• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.037 seconds

Strategies to improve irrigation water management for rice production in Pulangui River Irrigation System

  • Siem, Paul Roderick M.;Ahmad, Mirza Junaid;Choi, Kyung-Sook
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.509-509
    • /
    • 2022
  • Rice has always been the anchor of food security in the Philippines and the government is adamant about sustaining rice production by ensuring reliable irrigation water availability. Among the numerous irrigation schemes, the importance of the Pulangui River Irrigation System (PRIS) is undeniable, as it is the largest and primary irrigation source for rice production areas which are considered the food basket in Northern Mindanao. However, the ageing irrigation structures, unlined canals, long-standing water delivery systems, and climate change are compromising the performance of PRIS; and every year, during the dry and wet season, the maximum rice irrigable area is not achieved. From the field-scale water management perspective, untimely irrigation application, an unregulated roster of turn for irrigation among farmers, and the traditional practice of flooding the rice fields are the main causes of substantial water losses in conveyance, distribution, and farm application of irrigation water. Hence, proper irrigation scheduling is crucial to cultivate the maximum irrigable area by ensuring equity among the farmers and to increase the water use efficiency and yield. In this study, the FAO single crop coefficient approach was adopted to estimate rice water requirements, which were subsequently used to suggest appropriate irrigation schedules based on the recommended field-scale rice cultivation practices. The study results would improve the irrigation system management in the study area by facilitating in regulating the canal water flows and releases according to suggested irrigation schedules that could lead to increased benefited area, yield, and water efficiency without straining the available water resources.

  • PDF

Multi-Behavior Analysis Based on Google Archiving Data (구글 아카이빙 데이터 기반 멀티 행위 분석)

  • Yeeun Kim;Sara Hong;Seongmin Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.737-751
    • /
    • 2023
  • The importance of digital forensics in the cloud environment is increasing as businesses and individuals move their data from On-premise to the cloud. Cloud data can be stored on various devices, including mobile devices and desktops, and encompasses a variety of user behavior artifacts, such as information generated from linked accounts and cloud services. However, there are limitations in securing and analyzing digital evidence due to environmental constraints of the cloud, such as distributed storage of data and lack of artifact linkage. One solution to address this is archiving services, and Google's Takeout is prime example. In this paper, user behavior data is analyzed for cloud forensics based on archiving data and necessary items are selected from an investigation perspective. Additionally, we propose the process of analyzing selectively collected data based on time information and utilizing web-based visualization to meaningfully assess artifact associations and multi-behaviors. Through this, we aim to demonstrate the value of utilizing archiving data in response to the increasing significance of evidence collection for cloud data.

Students' Performance Prediction in Higher Education Using Multi-Agent Framework Based Distributed Data Mining Approach: A Review

  • M.Nazir;A.Noraziah;M.Rahmah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.135-146
    • /
    • 2023
  • An effective educational program warrants the inclusion of an innovative construction which enhances the higher education efficacy in such a way that accelerates the achievement of desired results and reduces the risk of failures. Educational Decision Support System (EDSS) has currently been a hot topic in educational systems, facilitating the pupil result monitoring and evaluation to be performed during their development. Insufficient information systems encounter trouble and hurdles in making the sufficient advantage from EDSS owing to the deficit of accuracy, incorrect analysis study of the characteristic, and inadequate database. DMTs (Data Mining Techniques) provide helpful tools in finding the models or forms of data and are extremely useful in the decision-making process. Several researchers have participated in the research involving distributed data mining with multi-agent technology. The rapid growth of network technology and IT use has led to the widespread use of distributed databases. This article explains the available data mining technology and the distributed data mining system framework. Distributed Data Mining approach is utilized for this work so that a classifier capable of predicting the success of students in the economic domain can be constructed. This research also discusses the Intelligent Knowledge Base Distributed Data Mining framework to assess the performance of the students through a mid-term exam and final-term exam employing Multi-agent system-based educational mining techniques. Using single and ensemble-based classifiers, this study intends to investigate the factors that influence student performance in higher education and construct a classification model that can predict academic achievement. We also discussed the importance of multi-agent systems and comparative machine learning approaches in EDSS development.

