• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.031 seconds

Model Multiplicity (UML) Versus Model Singularity in System Requirements and Design

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.103-114
    • /
    • 2021
  • A conceptual model can be used to manage complexity in both the design and implementation phases of the system development life cycle. Such a model requires a firm grasp of the abstract principles on which a system is based, as well as an understanding of the high-level nature of the representation of entities and processes. In this context, models can have distinct architectural characteristics. This paper discusses model multiplicity (e.g., unified modeling language [UML]), model singularity (e.g., object-process methodology [OPM], thinging machine [TM]), and a heterogeneous model that involves multiplicity and singularity. The basic idea of model multiplicity is that it is not possible to present all views in a single representation, so a number of models are used, with each model representing a different view. The model singularity approach uses only a single unified model that assimilates its subsystems into one system. This paper is concerned with current approaches, especially in software engineering texts, where multimodal UML is introduced as the general-purpose modeling language (i.e., UML is modeling). In such a situation, we suggest raising the issue of multiplicity versus singularity in modeling. This would foster a basic appreciation of the UML advantages and difficulties that may be faced during modeling, especially in the educational setting. Furthermore, we advocate the claim that a multiplicity of views does not necessitate a multiplicity of models. The model singularity approach can represent multiple views (static, behavior) without resorting to a collection of multiple models with various notations. We present an example of such a model where the static representation is developed first. Then, the dynamic view and behavioral representations are built by incorporating a decomposition strategy interleaved with the notion of time.

The Accessibility of Taif University Blackboard for Visually Impaired Students

  • Alnfiai, Mrim;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.258-268
    • /
    • 2021
  • Online learning systems are becoming an effective educational medium for many universities. The accessibility of online learning system in universities means that every student, including the visually impaired, is able use all the site's services. This research focuses on investigating the accessibility of online learning systems for visually impaired users. The paper purpose is to understand the perception of visually impaired undergraduate students towards Blackboard's accessibility and to make recommendations for a new Blackboard design with accessible features that support their needs. Impact of a new Blackboard design with accessible features on visually impaired students, using Taif University students as a case study is evaluated in this paper, as it is similar to most learning systems used by Saudi universities. A study on Taif University's utilization of Blackboard was conducted using mixed method approaches (an automatic tool and a user study). In the first phase, Taif's use of Blackboard was evaluated by the web accessibility tool called AChecker. In the second phase, we conducted a user study to verify previously discovered accessibility challenges to fully assess them according to the accessibility and usability guidelines. In this study, the accessibility of Taif University's Blackboard was evaluated by thirteen visually impaired undergraduate students. The results of the study show that Blackboard has accessibility issues, which are confusing navigation, incompatibility with assistive technologies, untitled pages or parts, unclear identification for visual elements, and inaccessible PDF files. This paper also introduces a set of recommendations that aim to improve the accessibility of Blackboard and other educational websites developed for this population. It also highlights the serious need for universities to enhance web accessibility for online learning systems for students with disabilities.

The Features of Ukrainian Media Art in a Global Context

  • Hridyayeva, Tamara O.;Kohut, Volodymyr O.;Tokar, Maryna I.;Stanychnov, Oleg O.;Helytovych, Andrii A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.229-240
    • /
    • 2021
  • The article seeks to explore Ukrainian media art and its features in a global context. In particular, it performs an in-depth analysis of the stages of its development from video art of the 1990s, media installations of the 2000s, and to various digital and VR technologies today. Due to historical circumstances, the development of media art was quite rapid, as young artists sought to gain new experience in media art. Most often, their experience was broadened through international cooperation and studying abroad. The paper analyzes the presentation of Ukrainian media art outside the country during 1993-2020 and distinguishes the main thematic areas of the artists' work. It examines how artists present and reveal the peculiarities of the Ukrainian worldview, aesthetics, and culture through the problematization of certain aspects and themes in their work. Specifically, among the principal topics which are problematized in the work of media artists are a sensory experience, limited sensory capabilities, gender issues, the Chernobyl tragedy, the development of utopian models of the city, and global communication. The leading themes of Ukrainian artists also include revolution and war. Notably, political and social sentiments determine the unique energy and vitality of contemporary Ukrainian art, create a revolutionary creative environment, and unite media artists in group art projects. It is concluded that by showing, exhibiting, and presenting them outside the country, artists shape the image of Ukrainian art in a global context.

Design and Implementation of Cyber Warfare Training Data Set Generation Method based on Traffic Distribution Plan (트래픽 유통계획 기반 사이버전 훈련데이터셋 생성방법 설계 및 구현)

  • Kim, Yong Hyun;Ahn, Myung Kil
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.71-80
    • /
    • 2020
  • In order to provide realistic traffic to the cyber warfare training system, it is necessary to prepare a traffic distribution plan in advance and to create a training data set using normal/threat data sets. This paper presents the design and implementation results of a method for creating a traffic distribution plan and a training data set to provide background traffic like a real environment to a cyber warfare training system. We propose a method of a traffic distribution plan by using the network topology of the training environment to distribute traffic and the traffic attribute information collected in real and simulated environments. We propose a method of generating a training data set according to a traffic distribution plan using a unit traffic and a mixed traffic method using the ratio of the protocol. Using the implemented tool, a traffic distribution plan was created, and the training data set creation result according to the distribution plan was confirmed.

Internet Service Evaluation System: A Design Science Research

  • Babunji, Lujen;Alzahrani, Shahad;Almarghalani, Shada;Babour, Amal;Bitar, Hind
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.35-44
    • /
    • 2022
  • The Internet is extremely important to accomplish numerous items, from education to businesses and entertainment. Therefore, the quality of its performance must be efficient. Nowadays, there is a lack of information available for users to choose a suitable Internet service. What information is available might be insufficient, inaccurate, or regularly updated. Accordingly, there is a need to develop an electronic system that enables users to evaluate their current Internet service subscription. Several factors are used as evaluation criteria in the system that affect users' decisions. In this paper, a prototype of a design science research project is proposed to address a few objectives. First, it can help Internet service users in Saudi Arabia to make the best decision for themselves regarding Internet services subscriptions. Second, it can assist the Saudi government to seek one of the 2030 vision goals: the digital transformation that depends on having a good Internet connection. The proposed solution is a promising one that would help Internet service users to make the best decision for themselves and choose the best Internet service that fits their needs. A qualitative method has been used to evaluate the efficiency and the utility of the proposed system prototype. The results showed the extent of participants' acceptance of the Internet Service Evaluation System.

Analyzing Gifted Students' Social Behavior on Social Media at COVID-19 Quarantine

  • Khayyat, Mashael;Sulaimani, Mona;Bukhri, Hanan;Alamiri, Faisal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.7-14
    • /
    • 2022
  • COVID-19 has caused a global disturbance, increased anxiety, and panic, eliciting diverse reactions. While its cure has not been discovered, new infection cases and fatalities are being recorded daily. The focus of the present study was to analyze the reaction of gifted undergraduate students on social media during the quarantine period of the COVID-19. A special group of gifted students, who joined the program of attracting and nurturing talents at the University of Jeddah, University students as were the target sample of this study. To analyze online reactions during the pandemic; the choice of university students was arrived at as they are perceived to be gifted academically. Hence, the analysis of the impacts on their behavior on social media use is imperative. This study presented accurate and consistent data on the effects of social media using Twitter platforms on gifted students during the quarantine occasioned by the COVID-19 pandemic. The behavior of learners due to during the use of social media was extensively explored and results analyzed. The study was carried out between April and May 2020 (quarantine period in Saudi Arabia) to establish whether the online behavior of gifted students reflects positive or negative feelings. The methods used in conducting this study the research were online interviews and scraping participants' Twitter accounts (where most of the online activities and studies take place). The study employed the Activity theory to analyze the behavior of gifted students on social media. The sample size used was 60 students, and the analysis of their behavior was based on Activity theory Overall, the results showed proactive, positive behavior for coping with a challenging situation, educating society, and entertaining. Finally, this study recommends investing in gifted students due to their valuable problem-solving skills that can help handle global pandemics efficiently.

Design and Implementation of High-Performance Cryptanalysis System Based on GPUDirect RDMA (GPUDirect RDMA 기반의 고성능 암호 분석 시스템 설계 및 구현)

  • Lee, Seokmin;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1127-1137
    • /
    • 2022
  • Cryptographic analysis and decryption technology utilizing the parallel operation of GPU has been studied in the direction of shortening the computation time of the password analysis system. These studies focus on optimizing the code to improve the speed of cryptographic analysis operations on a single GPU or simply increasing the number of GPUs to enhance parallel operations. However, using a large number of GPUs without optimization for data transmission causes longer data transmission latency than using a single GPU and increases the overall computation time of the cryptographic analysis system. In this paper, we investigate GPUDirect RDMA and related technologies for high-performance data processing in deep learning or HPC research fields in GPU clustering environments. In addition, we present a method of designing a high-performance cryptanalysis system using the relevant technologies. Furthermore, based on the suggested system topology, we present a method of implementing a cryptanalysis system using password cracking and GPU reduction. Finally, the performance evaluation results are presented according to demonstration of high-performance technology is applied to the implemented cryptanalysis system, and the expected effects of the proposed system design are shown.

Virtual and Augmented Reality Technologies in the Organization of Modern Library Media Space

  • Horban, Yurii;Gaisynuik, Nataliya;Dolbenko, Tetiana;Karakoz, Olena;Kobyzhcha, Nataliia;Kulish, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.375-380
    • /
    • 2022
  • Virtual and augmented reality technologies provide access to learning materials and improve the organization of a modern library's media space. This article aims to identify the significance and role of virtual and augmented reality technologies in the modern library's media space organization. Methodology. The research uses a university library case study methodology to empirically investigate virtual and augmented reality technologies. Results. Virtual and augmented reality technologies provide research and improve learning outcomes by engaging students and learners with significant interest in such technologies. Libraries offer users the opportunity to create their VR content through available software. Students can test their VR content in the libraries' labs. Libraries support access to a variety of virtual and augmented reality content. The content is accessed using "virtual reality headsets" for viewing and workstations with "authoring software and loanable 360 cameras" for creating. The library lab is a space to support students' digital creativity and research through virtual and augmented reality. There are 3D Design Labs within the libraries as a medium to large group design learning spaces with virtual reality technology. Libraries form a media space where users can create videos, podcasts, portfolios, edit media, and book tours, and students and researchers can explore different scientific knowledge. In this way, technology ensures that risks in learning are minimized as opposed to hands-on seminars and classes.

Delay and Doppler Profiler based Channel Transfer Function Estimation for 2×2 MIMO Receivers in 5G System Targeting a 500km/h Linear Motor Car

  • Suguru Kuniyoshi;Rie Saotome;Shiho Oshiro;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.8-16
    • /
    • 2023
  • In Japan, high-speed ground transportation service using linear motors at speeds of 500 km/h is scheduled to begin in 2027. To accommodate 5G services in trains, a subcarrier spacing frequency of 30 kHz will be used instead of the typical 15 kHz subcarrier spacing to mitigate Doppler effects in such high-speed transport. Furthermore, to increase the cell size of the 5G mobile system, multiple base station antennas will transmit identical downlink (DL) signals to form an expanded cell size along the train rails. In this situation, the forward and backward antenna signals are Doppler-shifted in opposite directions, respectively, so the receiver in the train may suffer from estimating the exact Channel Transfer Function (CTF) for demodulation. In a previously published paper, we proposed a channel estimator based on Delay and Doppler Profiler (DDP) in a 5G SISO (Single Input Single Output) environment and successfully implemented it in a signal processing simulation system. In this paper, we extend it to 2×2 MIMO (Multiple Input Multiple Output) with spatial multiplexing environment and confirm that the delay and DDP based channel estimator is also effective in 2×2 MIMO environment. Its simulation performance is compared with that of a conventional time-domain linear interpolation estimator. The simulation results show that in a 2×2 MIMO environment, the conventional channel estimator can barely achieve QPSK modulation at speeds below 100 km/h and has poor CNR performance versus SISO. The performance degradation of CNR against DDP SISO is only 6dB to 7dB. And even under severe channel conditions such as 500km/h and 8-path inverse Doppler shift environment, the error rate can be reduced by combining the error with LDPC to reduce the error rate and improve the performance in 2×2 MIMO. QPSK modulation scheme in 2×2 MIMO can be used under severe channel conditions such as 500 km/h and 8-path inverse Doppler shift environment.

An Encryption Algorithm Based on Light-Weight SEED for Accessing Multiple Objects in RFID System (RFID 시스템에서 다중 객체를 지원하기 위한 경량화된 SEED 기반의 암호화 알고리즘)

  • Kim, Ji-Yeon;Jung, Jong-Jin
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.3
    • /
    • pp.41-49
    • /
    • 2010
  • Recently, RFID systems are spreading in various industrial areas faster but cause some serious problems of information security because of its unstable wireless communication. Moreover, traditional RFID systems have a restriction that one tag per each application object. This restriction deteriorates their usability because it is difficult to distinguish many tags without some kind of effort. Therefore, efficient information sharing of objects based on information security has to be studied for more spreading of RFID technologies. In this paper, we design a new RFID tag structure for supporting multiple objects which can be shared by many different RFID applications. We also design an encryption/decryption algorithm to protect the identifying information of objects stored in our tag structure. This algorithm is a light revision of the existing SEED algorithm which can be operated in RFID tag environment. To evaluate the performance of our algorithm, we measure the encryption and decryption times of this algorithm and compare the results with those of the original SEED algorithm.