• Title/Summary/Keyword: Security Planning

Search Result 465, Processing Time 0.021 seconds

The Reality of Transitional Services Provided to People with Intellectual Disabilities from the Point of View of Parents

  • AL Zahrani, Mohammed Abdullah;Alqudah, Derar Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.338-347
    • /
    • 2022
  • The current study aimed to identify the reality of the transitional services provided to people with intellectual disabilities from the parent's point of view. The results indicated an average level, with an arithmetic mean (3.66) of the reality of transitional services provided to students with intellectual disabilities through the response of the study participants to the questionnaire consisting of (20) items. The dimension (social and societal skills) ranked first with an arithmetic average (4.03) with a high degree, through the response of the participants in the study to the items of the dimension consisting of (10) items. It was followed by the dimension (self-determination skills) with an arithmetic average of (3.29) to a medium degree, through the response of the participants in the study to the items of the dimension consisting of (10) items. The researchers recommend the necessity of joint planning by all relevant authorities, to solve the legal, societal, technical, and administrative problems and challenges that impede the provision of transitional services for students with intellectual disabilities.

Theories, Frameworks, and Models of Using Artificial Intelligence in Organizations

  • Alotaibi, Sara Jeza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.357-366
    • /
    • 2022
  • Artificial intelligence (AI) is the replication of human intelligence by computer systems and machines using tools like machine learning, deep learning, expert systems, and natural language processing. AI can be applied in administrative settings to automate repetitive processes, analyze and forecast data, foster social communication skills among staff, reduce costs, and boost overall operational effectiveness. In order to understand how AI is being used for administrative duties in various organizations, this paper gives a critical dialogue on the topic and proposed a framework for using artificial intelligence in organizations. Additionally, it offers a list of specifications, attributes, and requirements that organizations planning to use AI should consider.

Theoretical Foundations of Management of the Education System: Optimization of the Complex of Organizational and Pedagogical Conditions for Effective Management

  • Yuryk, Olha;Sitsinskiy, Nazariy;Zaika, Liudmyla;Рshenychna, Lіubov;Boiko, Svitlana;Filipovych, Myroslava
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.168-174
    • /
    • 2022
  • The article defines the organizational conditions for effective management, the actions of the team to implement the concept of marketing management using the tools of pedagogical and strategic management. Due to this, results are achieved - indicators, since in our study they will be indicators of managerial efficiency: improving the "organization" function through the construction of new organizational structures; improving the functions of "analytical activity and planning" through enriching managerial work with economic and gnostic methods, analytical activities with the mandatory inclusion of financial activities, introspection of all participants, widespread use of licensed automated systems; synthesis of educational, economic, social results.

The Effectiveness of a Program in Activities for Early Students to Develop Some of the Basic Skills Needed for the Age of Artificial Intelligence

  • Adelah Abdulhamid Abdulwahab, Rajab
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.239-244
    • /
    • 2022
  • The study aimed to build a program in activities for early childhood students to develop some of the basic skills necessary for the age of artificial intelligence, to achieve the objectives of the study , the researcher used the experimental design, and the research sample consisted of 37 early childhood students. The study used the following tools: Experimental treatment subject: the proposed program in the activities, Measurement and evaluation tool: testing the basic skills needed for the age of artificial intelligence. The study concluded several results: There is a statistically significant difference (α≤0.05) between the average grades of the early childhood students in the research group in the tribal and remote measurements to test the basic skills necessary for the age of artificial intelligence in favor of the students grades in the dimensional measurements. Practical application of the study through benefiting from the proposed program of activities prepared in the current study in planning and implementing activities to develop the basic skills necessary for the age of artificial intelligence among early childhood students.