Modeling and Trends of Road Transport Development in Eastern European Countries

  • Viktoriia Harkava;Olena Pylypenko;Oleksandr Haisha;Armen Aramyan;Volodymyr Kairov
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.189-195
    • /
    • 2024
  • Road transport occupies the largest share in domestic and international transport. It is of key importance for the development of the economy, forasmuch as it provides the livelihood of the population, the development of the national economy, the possibility of establishing foreign economic relations. The purpose of the research is as follows: analysis of the current state of functioning of the road transport sector in Eastern Europe and identification of key problems and trends in its development. Research methods: Methods of grouping, comparison and generalization, correlation analisys have been used to identify the dynamics of the main indicators of road transport in Eastern Europe. The method of correlation-regression analysis has been applied to determine the impact of increasing the length of roads on the turnover of the road freight transport and the number of employed population in this area. Results. It has been found that the increase in the employed population by 96% and increase in revenues from transportation and storage of goods, postal and courier services (turnover of the road freight transport - in the original language) in the field of road transport by 82% is explained by the change in transport infrastructure capacity by increasing length of highways. According to the correlation analysis, it has been revealed that there is a high direct dependence between the length of roads and increased revenues from transportation and storage of goods in the field of road transport, as well as between the length of roads and increasing employment in this area.

A Critical Analysis of Learning Technologies and Informal Learning in Online Social Networks Using Learning Analytics

  • Audu Kafwa Dodo;Ezekiel Uzor OKike
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.71-84
    • /
    • 2024
  • This paper presents a critical analysis of the current application of big data in higher education and how Learning Analytics (LA), and Educational Data Mining (EDM) are helping to shape learning in higher education institutions that have applied the concepts successfully. An extensive literature review of Learning Analytics, Educational Data Mining, Learning Management Systems, Informal Learning and Online Social Networks are presented to understand their usage and trends in higher education pedagogy taking advantage of 21st century educational technologies and platforms. The roles of and benefits of these technologies in teaching and learning are critically examined. Imperatively, this study provides vital information for education stakeholders on the significance of establishing a teaching and learning agenda that takes advantage of today's educational relevant technologies to promote teaching and learning while also acknowledging the difficulties of 21st-century learning. Aside from the roles and benefits of these technologies, the review highlights major challenges and research needs apparent in the use and application of these technologies. It appears that there is lack of research understanding in the challenges and utilization of data effectively for learning analytics, despite the massive educational data generated by high institutions. Also due to the growing importance of LA, there appears to be a serious lack of academic research that explore the application and impact of LA in high institution, especially in the context of informal online social network learning. In addition, high institution managers seem not to understand the emerging trends of LA which could be useful in the running of higher education. Though LA is viewed as a complex and expensive technology that will culturally change the future of high institution, the question that comes to mind is whether the use of LA in relation to informal learning in online social network is really what is expected? A study to analyze and evaluate the elements that influence high usage of OSN is also needed in the African context. It is high time African Universities paid attention to the application and use of these technologies to create a simplified learning approach occasioned by the use of these technologies.

Corporate Social Responsibility in Modern Transnational Corporations

  • Vitalii Nahornyi;Alona Tiurina;Olha Ruban;Tetiana Khletytska;Vitalii Litvinov
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.172-180
    • /
    • 2024
  • Since the beginning of 2015, corporate social responsibility (CSR) models have been changing in connection with the trend towards the transition of joint value creation of corporate activities and consideration of stakeholders' interests. The purpose of the academic paper lies in empirically studying the current practice of social responsibility of transnational corporations (TNCs). The research methodology has combined the method of qualitative analysis, the method of cases of agricultural holdings in emerging markets within the framework of resource theory, institutional theory and stakeholders' theory. The results show that the practice of CSR is integrated into the strategy of sustainable development of TNCs, which determine the methods, techniques and forms of communication, as well as areas of stakeholders' responsibility. The internal practice of CSR is aimed at developing norms and standards of moral behaviour with stakeholders in order to maximize economic and social goals. Economic goals are focused not only on making a profit, but also on minimizing costs due to the potential risks of corruption, fraud, conflict of interest. The system of corporate social responsibility of modern TNCs is clearly regulated by internal documents that define the list of interested parties and stakeholders, their areas of responsibility, greatly simplifying the processes of cooperation and responsibility. As a result, corporations form their own internal institutional environment. Ethical norms help to avoid the risks of opportunistic behaviour of personnel, conflicts of interest, cases of bribery, corruption, and fraud. The theoretical value of the research lies in supplementing the theory of CSR in the context of the importance of a complex, systematic approach to integrating the theory of resources, institutional theory, theory of stakeholders in the development of strategies for sustainable development of TNCs, the practice of corporate governance and social responsibility.

