• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.022 seconds

Towards a Scalable SDN Hypervisors Framework

  • Aamir Hussain;Sajid Ali;Mubashir Ali;Sarfraz Hashim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.67-78
    • /
    • 2024
  • Software-Defined Networking (SDN) is a new emerging networking paradigm that has adopted a logically centralized architecture to increase overall network performance agility and programmability. Combining network virtualization with SDN will guarantees for combined advantages of improved flexibility and network performance. Combining SDN with hypervisors divides the network physical resources into several logical transparent and isolated virtual SDN network (vSDN), where each has its virtual controller. However, SDN hypervisors bring several advantages as well as several challenges to its network operators as for the virtual appliances, their efficient placement, assurance of network performance is mandatory, and their dynamic instantiation with their migration. In this article, we provide a brief and concise review of network virtualization along with its implementation in the SDN network. SDN hypervisors types are discussed, and taxonomy is provided to demonstrate the importance of hypervisors in SDN. A comparison of SDN hypervisors is performed to elaborate on the vital hypervisor software along with their features, and different challenges are discussed faced by the SDN network. A framework is proposed to add combined functionalities of hypervisors to create a more effective and efficient virtual system. The purpose of the framework is to increase network performance through proper configuration of resources, software, control plane isolation functions with defined rules and policies.

Research on Service Enhancement Approach based on Super App Review Data using Topic Modeling (슈퍼앱 리뷰 토픽모델링을 통한 서비스 강화 방안 연구)

  • Jewon Yoo;Chie Hoon Song
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.2_2
    • /
    • pp.343-356
    • /
    • 2024
  • Super app is an application that provides a variety of services in a unified interface within a single platform. With the acceleration of digital transformation, super apps are becoming more prevalent. This study aims to suggest service enhancement measures by analyzing the user review data before and after the transition to a super app. To this end, user review data from a payment-based super app(Shinhan Play) were collected and studied via topic modeling. Moreover, a matrix for assessing the importance and usefulness of topics is introduced, which relies on the eigenvector centrality of the inter-topic network obtained through topic modeling and the number of review recommendations. This allowed us to identify and categorize topics with high utility and impact. Prior to the transition, the factors contributing to user satisfaction included 'payment service,' 'additional service,' and 'improvement.' Following the transition, user satisfaction was associated with 'payment service' and 'integrated UX.' Conversely, dissatisfaction factors before the transition encompassed issues related to 'signup/installation,' 'payment error/response,' 'security authentication,' and 'security error.' Following the transition, user dissatisfaction arose from concerns regarding 'update/error response' and 'UX/UI.' The research results are expected to be used as a basis for establishing strategies to strengthen service competitiveness by making super app services more user-oriented.

A Study on Securing Mid-level Military Officer in ROKA Reserve (육군 예비역 중견간부 확보에 대한 연구)

  • Soon-won Choi;Kiseak Jeon
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.95-105
    • /
    • 2024
  • Although the importance of reserve forces has been emphasized again since the outbreak of the Ukraine War, there is a serious shortage of so-called mid-level officers such as field officers, non-commissioned officers, sergeants, and sergeant s in the Army. This is because, according to related laws such as the Military Personnel Mannagement Act, mid-level executives who have served for more than 20 years can choose to retire. To solve this problem, we studied recent papers spanning 10 years from April to July 2023. As a result of the study, first, mid-level executives must serve in the reserve forces for at least 5 years after expiration of active duty service. Second, the reserve force promotion system must be reorganized to eliminate restrictions on number and rank. In addition, the significance and implications of the study and future directions were discussed.

