• Title/Summary/Keyword: Security Mechanisms

Search Result 398, Processing Time 0.024 seconds

Evolutionary Theory Of Management In Education

  • Moskalenko-Vysotska, Olena;Melnyk, Emiliia;Tovstenko-Zabelin, Serhii;Lehka, Svitlana;Didenko, Maryna;Hrubych, Kostiantyn
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.312-318
    • /
    • 2022
  • The article notes that one of the reasons for the crisis in education was the sharp discrepancy between the emerging new forms and content and the model of macro-management that has developed over the decades. The level of management of the educational system did not emerge as a specific activity characterized by its own mechanisms and processes, just as qualified carriers of this activity - professionals - managers - did not appear. At the same time, there is practically no theoretical and methodological model of the macrolevel of education management, that is, management of the educational system as an integral structure.

State Regulation of the Hotel and Restaurant Complex in the System of Development of Tourism and the National Economy

  • Poltavska, Oksana;Lashchyk, Iryna;Nikitchina, Tetiana;Borutska, Yuliia;Smolinska, Natalia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.236-240
    • /
    • 2022
  • The main purpose of the study is to analyze the key aspects of state regulation of the hotel and restaurant complex in the system of tourism development and the national economy. The effectiveness of the regulation of the hotel and restaurant complex in the system of development of tourism and the national economy largely depends on the presence of an effective central executive body that would take care of the problems of the development of the industry, the quality and perfection of legal support, a strategic view of programming the development of the industry within the state and regions, as well as administrative mechanisms of public administration, which fully ensure control over the activities of economic entities and the quality of the services they provide. Based on the results of the study, key aspects of state regulation of the hotel and restaurant complex in the system of tourism development and the national economy were identified.

Mechanisms of Protection of the Rights and Interests of Entrepreneurs in Russia

  • Turanin, Vladislav Yurievich;Kistenev, Vitaliy Valentinovich;Posokhova, Yana Vitalievna;Kisteneva, Olga Alekseevna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.291-293
    • /
    • 2022
  • The implementation of the legal mechanism to protect the rights and interests of entrepreneurs in Russia has its unique features. When the rights and interests of a businessman are threatened with infringement, specific legal remedies may be applied, by means of which the violated rights and interests are restored and, thereby, the opportunity to resume entrepreneurial activity is created. The paper explores extrajudicial ways to protect the rights and interests of entrepreneurs in Russia. The study analyzes the forms of self-help, arbitral tribunal, resolution of applications and complaints by executive authorities, the notariate, and work with the business ombudsman and civil society institutions.

A Study on the Design of Security Mechanisms for CCTV Control (CCTV 제어를 위한 보안 메커니즘 설계에 관한 연구)

  • Kim, Hyo-Name;Park, Jae-Kyung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.445-446
    • /
    • 2020
  • 최근 사물인터넷의 발전에 따른 많은 기기들이 디지털화 되면서 네트워크의 새로운 주요 장비로 등장하고 있으며 이 중 CCTV의 경우 대부분 IP를 갖는 독립적인 네트워크 디바이스가 되고 있다. 하지만 이러한 CCTV의 네트워크 접근에 따른 해킹 가능성이 끊임없이 제공되면서 CCTV를 통한 내부망의 침투가 현실적으로 가능한 상황이다. 현재 대부분의 영상 화면이 암호화되어 운영되고는 있지만 CCTV를 통제하는 제어 데이터는 어떠한 보안조치도 이루어지지 않은 것이 현실이다. 이러한 점을 보완하기 위해 면에서 본 논문에서는 CCTV 통제를 위한 제어 데이터도 인증 및 암호화를 통해 일반적인 접근을 완전히 차단할 수 있는 방안을 제시하고 이를 통한 사물인터넷의 안정성을 검증하는 방안을 제안하고자 한다.

