• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.024 seconds

Information and Legal Support for the Implementation of a Gender Approach to Public Administration

  • Goshovska, Valentyna;Balasynovuch, Nataliia;Hryhorovych, Liliia;Goshovskyi, Volodymyr;Danylenko, Lydiia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.150-158
    • /
    • 2021
  • The study identifies the importance of informational and legislative support in ensuring gender equality. It determines the relevance of gender inequality, the main problem, which is confirmed by research and statistical information. The study aims to determine the methods of collecting information and legal regulation of gender issues and the possibility of solving them by public authorities. The main methods of gathering information are census surveys, questionnaires, surveys on public service websites, work with local communities, surveys in nursing homes and orphanages, special survey programs, and election polls. The paper considers the legal regulation of gender inequalities at the international, state, local and organizational levels. According to the analysis of the problem of gender inequality, it is established that the problem is practically eliminated in many developed countries, while countries with low incomes face gender inequality constantly.

Transfer Learning Using Convolutional Neural Network Architectures for Glioma Classification from MRI Images

  • Kulkarni, Sunita M.;Sundari, G.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.198-204
    • /
    • 2021
  • Glioma is one of the common types of brain tumors starting in the brain's glial cell. These tumors are classified into low-grade or high-grade tumors. Physicians analyze the stages of brain tumors and suggest treatment to the patient. The status of the tumor has an importance in the treatment. Nowadays, computerized systems are used to analyze and classify brain tumors. The accurate grading of the tumor makes sense in the treatment of brain tumors. This paper aims to develop a classification of low-grade glioma and high-grade glioma using a deep learning algorithm. This system utilizes four transfer learning algorithms, i.e., AlexNet, GoogLeNet, ResNet18, and ResNet50, for classification purposes. Among these algorithms, ResNet18 shows the highest classification accuracy of 97.19%.

Towards the Acceptance of Functional Requirements in M-Learning Application for KSA University Students

  • Badwelan, Alaa;Bahaddad, Adel A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.145-166
    • /
    • 2021
  • M-learning is one of the most important modern learning environments in developed countries, especially in the context of the COVID-19 pandemic. According to the Ministry of Education policies in Saudi Arabia, gender segregation in education reflects the country's religious values, which are a part of the national policy. Thus, it will help many in the target audience to accept online learning more easily in Saudi society. The literature review indicates the importance to use the UTAUT conceptual framework to study the level of acceptance through adding a new construct to the model which is Mobile Application Quality. The study focuses on the end user's requirements to use M-learning applications. It is conducted with a qualitative method to find out the students' and companies' opinions who working in the M-learning field to determine the requirements for the development of M-learning applications that are compatible with the aspirations of conservative societies.

Modeling in System Engineering: Conceptual Time Representation

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.153-164
    • /
    • 2021
  • The increasing importance of such fields as embedded systems, pervasive computing, and hybrid systems control is increasing attention to the time-dependent aspects of system modeling. In this paper, we focus on modeling conceptual time. Conceptual time is time represented in conceptual modeling, where the notion of time does not always play a major role. Time modeling in computing is far from exhibiting a unified and comprehensive framework, and is often handled in an ad hoc manner. This paper contributes to the establishment of a broader understanding of time in conceptual modeling based on a software and system engineering model denoted thinging machine (TM). TM modeling is founded on a one-category ontology called a thimac (thing/machine) that is used to elaborate the design and analysis of ontological presumptions. The issue under study is a sample of abstract modeling domains as exemplified by time. The goal is to provide better understanding of the TM model by supplementing it with a conceptualization of time aspects. The results reveal new characteristics of time and related notions such as space, events, and system behavior.

Theoretical And Technological Aspects Of Intelligent Systems: Problems Of Artificial Intelligence

  • Frolov, Denys;Radziewicz, Wojciech;Saienko, Volodymyr;Kuchuk, Nina;Mozhaiev, Mykhailo;Gnusov, Yurii;Onishchenko, Yurii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.35-38
    • /
    • 2021
  • The article discusses approaches to the definition and understanding of artificial intelligence, research directions in the field of artificial intelligence; artificial intelligence in the anthropological dimension; the importance of the systems approach as a methodological basis for the design of intelligent systems; structural and functional components of intelligent systems; intelligent systems in the technological aspect; problems and prospects of relations in the system "man - intellectual system".

