko;Oxana, Hevko
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.421-426
    • /
    • 2022
  • This study aimed to determine the effectiveness of the Moodle system in the organization of independent work of students of pedagogical profile.The purpose of the article is to analyze the Moodle platform as an innovative element of educational and pedagogical strategies and a component of the educational and methodological content for the self-study of students.Methodology is divided into clusters: general scientific (analysis, classification), ICT methods (modeling, informatization), and philosophical (synergetics). The study revealed the reorientation of Moodle from an auxiliary element to an alternative format in the organization of independent work of student teachers. Prospects for further scientific research determined in the interest of all participants in the educational process in the further development of Moodle as an effective tool for self-education of future teachers.

Access efficiency of small sized files in Big Data using various Techniques on Hadoop Distributed File System platform

  • Alange, Neeta;Mathur, Anjali
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.359-364
    • /
    • 2021
  • In recent years Hadoop usage has been increasing day by day. The need of development of the technology and its specified outcomes are eagerly waiting across globe to adopt speedy access of data. Need of computers and its dependency is increasing day by day. Big data is exponentially growing as the entire world is working in online mode. Large amount of data has been produced which is very difficult to handle and process within a short time. In present situation industries are widely using the Hadoop framework to store, process and produce at the specified time with huge amount of data that has been put on the server. Processing of this huge amount of data having small files & its storage optimization is a big problem. HDFS, Sequence files, HAR, NHAR various techniques have been already proposed. In this paper we have discussed about various existing techniques which are developed for accessing and storing small files efficiently. Out of the various techniques we have specifically tried to implement the HDFS- HAR, NHAR techniques.