Analysis of Reviews from Metaverse Platform Users Based on Topic Modeling

  • Jung Seung Lee
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.3
    • /
    • pp.93-104
    • /
    • 2024
  • This study conducts an in-depth analysis of user reviews from three leading metaverse platforms - Minecraft, Roblox, and Zepeto - using advanced topic modeling techniques to uncover key factors for business success. By examining a substantial dataset of user feedback, we identified and categorized the main themes and concerns expressed by users. Our analysis revealed that common issues across all platforms include technical functionality problems, user engagement and interest, payment concerns, and connection difficulties. Specifically, Minecraft users highlighted the importance of adventure and creativity, Roblox users expressed significant concerns about security and fraud, and Zepeto users focused heavily on the fairness of the in-game economy. The findings suggest that for metaverse platforms to achieve sustained success, they must prioritize the resolution of technical issues, enhance features that foster user engagement, ensure reliable connectivity, and address platform-specific concerns such as security for Roblox and payment fairness for Zepeto. These insights provide valuable guidance for developers and business strategists, emphasizing the need for robust technical infrastructure, engaging and diverse content, seamless user access, and transparent and fair economic systems. By addressing these key areas, metaverse platforms can improve user satisfaction, build a loyal user base, and secure long-term success in an increasingly competitive market.

Relevance of E- Learning and Quality Development in Higher Education

  • Arshi Naim;Sahar Mohammed Alshawaf
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.187-195
    • /
    • 2024
  • This is an extended paper explaining the role of E-learning and quality development in the current situation. Amid Covid:19, E-Learning has achieved a new miles stone in imparting education and all levels of institutions have transformed their learning platform from face to face to virtual learning. In this scenario E-Learning is facing two major challenges, first to ensure the ability of computer systems or software to exchange and make use of information on virtual platform (interoperability) and secondly, developing quality learning through e-Learning. To impart learning and teaching (L&T) through E-learning, Middle East University (MEU) has adopted Learning Management Services (LMS) through Blackboard. The university has three types of L&T methods; full online, Blended and Supportive. This research studies the concept, scope and dimensions of interoperability (InT) of E-Learning in MEU then the connection and interdependence between with quality development. In this paper we have described the support and the importance of finest standards and specifications for the objectives of InT of E-Learning and quality development in MEU. The research is based principally on secondary data observed from MEU E-Learning deanship. Also sample of 20 E-Learning experts at MEU were given closed ended as well as semi closed questionnaires for evaluating the assurance of InT of E-Learning and quality development. These experts are mainly certified online facilitators and admin staff. Results provide the verification of application and presence of InT of E-Learning and assured the quality development process in MEU.

Securing the IoT Frontier: Exploring the Limitation and Future Directions in Cybersecurity

  • Moustafa Abdelrahman Mahmoud Ahmed;Nur Arzilawati Md Yunus
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.1-9
    • /
    • 2024
  • As the Internet of Things (IoT) continues to permeate every facet of modern life, the imperative to secure this vast and dynamic frontier becomes increasingly paramount. This presents a comprehensive exploration of the challenges and opportunities inherent in safeguarding the interconnected web of IoT devices. The research critically examines the limitations of current cybersecurity measures through an extensive review of diverse topics, including IoT network performance, smart grid security, and the escalating cyber threats against critical infrastructures. A meticulous analysis of research findings underscores the need for enhanced infrastructure and ongoing research to fortify the cybersecurity mechanisms surrounding IoT objects. We underline the imperative of relentless research efforts to parry the advancing threats and leverage the promise of nascent technologies. Our findings affirm the pivotal influence of robust cybersecurity measures in crafting a resiliently connected ecosystem. The paper underscores the importance of ongoing research to address evolving threats and harness the potential of emerging technologies, reaffirming the central role of cybersecurity in shaping a secure interconnected world. In conclusion, the study emphasizes the dynamic and ever-evolving nature of cybersecurity on the IoT frontier. It unveils a complex landscape of challenges, ranging from network performance intricacies to the security concerns of critical infrastructures.

Radix-2 16 Points FFT Algorithm Accelerator Implementation Using FPGA (FPGA를 사용한 radix-2 16 points FFT 알고리즘 가속기 구현)

  • Gyu Sup Lee;Seong-Min Cho;Seung-Hyun Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.11-19
    • /
    • 2024
  • The increased utilization of the FFT in signal processing, cryptography, and various other fields has highlighted the importance of optimization. In this paper, we propose the implementation of an accelerator that processes the radix-2 16 points FFT algorithm more rapidly and efficiently than FFT implementation of existing studies, using FPGA(Field Programmable Gate Array) hardware. Leveraging the hardware advantages of FPGA, such as parallel processing and pipelining, we design and implement the FFT logic in the PL (Programmable Logic) part using the Verilog language. We implement the FFT using only the Zynq processor in the PS (Processing System) part, and compare the computation times of the implementation in the PL and PS part. Additionally, we demonstrate the efficiency of our implementation in terms of computation time and resource usage, in comparison with related works.

