• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.031 seconds

Design of MBTI Job Recommendation Algorithm Based on Deep Learning (딥러닝 기반의 MBTI 직업 추천 알고리즘 설계)

  • June-Gyeom Kim;Young-Bok Cho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.13-15
    • /
    • 2023
  • 본 논문에서는 성격, 성향을 근거로 사람의 성향에 따른 직업 및 전공에 대한 만족도를 분류한 데이터셋을 구축하여 사전에 사용자의 성향을 파악하여 직업을 추천하는 알고리즘을 제안한다. 성격유형검사 뿐만이 아닌 최근 게시한 SNS 텍스트를 사전에 학습한 데이터셋에 적용해 성격유형 결과의 정확도를 상승시키고자 한다. 사전에 생성한 데이터셋 외에 대상자가 작성한 정보(직업, 전공, 직엄 및 전공에 대한 만족도)로 연합학습을 진행하여 데이터셋의 정확도를 향상시키고자 한다. 모델의 학습 및 분류의 정확도 향상을 위해 SVM, NB, KNN, SDG 알고리즘들을 비교하였고 각각 67%, 21%, 28%, 69%의 정확도를 도출하였다. 데이터 셋은 캐글에서 제공받았다.

  • PDF

Digital Transformation Requirements at Saudi Universities from Faculty Members' Perspectives

  • Taha Mansor Khawaji
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.8-20
    • /
    • 2023
  • The current study aims to determine digital transformation (organizational, technical, and human resources) requirements at Saudi universities from Umm Al-Qura University faculty members' perspectives. The researcher used a quantitative approach based on the descriptive analytical design. To answer the questions of the study, the researcher used the questionnaire as a data collection tool. The questionnaire was sent electronically to faculty members working in colleges and institutes affiliated with Umm Al-Qura University in Makkah Al-Mukarramah, Saudi Arabia. The questionnaire consisted of the three dimensions of digital transformation: organizational; technical; and human resources requirements. The results showed that requirements related to human resources came first with an average of 2.25 then the organizational requirements with an average of 1.95, and in the last, technical requirements came with an average of 1.64. In addition, some suggestions were given by the participants (faculty members) related to the mechanism that could contribute to implementing digital transformation at Saudi universities. Likewise, at the end of the study, the researcher has given some suggestions related to the implementation of digital transformation requirements at Saudi universities.

Development of security windows by smart homes (스마트홈과 연동하는 안전 방범창의 개발)

  • Dahee Jeon;Dwwit Jeon;Woohyeon Hwang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.193-194
    • /
    • 2024
  • 스마트홈과 연동하는 안전한 방범창은 외부의 침입자를 차단하고 주거 내의 물품 도난 및 개인의 신변을 보호하기 위한 안전설비로 다양한 형태의 방범창이 존재한다. 스마트홈은 건물 내의 센서가 화재를 감지하면 방범창 내부의 원격시스템이 자동으로 방범창을 매우 짧은 시간 안에 개방할 수 있도록 설계한다. 화재 등 재난시 상하부 방법창이 자동으로 개폐되도록 랙피니언을 이용하여 방범창의 위쪽 창틀을 상승시켜 창살이 움직일 수 있도록 개방하고 동시에 아래쪽 창틀이 회전하도록 구성하여 화재 및 폭우 등에 인명피해를 줄일 수 있도록 설계한다. 스마트홈 시스템과의 연계로 재난을 미리 감지하고 탈출구를 개방한다면 신속하고 안전한 대피가 가능하고, 기존의 프레임 부분 변경에 간단한 시스템만 변경하여 적용할 수 있어, 간단한 구조로 설치할 수 있고 낮은 비용으로 스마트홈을 구성할 수 있다. 특히 스마트홈과 연동하여 재난을 미리 감지하고 탈출구를 개방함으로써 신속하고 안전한 대피가 가능하여 다양한 재난을 대비할 수 있다.

  • PDF

Design of Real-Time Voice Phishing Detection Techniques using KoBERT (KoBERT를 활용한 실시간 보이스피싱 탐지기법 개념설계)

  • Yeong Jin Kim;Byoung-Yup Lee;Ah Reum Kang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.95-96
    • /
    • 2024
  • 본 논문은 금융 범죄 중 하나인 보이스피싱을 실시간으로 예방하기 위한 탐지 기법을 제안한다. 제안된 모델은 수화기에 출력되는 음성을 녹음하고 네이버 CSR(Cloud Speech Recognition)을 통해 텍스트 파일로 변환한 후 딥러닝 기반의 KoBERT를 바탕으로 다양한 보이스피싱 패턴을 학습하여 실시간 환경에서의 신속하고 정확한 탐지를 위해 실제 통화 데이터를 적절하게 처리하여, 이를 통해 효과적인 보이스피싱 예방에 도움을 줄 것으로 예상된다.

  • PDF

Hints based Approach for UML Class Diagrams

  • Sehrish Abrejo;Amber Baig;Adnan Asghar Ali;Mutee U Rahman;Aqsa Khoso
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.180-186
    • /
    • 2024
  • A common language for modelling software requirements and design in recent years is Unified Modeling Language (UML). Essential principles and rules are provided by UML to help visualize and comprehend complex software systems. It has therefore been incorporated into the curriculum for software engineering courses at several institutions all around the world. However, it is commonly recognized that UML is challenging for beginners to understand, mostly owing to its complexity and ill-defined nature. It is unavoidable that we need to comprehend their preferences and issues considerably better than we do presently in order to approach the problem of teaching UML to beginner students in an acceptable manner. This paper offers a hint based approach that can be implemented along with an ordinary lab task. Some keywords are heighted to indicate class diagram component and make students to understand the textual descriptions. The experimental results indicate significant improvement in students learning skills. Furthermore, majority of students also positively responded to the survey conducted in the end experimental study.

React-based login system design using Spring Boot Security and JWT (스프링 부트 Security와 JWT를 통한 React 기반 로그인 시스템 설계)

  • Youngchan Lee;Minsung Kim;Hyunwoo You;MinJae Kim;Hong Min
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.45-46
    • /
    • 2024
  • 스프링 부트는 개발 및 실행 환경 설정이 간편하기 때문에 백엔드 개발에 활용되는 프레임워크이고 React는 프론트엔드 개발에 활용되는 프레임워크이다. 본 논문에서는 스프링 부트와 React를 사용하는 웹 응용에서 로그인 시스템 구축 시 JWT를 활용하는 방법과 구조에 관해 설명하였다.

Comparative Analysis of Low-pass Microstrip Filter Performances for Two Different Dielectric Materials

  • Samah Khmailia;Abdelkader MAMI
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.118-122
    • /
    • 2024
  • The dielectric material is a basic element which impacts considerably on a microstrip structure performances. This project demonstrates how filter performances such as gain, bandwidth, return loss and insertion loss change proportionally with substrate material variation. The RT/Duroid 5880 and the FR-4 are two dielectric materials proposed as substrates of a low pass microstrip filter. The design and simulation are done on ADS software. The transmission and reflection characteristics show that the RT/ Duroid 5880 as a dielectric substrate permits to obtain better performance as compared to the FR-4 substrate.

A Generalized Multicarrier Communication System - Part II: The T-OFDM System

  • Imran Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.21-29
    • /
    • 2024
  • Precoding of the orthogonal frequency division multiplexing (OFDM) with Walsh Hadamard transform (WHT) is known in the literature. Instead of performing WHT precoding and inverse discrete Fourier transform separately, a product of two matrix can yield a new matrix that can be applied with lower complexity. This resultant transform, T-transform, results in T-OFDM. This paper extends the limited existing work on T-OFDM significantly by presenting detailed account of its computational complexity, a lower complexity receiver design, an expression for PAPR and its cumulative distribution function (cdf), sensitivity of T-OFDM to timing synchronization errors, and novel analytical expressions signal to noise ratio (SNR) for multiple equalization techniques. Simulation results are presented to show significant improvements in PAPR performance, as well improvement in bit error rate (BER) in Rayleigh fading channel. This paper is Part II of a three-paper series on alternative transforms and many of the concepts and result refer to and stem from results in generalized multicarrier communication (GMC) system presented in Part I of this series.

Experiment in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.54-60
    • /
    • 2024
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is showed with experiment in feasibility.

Design and Implementation of Secure VoIP based on VPN (VPN기반의 안전한 VoIP 시스템 설계 및 구현)

  • Bang, Je-Wan;Park, Jung-Yong;Kwon, Ji-Woong;Lee, Sang-Jin;Ryu, Dae-Hyun
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.1021-1024
    • /
    • 2007
  • VoIP 서비스는 인터넷을 기반으로 하므로 인터넷망에서 발생하는 보안 위험이 내재해 있고, 서비스가 실시간으로 이루어진다는 특성으로 인해 기존의 보안 솔루션으로 이러한 보안 위험을 해소하기는 어렵다. 따라서 VoIP 망 구축 초기단계부터 정보보호를 고려하여 보안대책을 세우고 이를 반영하는 것이 비용과 보안 효과 측면에서 바람직하다. 본 논문에서는 상용 VPN 제품에 공개 프로젝트인 SIP VoIP Gateway 'Asterisk'을 연동하여 사용자 인증과 데이터 기밀성을 효과적으로 수행하기 위한 VoVPN(Voice over Virtual Private Network)을 설계하고 구현하였다.