• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.027 seconds

Methodological Fundamentals Of Application Of Competencies For Teachers Of Foreign Languages

  • Zahrebniuk, Yuliia;Zheliaskov, Vasyl;Romanyshyn, Ihor;Varekh, Nonna;Yakymenko, Polina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.328-332
    • /
    • 2021
  • The article considers general tendencies in world and education, and also both principles and methods of forming professional, communicative, intercultural competences and in the process of teaching foreign language for professional purposes in the conditions of engineering, economic and other non-linguistic specialties at technical university. The article views some essential issues of this competence including awareness of pedagogical values, the construction of the pedagogical process, pedagogical communication and behavior; pedagogical technology, its essence, structural components, understanding of innovative components of professional activity, requirements for the design and engineering of pedagogical technologies.

A MapReduce-based Artificial Neural Network Churn Prediction for Music Streaming Service

  • Chen, Min
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.55-60
    • /
    • 2022
  • Churn prediction is a critical long-term problem for many business like music, games, magazines etc. The churn probability can be used to study many aspects of a business including proactive customer marketing, sales prediction, and churn-sensitive pricing models. It is quite challenging to design machine learning model to predict the customer churn accurately due to the large volume of the time-series data and the temporal issues of the data. In this paper, a parallel artificial neural network is proposed to create a highly-accurate customer churn model on a large customer dataset. The proposed model has achieved significant improvement in the accuracy of churn prediction. The scalability and effectiveness of the proposed algorithm is also studied.

Microwave Network Study by Bond Graph Approach. Application to Tow-Port Network Filter

  • Jmal, Sabri;Taghouti, Hichem;Mami, Abdelkader
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.121-128
    • /
    • 2022
  • There are much processing techniques of microwave circuits, whose dimensions are small compared to the wavelength, but the disadvantage is that they cannot be directly applied to circuits working at high and/or low frequencies. In this article, we will consider the bond graph approach as a tool for analyzing and understanding the behavior of microwave circuits, and to show how basic circuit and network concepts can be extended to handle many microwaves analysis and design problems of practical interest. This behavior revealed in the scattering matrix filter, and which will be operated from its reduced bond graph model. So, we propose in this paper, a new application of bond graph approach jointly with the scattering bond graph for a high frequency study.

Designing an Electronic Course and Its Impact on Developing University Students' Computational Thinking Skills

  • Al-Zahrani, Majed bin Maili bin Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.15-20
    • /
    • 2022
  • The study investigated the effects of differences in some electronic course designs on university students' Computational Thinking Skills (CTS). Towards this end, the researcher adopted the experimental research design of a quasi-experimental of two experimental groups. The first group was taught an e-course designed in a sequential pattern, and the other group's course was designed according to the holistic model. A CTSs test was prepared to collect the relevant data, and the data were analyzed statistically using these tests- Pearson correlation Mann Whitney and Alpha Cronbach. Results revealed statistically-significant differences at the level α=0.05 between the mean scores of the first and second experimental groups in favor of the latter in the CTS test. The findings gave ground to put forward some salient recommendations, including the need to expand computational thinking in universities' educational process. It also recommends urging faculty members to enhance e-courses in the educational process and provide technical support to students and faculty members.

Usability Principles for Augmented Reality Applications in Education

  • Al-Obaidi, Arwa;Prince, Master
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.49-54
    • /
    • 2022
  • It is challenging to select appropriate technology in education to interact with students in today's digital world. Especially when the technologies used at home on smart devices like tablets and mobile phones are very advanced, on the other side, it may be more challenging to find sharing technology in the classroom. One of the ways is to use new technologies like Augmented Reality (AR). The current study aims to develop usability principles for the development and evaluation of education using AR technology applications. We develop usability principles for AR applications by analyzing existing research about heuristic evaluation methods, design principles for AR systems.