Intelligent Automated Cognitive-Maturity Recognition System for Confidence Based E-Learning

  • Usman, Imran;Alhomoud, Adeeb M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.223-228
    • /
    • 2021
  • As a consequence of sudden outbreak of COVID-19 pandemic worldwide, educational institutes around the globe are forced to switch from traditional learning systems to e-learning systems. This has led to a variety of technology-driven pedagogies in e-teaching as well as e-learning. In order to take the best advantage, an appropriate understanding of the cognitive capability is of prime importance. This paper presents an intelligent cognitive maturity recognition system for confidence-based e-learning. We gather the data from actual test environment by involving a number of students and academicians to act as experts. Then a Genetic Programming based simulation and modeling is applied to generate a generalized classifier in the form of a mathematical expression. The simulation is derived towards an optimal space by carefully designed fitness function and assigning a range to each of the class labels. Experimental results validate that the proposed method yields comparative and superior results which makes it feasible to be used in real world scenarios.

The Level of ELMS Success in Satisfying Students at Al-Jouf University During the Corona Crisis

  • Azim, Zeinab M. Abdel;Shahin, Osama R.;Khalaf, Mohamed H. Ragab;Taloba, Ahmed I.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.241-249
    • /
    • 2022
  • The current research attempts to measure the level of the acceptance of the Blackboard System (BBS) during the Corona crisis, and whether this is one of the reasons for the low use of the BBS at Al-Jouf University. To achieve this, the technology accepting model in the time of crisis (TAMTC) has been proposed to measure the degree of acceptance by students, which was then applied to a random sample of 339 of such. The results show a high level of student acceptance, despite their lower use of the system. The research also highlights the importance of upgrading e-courses and that the discontinuation of exam disqualification of students is secondary to their poor course attendance.

The Impact of Skills Development on Employee Performance

  • Farid, Khemissi;Taher, Jouili
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.278-286
    • /
    • 2021
  • The aim of this paper is to examine the importance of skills development in the process of employee performance. As part of this research, we will seek to determine the nature and extent of skills development impact in improving employee performance. This research project is one of the new themes that some researchers have started in recent years. The novelty of this theme is the inclusion of the skill development factor. This factor is likely to have a positive impact on employee motivation and performance. Some of the factors already known to have an impact on employee performance, such as motivation, career development, training, and experience, will be adopted. It is assumed that the results of this research will have a positive impact on employee performance and employee retention.

Modern Tendencies of Digitalization of the Financial Services Sphere

  • Krylov, Denys;Papaika, Oleksandr;Panchenko, Olena;Pylevych, Dmytro;Kozlianchenko, Olena;Konoplia, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.39-46
    • /
    • 2022
  • The article is devoted to clarifying current trends in the digitalization of financial services. To this end, the evolution of this process in the financial sector was studied and six stages of its development were identified. The components of successful implementation of digitalization in the field of financial services and its tasks are outlined. It was found that fintech companies, which work to achieve effective interaction between the financial sector and innovative technologies in the use of mobile applications in order to most fully and quickly meet the needs of customers with financial services, are of great importance for the formation and development of digitalization in financial services. Current trends in the digitalization of financial services in Ukraine based on the use of fintech in general and banking institutions in particular are presented.

MAC layer based cross-layer solutions for VANET routing: A review

  • Nigam, Ujjwal;Silakari, Sanjay
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.636-642
    • /
    • 2021
  • Vehicular Ad hoc Networks (VANET's) are gaining popularity in research community with every passing year due to the key role they play in Intelligent Transportation System. Their primary objective is to provide safety, but their potential to offer a variety of user-oriented services makes them more attractive. The biggest challenge in providing all these services is the inherent characteristics of VANET itself such as highly dynamic topology due to which maintaining continuous communication among vehicles is extremely difficult. Here comes the importance of routing solutions which traditionally are designed using strict layered architecture but fail to address stringent QoS requirements. The paradigm of cross-layer design for routing has shown remarkable performance improvements. This paper aims to highlight routing challenges in VANET, limitations of single-layer solutions and presents a survey of cross-layer routing solutions that utilize the information from the MAC layer to improve routing performance in VANET.