Shadow Libraries: A Bibliometric Analysis of Black Open Access Phenomenon (2011: 2023)

  • Safinaz Mahmoud Elroukh
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.21-32
    • /
    • 2024
  • This study analyzes the global literature on the black open-access phenomenon from 2011 to 2023. A bibliometric analysis was conducted using the Scopus database. The search strategy employed advanced queries with multiple synonymous terms to ensure exhaustive retrieval of relevant documents. The VOSviewer software was employed to visualize the co-occurrence networks. The findings reported 90 papers published during the study period. An evolving scholarly landscape was revealed, with heightened attention from 2016 onwards, peaking in 2017, 2021, and 2023. Articles constitute 83.3% of the total published documents. Singh and Srichandan are prolific authors, with 11.2% of the total publications. The United States contributes 18.9% of the papers, followed by India and Spain. Information Development and Scientometrics are pivotal journals in scholarly discussions about this scope, contributing 4.4% of publications. Co-occurrence network visualization revealed "Sci-Hub" and "open access" as the most used keywords in the global literature. The findings underscore the need for additional research to discover innovative business models to safeguard intellectual property rights while meeting researchers' evolving needs. The importance of this paper comes from being the first bibliometric study analyzing international literature related to this phenomenon, which provides a basis for future research efforts and policymaking.

Using Support Vector Machine to Predict Political Affiliations on Twitter: Machine Learning approach

  • Muhammad Javed;Kiran Hanif;Arslan Ali Raza;Syeda Maryum Batool;Syed Muhammad Ali Haider
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.217-223
    • /
    • 2024
  • The current study aimed to evaluate the effectiveness of using Support Vector Machine (SVM) for political affiliation classification. The system was designed to analyze the political tweets collected from Twitter and classify them as positive, negative, and neutral. The performance analysis of the SVM classifier was based on the calculation of metrics such as accuracy, precision, recall, and f1-score. The results showed that the classifier had high accuracy and f1-score, indicating its effectiveness in classifying the political tweets. The implementation of SVM in this study is based on the principle of Structural Risk Minimization (SRM), which endeavors to identify the maximum margin hyperplane between two classes of data. The results indicate that SVM can be a reliable classification approach for the analysis of political affiliations, possessing the capability to accurately categorize both linear and non-linear information using linear, polynomial or radial basis kernels. This paper provides a comprehensive overview of using SVM for political affiliation analysis and highlights the importance of using accurate classification methods in the field of political analysis.

Critical Assessment on Performance Management Systems for Health and Fitness Club using Balanced Score Card

  • Samina Saleem;Hussain Saleem;Abida Siddiqui;Umer Sheikh;Muhammad Asim;Jamshed Butt;Ali Muhammad Aslam
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.177-185
    • /
    • 2024
  • Web science, a general discipline of learning is presently at high demand of expertise with ideas to develop software-based WebApps and MobileApps to facilitate user or customer demand e.g. shopping etc. electronically with the access at their smartphones benefitting the business enterprise as well. A worldwide-computerized reservation network is used as a single point of access for reserving airline seats, hotel rooms, rental cars, and other travel related items directly or via web-based travel agents or via online reservation sites with the advent of social-web, e-commerce, e-business, from anywhere-on-earth (AoE). This results in the accumulation of large and diverse distributed databases known as big data. This paper describes a novel intelligent web-based electronic booking framework for e-business with distributed computing and data mining support with the detail of e-business system flow for e-Booking application architecture design using the approaches for distributed computing and data mining tools support. Further, the importance of business intelligence and data analytics with issues and challenges are also discussed.