Experiment on countermeasures against cyber security vulnerabilities using redundancy of ISO 19847 Shipboard Data Server (ISO 19847 선박 데이터 서버 이중화를 통한 사이버 보안 취약성 대응 방안 실험)

  • Lee, ChangUi;Lee, Seojeong
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.6
    • /
    • pp.793-806
    • /
    • 2022
  • As the IMO introduced MASS (Maritime Autonomous Surface Ships), ISO(International Organization for Standardization) announced ISO 19847 of a maritime data sharing standard for collecting and remotely managing data of ship systems. Previous literature evaluated the risk using HAZOP for ISO 19847 and proved that risk assessment is useful through experiments. However, redundancy of ISO 19847 ship data server which is one of the risk reduction method suggested in previous literature, was designed but couldn't tested due to the limitations of the conditions. So, in this study, to prove the usefulness of the ship data server redundancy of ISO 19847 which was not tested in previous literature. It based on the design of previous literature, and the network of ship data servers was modeled using the SES/DEVS format and simulated using the DEVS# open source library.

EERA: ENHANCED EFFICIENT ROUTING ALGORITHM FOR MOBILE SENSOR NETWORK

  • Hemalatha, S;Raj, E.George Dharma Prakash
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.389-395
    • /
    • 2022
  • A Mobile Sensor Network is widely used in real time applications. A critical need in Mobile Sensor Network is to achieve energy efficiency during routing as the sensor nodes have scarce energy resource. The nodes' mobility in MWSN poses a challenge to design an energy efficient routing protocol. Clustering helps to achieve energy efficiency by reducing the organization complexity overhead of the network which is proportional to the number of nodes in the network. This paper proposes"EERA: Energy Efficient Routing Algorithm for Mobile Sensor Network" is divided into five phases. 1, Cluster Formation 2.Cluster head and Transmission head selection 3.Path Establishment / Route discovery and 4,Data Transmission. Experimental Analysis has been done and is found that the proposed method performs better than the existing method with respect to four parameters.

MAC layer based cross-layer solutions for VANET routing: A review

  • Nigam, Ujjwal;Silakari, Sanjay
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.636-642
    • /
    • 2021
  • Vehicular Ad hoc Networks (VANET's) are gaining popularity in research community with every passing year due to the key role they play in Intelligent Transportation System. Their primary objective is to provide safety, but their potential to offer a variety of user-oriented services makes them more attractive. The biggest challenge in providing all these services is the inherent characteristics of VANET itself such as highly dynamic topology due to which maintaining continuous communication among vehicles is extremely difficult. Here comes the importance of routing solutions which traditionally are designed using strict layered architecture but fail to address stringent QoS requirements. The paradigm of cross-layer design for routing has shown remarkable performance improvements. This paper aims to highlight routing challenges in VANET, limitations of single-layer solutions and presents a survey of cross-layer routing solutions that utilize the information from the MAC layer to improve routing performance in VANET.

Models of State Clusterisation Management, Marketing and Labour Market Management in Conditions of Globalization, Risk of Bankruptcy and Services Market Development

  • Prokopenko, Oleksii;Martyn, Olga;Bilyk, Olha;Vivcharuk, Olga;Zos-Kior, Mykola;Hnatenko, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.228-234
    • /
    • 2021
  • The article defines the problems of forming the models of government regulation of clustering, marketing management and labor market in the context of globalization, business bankruptcy risk and services market development. The clustering models based on the optimal partner network cooperation were proposed in order to ensure the strategic development of territories, to attract budget leading enterprises and to support small businesses. A descriptive model of government regulation of clustering, marketing management and labor market in the context of globalization, business bankruptcy risk and Covid-19 was determined.

The Use Of Elements Of Innovative Pedagogical Technologies In Educational Activities

  • Barba, Ihor;Riazantsev, Lev;Koturha, Oleh;Poliakov, Serhii;Bondarets, Nadiia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.117-122
    • /
    • 2021
  • The article considers the position of scientists on the concept of "pedagogical technology", identifies the signs of pedagogical technology and existing classifications, considers non-traditional (innovative) learning technologies, as well as their practical forms of application in the educational process, summarizes the results, makes recommendations for the practical application of the studied material. The article considered the basic concepts of pedagogical technology, as well as some types of non-traditional (innovative) teaching technologies. Also, examples of the use of some elements of innovative technologies in practical educational activities are given. The choice of specific non-traditional pedagogical technologies is determined by the target orientation, content specificity, individualization of training, technical equipment of the educational institution, etc.