Transition from Diagnosis to Assessment System in Public Institution Personal Information Protection Management: Policy Approaches and Recommendations (공공기관 개인정보보호 관리 수준 진단에서 평가 체계로의 전환 : 정책적 접근 및 제언)

  • Youn-hee Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.801-809
    • /
    • 2024
  • In the digital age, the importance of personal information has magnified, underscoring the need for enhanced personal information protection, especially within public institutions. Despite ongoing efforts since 2007, significant breaches in public sector information underline persistent vulnerabilities. This study advocates for a transition from a diagnostic to an assessment framework to fortify privacy management in public institutions, as mandated by recent legislative revisions. The amended Personal Information Protection Act introduces an assessment approach, aiming to comprehensively assess and mitigate risks by expanding the scope of evaluation and implementing robust regulatory measures. This study examines the limitations of the current diagnostic practices through literature review and case analysis and proposes a systematic approach to adopting the new assesment system. By enhancing the assessment framework, the study expects to improve the effectiveness of personal information management in public institutions, thereby restoring public trust and ensuring a stable progression into a more secure digital era. The transition to an assessment system is designed not only to address the gaps in the current framework but also to provide a methodical assessment that supports ongoing improvement and compliance with enhanced legal standards.

A Study on the Improvement and Utilization of Public N-Day Vulnerability Databases (N-day 취약점 데이터베이스 개선 및 활용 방안 연구)

  • JongSeon Jeong;Jungheum Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.667-680
    • /
    • 2024
  • If the software is not updated after the vulnerability is disclosed, it can continue to be attacked. As a result, the importance of N-day detection is increasing as attacks that exploit vulnerabilities increase. However, there is a problem that it is difficult to find specific version information in the published vulnerability database, or that the wrong version or software is outputted. There is also a limitation in that the connection between the published vulnerability databases is not good. In order to overcome these limitations, this paper proposes a method of building information including comprehensive vulnerability information such as CVE, CPE, and Exploit Database into an integrated database. Furthermore, by developing a website for searching for vulnerabilities based on an integrated database built as a result of this study, it is effective in detecting and utilizing vulnerabilities in specific software versions and Windows operating systems.

Comparative Evaluation of Data Processing Performance between MySQL and Redis (MySQL과 Redis의 데이터 처리 성능 비교 평가)

  • Hyeok Bang;Seo-Hyeon Kim;Sanghoon Jeon
    • Journal of Internet Computing and Services
    • /
    • v.25 no.3
    • /
    • pp.35-41
    • /
    • 2024
  • As online activities have rapidly increased due to recent digital changes and the impact of COVID-19, the importance of large-scale data processing and maintenance is increasing. This study compares the performance of the two main types of databases widely used for data storage and management: Relational Database Management Systems (RDBMS) and Non-Relational Databases (NoSQL). Specifically, we measured and evaluated the execution time of data insertion, query, and deletion functions using MySQL, a representative example of RDBMS, and Redis, a representative example of NoSQL. The experimental results showed that Redis showed performance about 5.84 times faster in data insertion, 6.61 times faster in query, and 12.33 times faster in deletion than MySQL. These results demonstrate that Redis provides superior performance, especially in environments requiring large-scale data processing and maintenance. Therefore, companies and online service providers can choose NoSQL databases such as Redis to ensure more efficient data management solutions. We hope this study will be an essential reference when selecting a database based on data processing performance.

A Study on the Applicability of Social Security Platform to Smart City (사회보장플랫폼과 스마트시티에의 적용가능성에 관한 연구)

  • Jang, Bong-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.321-335
    • /
    • 2020
  • Given that with the development of the 4th industry, interest and desire for smart cities are gradually increasing and related technologies are developed as a way to strengthen urban competitiveness by utilizing big data, information and communication technology, IoT, M2M, and AI, the purpose of this study is to find out how to achieve this goal on the premise of the idea of smart well fair city. In other words, the purpose is to devise a smart well-fair city in the care area, such as health care, medical care, and welfare, and see if it is feasible. With this recognition, the paper aimed to review the concept and scope of smart city, the discussions that have been made so far and the issues or limitations on its connection to social security and social welfare, and based on it, come up with the concept of welfare city. As a method of realizing the smart welfare city, the paper reviewed characteristics and features of a social security platform as well as the applicability of smart city, especially care services. Furthermore, the paper developed discussions on the standardization of the city in terms of political and institutional improvements, utilization of personal information and public data as well as ways of institutional improvement centering on social security information system. This paper highlights the importance of implementing the digitally based community care and smart welfare city that our society is seeking to achieve. With regard to the social security platform based on behavioral design and the 7 principles(6W1H method), the present paper has the limitation of dealing only with smart cities in the fields of healthcare, medicine, and welfare. Therefore, further studies are needed to investigate the effects of smart cities in other fields and to consider the application and utilization of technologies in various aspects and the corresponding impact on our society. It is expected that this paper will suggest the future course and vision not only for smart cities but also for the social security and welfare system and thereby make some contribution to improving the quality of people's lives through the requisite adjustments made in each relevant field.