Application of Different Tools of Artificial Intelligence in Translation Language

  • Mohammad Ahmed Manasrah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.144-150
    • /
    • 2023
  • With progressive advancements in Man-made consciousness (computer based intelligence) and Profound Learning (DL), contributing altogether to Normal Language Handling (NLP), the precision and nature of Machine Interpretation (MT) has worked on complex. There is a discussion, but that its no time like the present the human interpretation became immaterial or excess. All things considered, human flaws are consistently dealt with by its own creations. With the utilization of brain networks in machine interpretation, its been as of late guaranteed that keen frameworks can now decipher at standard with human interpreters. In any case, simulated intelligence is as yet not without any trace of issues related with handling of a language, let be the intricacies and complexities common of interpretation. Then, at that point, comes the innate predispositions while planning smart frameworks. How we plan these frameworks relies upon what our identity is, subsequently setting in a one-sided perspective and social encounters. Given the variety of language designs and societies they address, their taking care of by keen machines, even with profound learning abilities, with human proficiency looks exceptionally far-fetched, at any rate, for the time being.

Sorting for Plastic Bottles Recycling using Machine Vision Methods

  • SanaSadat Mirahsani;Sasan Ghasemipour;AmirAbbas Motamedi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.89-98
    • /
    • 2024
  • Due to the increase in population and consequently the increase in the production of plastic waste, recovery of this part of the waste is an undeniable necessity. On the other hand, the recycling of plastic waste, if it is placed in a systematic process and controlled, can be effective in creating jobs and maintaining environmental health. Waste collection in many large cities has become a major problem due to lack of proper planning with increasing waste from population accumulation and changing consumption patterns. Today, waste management is no longer limited to waste collection, but waste collection is one of the important areas of its management, i.e. training, segregation, collection, recycling and processing. In this study, a systematic method based on machine vision for sorting plastic bottles in different colors for recycling purposes will be proposed. In this method, image classification and segmentation techniques were presented to improve the performance of plastic bottle classification. Evaluation of the proposed method and comparison with previous works showed the proper performance of this method.

A Fuzzy Logic Based Software Development Cost Estimation Model with improved Accuracy

  • Shrabani Mallick;Dharmender Singh Kushwaha
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.17-22
    • /
    • 2024
  • Software cost and schedule estimation is usually based on the estimated size of the software. Advanced estimation techniques also make use of the diverse factors viz, nature of the project, staff skills available, time constraints, performance constraints, technology required and so on. Usually, estimation is based on an estimation model prepared with the help of experienced project managers. Estimation of software cost is predominantly a crucial activity as it incurs huge economic and strategic investment. However accurate estimation still remains a challenge as the algorithmic models used for Software Project planning and Estimation doesn't address the true dynamic nature of Software Development. This paper presents an efficient approach using the contemporary Constructive Cost Model (COCOMO) augmented with the desirable feature of fuzzy logic to address the uncertainty and flexibility associated with the cost drivers (Effort Multiplier Factor). The approach has been validated and interpreted by project experts and shows convincing results as compared to simple algorithmic models.

Transfer Learning for Face Emotions Recognition in Different Crowd Density Situations

  • Amirah Alharbi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.26-34
    • /
    • 2024
  • Most human emotions are conveyed through facial expressions, which represent the predominant source of emotional data. This research investigates the impact of crowds on human emotions by analysing facial expressions. It examines how crowd behaviour, face recognition technology, and deep learning algorithms contribute to understanding the emotional change according to different level of crowd. The study identifies common emotions expressed during congestion, differences between crowded and less crowded areas, changes in facial expressions over time. The findings can inform urban planning and crowd event management by providing insights for developing coping mechanisms for affected individuals. However, limitations and challenges in using reliable facial expression analysis are also discussed, including age and context-related differences.

Design and Implementation of Low-Cost Articulate Manipulator for Academic Applications

  • Muhammad Asim Ali;Farhan Ali Shah
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.17-22
    • /
    • 2024
  • The objective of this work is to design a low cost yet fully functional 4-DOF articulate manipulator for educational applications. The design is based on general purpose, programmable smart servo motors namely the Dynamixel Ax-12. The mechanism for motion was developed by formulating the equations of kinematics and subsequent solutions for joint space variables. The trajectory of end-effector in joint variable space was determined by interpolation of a 3rd order polynomial. The solutions were verified through computer simulations and ultimately implemented on the hardware. Owing to the feedback from the built-in sensors, it is possible to correct the positioning error due to loading effects. The proposed solution offers an efficient and cost-effective platform to study the trajectory planning as well as dynamics of the manipulator.

The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement) (해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 -)

  • Choi, Yoon-Soo
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF