• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.029 seconds

Determinants of Writing Research According to International Standards in Web of Science Journals

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.94-102
    • /
    • 2021
  • The study aimed to define all the main determinants of writing a research paper in an integrated manner within the requirements of the science network journals, by introducing scientific research and the steps of writing a research paper, starting from choosing the title to writing the abstract, identifying the research problem, questions, importance and objectives of the study, how to choose previous studies, research methodology and tools, discussion and results In addition to determining the acceptable percentage of plagiarism for science network journals, recommendations, choosing appropriate references and choosing the appropriate references, in addition to determining the acceptable percentage of plagiarism for the journals of the Network of Science, the researcher used the method of analytical investigative research to find out the axes of the study and analyze different reference citation methods to deal with different sources of information (articles-books-theses-conference works-reviews), In addition to studying the most important international programs for measuring plagiarism ratios that are accredited within the journals of the Science Network, and the study concluded that the researcher must present original and innovative results, add an integrated and logical work, take into account all the scientific conditions in the design of the research, its steps and ethics, and take into account the international standards in citing Reference, taking into account the rates of plagiarism within Web of Science journals.

Application of surf-riding and broaching mode based on IMO second-generation intact stability criteria for previous ships

  • Shin, Dong Min;Moon, Byung Young;Chung, Jaeho
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.13 no.1
    • /
    • pp.545-553
    • /
    • 2021
  • International Maritime Organization (IMO) have recently discussed the technical problems related to the second-generation intact stability criteria of ships. The second-generation intact stability criteria refer to five modes of vulnerability when the ship sailing in the ocean. In this study, we described a method to verify the criteria of the surf-riding/broaching. In case that Lv1 (Level 1) vulnerability criteria is not satisfied based on the relatively simple calculation using the Froude number (Fn), we presented the calculation procedure for the Lv2 (Level 2) criteria considering the hydrodynamics in waves. The results were reviewed based on the data for given previous ships. In absence of ship-specific data, a similar Lv2 result was confirmed by comparing the result obtained by calculating the added mass with the case where the added mass was 10% of the ship mass. This result will contribute to basic ship design process according to the IMO draft regulation.

The Study of Selecting a Test Area for Validating the Proposal Specification of InSAS(Interferometric Synthetic Aperture Sonar) (간섭계측 합성개구소나 성능 평가를 위한 해상 시험장 선정에 관한 연구)

  • Park, Yosup;Kim, Seong Hyeon;Koh, Jieun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.329-338
    • /
    • 2022
  • This paper provides a case study of development testing and evaluation of design goal of Interferometric SAS (Synthetic Aperture Sonar) system that is developing supported by Civil-Military Technology Cooperation Center in offshore fields. For Deep water operating capabilities evaluation, We have surveyed candidate field, bathymetric mapping and target identification over 200 m depth, East Sea. In testing phase, We have provided environmental information of testing field include water column, seabed and weather condition in real time. And to compare excellency of developing InSAS, we have gather commercial imaging sonar system data with same target. This case study will support the Test Readiness Review of future underwater surveillance system developing via investigate marine testing field environment, testing facilities and planning.

Potential of Digital Solutions in the Manufacturing Sector of the Russian Economy

  • Baurina, Svetlana;Pashkovskaya, Margarita;Nazarova, Elena;Vershinina, Anna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.333-339
    • /
    • 2022
  • The purpose of the article is to identify priority trends of technological innovations and strategic opportunities for using the smart potential to the benefit of the Russian industrial production development in the context of digital transformation. The article substantiates the demand for technological process automation at industrial enterprises in Russia and considers the possibilities of using artificial intelligence and the implementation of smart manufacturing in the industry. The article reveals the priorities of the leading Russian industrial companies in the field of digitalization, namely, an expansion of the use of cloud technologies, predictive analysis, IaaS services (virtual data storage and processing centers), supervisory control, and data acquisition (SCADA), etc. The authors give the characteristics of the monitoring of the smart manufacturing systems development indicators in the Russian Federation, conducted by Rosstat since 2020; presents projected data on the assessment of the required resources in relation to the instruments of state support for the development of smart manufacturing technologies for the period until 2024. The article determines targets for the development of smart technologies within the framework of the Federal Project "Digital Technologies".

Beyond SDLC: Process Modeling and Documentation Using Thinging Machines

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.191-204
    • /
    • 2021
  • The software development life cycle (SDLC) is a procedure used to develop a software system that meets both the customer's needs and real-world requirements. The first phase of the SDLC involves creating a conceptual model that represents the involved domain in reality. In requirements engineering, building such a model is considered a bridge to the design and construction phases. However, this type of model can also serve as a basic model for identifying business processes and how these processes are interconnected to achieve the final result. This paper focuses on process modeling in organizations, per se, beyond its application in the SDLC when an organization needs further documentation to meet its growth needs and address regular changes over time. The resultant process documentation is created alongside the daily operations of the business process. The model provides visualization and documentation of processes to assist in defining work patterns, avoiding redundancy, or even designing new processes. In this paper, a proposed diagrammatic representation models each process using one diagram comprising five actions and two types of relations to build three levels of depiction. These levels consist of a static description, events, and the behavior of the modeled process. The viability of a thinging machine is demonstrated by re-modeling some examples from the literature.

Evaluating Psychological Experiences of Saudi Students in Distance-Learning

  • Almaleki, Deyab A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.173-181
    • /
    • 2021
  • The Ministry of Education in Saudi Arabia encourages Saudi students to continue their education at Saudi universities or abroad. Currently, an estimated 1,282,140 Saudi students are studying at Saudi universities. The extent of the research so far has not focused on Saudi student experiences, but it has shown that even a single negative event can dramatically reduce the chances of a student completing a degree. Thus, more research is necessary to identify and describe the context and obstacles (environmental and psychological) that Saudi students face. The evaluation was multifaceted to capture not only performance outcomes, but also other factors that have been suggested by research as influential to students' ability, such as the environmental, cultural, and psychological risks for graduation that Saudi students self-report. A single group pretest (survey) design was used in this study. Findings suggest depression stress and college stress predict stress levels, while subjective happiness predicts levels of scientific participations of the sample. Moreover, depression stress shows more consistency with hours spent on the internet for study purposes. These results should be considered in study support programs both institutionally and geopolitically by universities and governments.

Feature Selection with Ensemble Learning for Prostate Cancer Prediction from Gene Expression

  • Abass, Yusuf Aleshinloye;Adeshina, Steve A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.526-538
    • /
    • 2021
  • Machine and deep learning-based models are emerging techniques that are being used to address prediction problems in biomedical data analysis. DNA sequence prediction is a critical problem that has attracted a great deal of attention in the biomedical domain. Machine and deep learning-based models have been shown to provide more accurate results when compared to conventional regression-based models. The prediction of the gene sequence that leads to cancerous diseases, such as prostate cancer, is crucial. Identifying the most important features in a gene sequence is a challenging task. Extracting the components of the gene sequence that can provide an insight into the types of mutation in the gene is of great importance as it will lead to effective drug design and the promotion of the new concept of personalised medicine. In this work, we extracted the exons in the prostate gene sequences that were used in the experiment. We built a Deep Neural Network (DNN) and Bi-directional Long-Short Term Memory (Bi-LSTM) model using a k-mer encoding for the DNA sequence and one-hot encoding for the class label. The models were evaluated using different classification metrics. Our experimental results show that DNN model prediction offers a training accuracy of 99 percent and validation accuracy of 96 percent. The bi-LSTM model also has a training accuracy of 95 percent and validation accuracy of 91 percent.

The Effect of a Web Quests Instructional Program on Developing Saudi EFL Learning Habits

  • Alsamadani, Hashem A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.220-224
    • /
    • 2022
  • The teacher is considered the cornerstone of the educational process; the quality of education is linked mainly to teachers who perform such a necessary process. The shift in pedagogical thinking has led to progress in looking at the teacher's roles; he is no longer transferring knowledge to learners, but instead, he has become a mentor, a mediator, a planner, an intellect, and a leader. If we analyze these missions from the perspective of mental habits, we will see that they require the teacher to develop the skills of perseverance, listening comprehension, thinking flexibly, controlling emotions, self-confidence, communication skills, and other essential skills. The current research verifies the effectiveness of an instructional program based on web quests in developing habits of the mind of English language students. The study employed a quasi-experimental design. The sample consisted of 46 male students representing two classes. They were assigned randomly into an experimental group (n=24) and a control group (n=22). They were undergraduate students majoring in the English language. The findings showed a statistically significant difference in the mean scores of the experimental and control groups favoring the experimental group. The study concludes with some recommendations to differentiate teaching techniques in EFL classrooms.

Animated Game-Based Learning of Data Structures In Professional Education

  • Waseemullah, Waseemullah;Kazi, Abdul Karim;Hyder, Muhammad Faraz;Basit, Faraz Abdul
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.1-6
    • /
    • 2022
  • Teaching and learning are one of the major issues during this pandemic (COVID-19). Since the pandemic started, there are many changes in teaching and learning styles as everything related to studies started online. Game-Based Learning has got remarkable importance in the educational system and pedagogy as an effective way of increasing student inspiration and engagement. In this field, most of the work has been carried out in digital games. This research uses an Animated Game-Based Learning design in enhancing student engagement and perception of learning. In teaching Computer Science (CS) concepts in higher education, to enhance the pedagogy activities in CS concepts, more specifically the concepts of "Data Structures (DS)" i.e., Array, Stack, and Queue concepts are focused. This study aims to observe the difference in students' learning with the use of different learning methods i.e., the traditional learning (TL) method and the Animated Game-Based Learning (AGBL) Method. The experimental results show that learning DS concepts has been improved by the AGBL method as compared to the TL method.

Role of Social Enterprises to Overcome Food Insecurity: Evidence from Ethiopia

  • BEKELE, Eshetu Tefera
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.11
    • /
    • pp.11-19
    • /
    • 2022
  • Purpose: Food security is a dynamic concept, which has continuously integrated new dimensions and levels of analysis over the years; this reflects the wider recognition of its complexities in research and public policy issues. Food insecurity is a major challenge for Ethiopia and for many African countries. This paper aims to identify the roles of social enterprises to overcome food insecurity. Research design, data and methodology: The research has focused on one primary question. What are the role of social enterprises to overcome food insecurity? The survey questionnaire was developed and an interview was made using enumerators. A total sample size of 400 sample households was selected randomly using the method of sampling with probability proportionate to size. Descriptive and inferential statistical analysis methods were used for data analysis. Results: Results of the regression analysis show that all of the hypothesized independent variables are significantly and positively affecting post membership income of the sample households. Conclusions: all stakeholders as government, development actors and academic institutions should closely monitor and support social enterprises/cooperatives technically, financially and materially. By doing so, the full potential and contributions of social enterprises in reducing unemployment and solving the social and environmental problems can be effective.