  • PDF

An Automated Way to Detect Tumor in Liver

  • Meenu Sharma. Rafat Parveen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.209-213
    • /
    • 2023
  • In recent years, the image processing mechanisms are used widely in several medical areas for improving earlier detection and treatment stages, in which the time factor is very important to discover the disease in the patient as possible as fast, especially in various cancer tumors such as the liver cancer. Liver cancer has been attracting the attention of medical and sciatic communities in the latest years because of its high prevalence allied with the difficult treatment. Statistics indicate that liver cancer, throughout world, is the one that attacks the greatest number of people. Over the time, study of MR images related to cancer detection in the liver or abdominal area has been difficult. Early detection of liver cancer is very important for successful treatment. There are few methods available to detect cancerous cells. In this paper, an automatic approach that integrates the intensity-based segmentation and k-means clustering approach for detection of cancer region in MRI scan images of liver.

Transfer Learning for Face Emotions Recognition in Different Crowd Density Situations

  • Amirah Alharbi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.26-34
    • /
    • 2024
  • Most human emotions are conveyed through facial expressions, which represent the predominant source of emotional data. This research investigates the impact of crowds on human emotions by analysing facial expressions. It examines how crowd behaviour, face recognition technology, and deep learning algorithms contribute to understanding the emotional change according to different level of crowd. The study identifies common emotions expressed during congestion, differences between crowded and less crowded areas, changes in facial expressions over time. The findings can inform urban planning and crowd event management by providing insights for developing coping mechanisms for affected individuals. However, limitations and challenges in using reliable facial expression analysis are also discussed, including age and context-related differences.

An Efficient Protocol for the Cross Certification Path Validation (경로기반 상호인증을 위한 효율적 프로토콜)

  • 김홍석;박세현
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.217-220
    • /
    • 2000
  • With the expansion of E-commerce, Public Key Infrastructure (PKI) solutions are requited to resolve Internet security problems. But the certification mechanism for each organization has been independently developed under its own circumstances, so the cooperation of heterogeneous certification mechanisms must be carefully taken into account. In this paper, we propose an efficient protocol for the cross certification based on the path validation. The proposed “cross certification gateway” provides flexibility and convenience with the initial establishment protocol for the cross certification among different certification domains.

  • PDF

Study on the Application of Retention Money in the FIDIC Conditions of Contract 1999 Edition (FIDIC 계약조건에 적용되고 있는 유보금의 적정성에 대한 연구 (FIDIC 계약조건 1999년판 기준))

  • Hyun, Hak Bong;Park, Hyung Keun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.38 no.3
    • /
    • pp.497-503
    • /
    • 2018
  • Most of the conditions of contract applied in international construction contracts, including various conditions of contract published by FIDIC, include the provision for Retention Money which inevitably result in negative impact on cash-flow or financial burden to the contractors. In this study, fundamental reasons behind the application of Retention Money provisions are analysed and contractual mechanisms included in the FIDIC conditions of contract are searched, which include provisions for Performance Security and Defects as well as Termination, so that proper judgement can be derived on the application of Retention Money. In conclusion, considering the various contract provisions, performance security, termination of the contract by the Employer etc. included in the FIDIC conditions of contract, it is not necessary to include the provision for Retention Money.

On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management

  • Chen, Yu Yi;Jan, Jinn Ke;Tsai, Meng Lin;Ku, Chun Ching;Huang, Der Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.515-528
    • /
    • 2012
  • The aim of this article is to provide a study on the issue of inventory inaccuracy and to show the manner in which RFID technology can improve the inventory management performance. The objective of inventory control is to monitor the stock flow of merchandises in order to understand the operating profit and loss. A proper mechanism of inventory control could be made to help the profitability. As RFID is applied to inventory control, it can improve efficiency, enhance accuracy and achieve security. In this paper, we introduce the evolution of different mechanisms of inventory control with RFID system-counting method, collect-all method, and continuous monitoring method. As for improving the accuracy of inventory check during business hours, continuous monitoring is the solution. We introduce the infrastructure of the RFID inventory management system based on M2M architecture can make the inventory be efficiently monitored with instant warnings.

Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions

  • Kirsal-Ever, Yoney;Eneh, Agozie;Gemikonakli, Orhan;Mostarda, Leonardo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4604-4623
    • /
    • 2014
  • Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed.