• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.029 seconds

Integrated Power Optimization with Battery Friendly Algorithm in Wireless Capsule Endoscopy

  • Mehmood, Tariq;Naeem, Nadeem;Parveen, Sajida
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.338-344
    • /
    • 2021
  • The recently continuous enhancement and development in the biomedical side for the betterment of human life. The Wireless Body Area Networks is a significant tool for the current researcher to design and transfer data with greater data rates among the sensors and sensor nodes for biomedical applications. The core area for research in WBANs is power efficiency, battery-driven devices for health and medical, the Charging limitation is a major and serious problem for the WBANs.this research work is proposed to find out the optimal solution for battery-friendly technology. In this research we have addressed the solution to increasing the battery lifetime with variable data transmission rates from medical equipment as Wireless Endoscopy Capsules, this device will analyze a patient's inner body gastrointestinal tract by capturing images and visualization at the workstation. The second major issue is that the Wireless Endoscopy Capsule based systems are currently not used for clinical applications due to their low data rate as well as low resolution and limited battery lifetime, in case of these devices are more enhanced in these cases it will be the best solution for the medical applications. The main objective of this research is to power optimization by reducing the power consumption of the battery in the Wireless Endoscopy Capsule to make it battery-friendly. To overcome the problem we have proposed the algorithm for "Battery Friendly Algorithm" and we have compared the different frame rates of buffer sizes for Transmissions. The proposed Battery Friendly Algorithm is to send the images on average frame rate instead of transmitting the images on maximum or minimum frame rates. The proposed algorithm extends the battery lifetime in comparison with the previous baseline proposed algorithm as well as increased the battery lifetime of the capsule.

A Design of File Leakage Response System through Event Detection (이벤트 감지를 통한 파일 유출 대응 시스템 설계)

  • Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.7
    • /
    • pp.65-71
    • /
    • 2022
  • With the development of ICT, as the era of the 4th industrial revolution arrives, the amount of data is enormous, and as big data technologies emerge, technologies for processing, storing, and processing data are becoming important. In this paper, we propose a system that detects events through monitoring and judges them using hash values because the damage to important files in case of leakage in industries and public places is serious nationally and property. As a research method, an optional event method is used to compare the hash value registered in advance after performing the encryption operation in the event of a file leakage, and then determine whether it is an important file. Monitoring of specific events minimizes system load, analyzes the signature, and determines it to improve accuracy. Confidentiality is improved by comparing and determining hash values pre-registered in the database. For future research, research on security solutions to prevent file leakage through networks and various paths is needed.

Latest Information Technologies in the UK Adults Education System

  • Tverezovska, Nina;Bilyk, Ruslana;Rozman, Iryna;Semerenko, Zhanna;Orlova, Nataliya;Vytrykhovska, Oksana;Oros, Ildiko
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.25-34
    • /
    • 2022
  • Today, further education of adults in the UK is one of the developing areas of continuing education. The Open University with distance learning, in the process of which innovative forms and methods based on computer and telecommunication technologies are used, is particularly successful in the organization of additional education of the adult population. The advantages of distance learning, multimedia - the latest information technologies, which provide the combination of graphic images, video, sound with the help of modern computer tools, are noted. The basic principles and forms underlying the technologies and forms of work with the elderly are defined. The international experience of implementing "Universities of the Third Age" is summarized. The most widespread approach in adult education in Great Britain is informational. The use of computer technologies motivates a new paradigm in educational methods and strategies, which requires new approaches, forms of learning, and innovative ways of delivering educational materials to adult learners. Information technologies have gained great popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, online search for information for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a single scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The information technology of synchronous distance learning "online" has gained considerable popularity in the educational process today. A promising direction is the use of multimedia technologies in educational activities to create a design of a virtual computer environment by decoding audiovisual information.

Aesthetic Education of Young People As a Necessary Condition for Cultural Development of the Individual in Modern Conditions of the Information Society

  • Shevtsova, Olena;Tiutiunnyk, Mariia;Bosyi, Oleksandr;Zharovska, Olena;Patsaliuk, Iryna;Bielikova, Valentyna;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.207-213
    • /
    • 2022
  • The article reveals the problems of aesthetic education of young people as a necessary condition for the cultural development of the individual in the modern conditions of the information society. Aesthetic education should contribute to the formation of a creatively active personality. The basis of aesthetic education of young people in the modern conditions of the information society is the core of artistic culture - art as a unique form of public consciousness that contributes to the spiritual development and improvement of the inner world of a person. The main tasks of aesthetic education are highlighted. It is focused on the formation of aesthetic consciousness and aesthetic behavior of the individual. The formation of true aesthetic and spiritual values of students is impossible without a deep awareness of the national foundations of culture, which combines science (including technology), education, art, morality, way of life and worldview, and most importantly its information component - information culture. The effectiveness of aesthetic education of students largely depends on the skillful use of various methods and means by teachers. Aesthetic education of students involves a qualitative change in the level of their aesthetic culture in the modern conditions of the information society. In the era of information and computer technologies, the main Institute for aesthetic education of young people, as a necessary condition for the cultural development of the individual, is mass media. Television stands out especially because it has several information series (audio and video sequence), multiplied by the efficiency of providing information that increases several times compared to paper media, which allows you to report directly during the event.

A Out-of-Bounds Read Vulnerability Detection Method Based on Binary Static Analysis (바이너리 정적 분석 기반 Out-of-Bounds Read 취약점 유형 탐지 연구)

  • Yoo, Dong-Min;Jin, Wen-Hui;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.687-699
    • /
    • 2021
  • When a vulnerability occurs in a program, it is documented and published through CVE. However, some vulnerabilities do not disclose the details of the vulnerability and in many cases the source code is not published. In the absence of such information, in order to find a vulnerability, you must find the vulnerability at the binary level. This paper aims to find out-of-bounds read vulnerability that occur very frequently among vulnerability. In this paper, we design a memory area using memory access information appearing in binary code. Out-of-bounds Read vulnerability is detected through the designed memory structure. The proposed tool showed better in code coverage and detection efficiency than the existing tools.

The New Ecosystem of Cross-border E-Commerce among Korea, China and Japan Based on Blockchain

  • Shen, Xiang-Dong;Chen, Xi;Ji, Ran;Wu, Ren-Hong
    • Journal of Korea Trade
    • /
    • v.24 no.5
    • /
    • pp.87-105
    • /
    • 2020
  • Purpose - The purpose of the study is to propose a theoretical framework of cross-border e-commerce ecosystems based on blockchain technology. The ecosystem includes five systems, namely, crossborder supply chain intelligent system, cross-border logistics system, cross-border payment system, cross-border product quality traceability system and cross-border customs supervision system. Design/methodology - This study firstly derived the main improvement factors for the new ecosystem based on blockchain through prior research and expert interviews on cross-border e-commerce. Then explored the use of virtue of decentralization, anti-counterfeiting traceability, consensus mechanism, smart contract and other means of the core technology of blockchain to overcome the bottleneck of cross-border e-commerce development among Korea, China, and Japan. Finally, proposed valuable implications in both theoretical and practical perspectives. Findings - As a result, we combined with the problems existing in cross-border e-commerce among Korea, China and Japan, this paper proposes a solution based on blockchain. On this basis, it constructs a cross-border e-commerce ecosystem among these three countries, including five systems. In addition, we discuss the main problems existing in the current blockchain, such as low transaction concurrency, security loopholes, and inconsistent standards, the corresponding countermeasures are proposed from the technical level, security level and industry standards. Originality/value - This study is the first to apply the blockchain technology to solve the cross-border e-commerce problems in Korea, China and Japan, which is of pioneering significance in both literature and practice. Block chain technology is in the ascendency. This study provides technical solutions for promoting the development of cross-border e-commerce import and export trade between Korea, China and Japan.

Virtual Go to School (VG2S): University Support Course System with Physical Time and Space Restrictions in a Distance Learning Environment

  • Fujita, Koji
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.137-142
    • /
    • 2021
  • Distance learning universities provide online course content. The main methods of providing class contents are on-demand and live-streaming. This means that students are not restricted by time or space. The advantage is that students can take the course anytime and anywhere. Therefore, unlike commuting students, there is no commuting time to the campus, and there is no natural process required to take classes. However, despite this convenient situation, the attendance rate and graduation rate of distance learning universities tend to be lower than that of commuting universities. Although the course environment is not the only factor, students cannot obtain a bachelor's degree unless they fulfill the graduation requirements. In both commuter and distance learning universities, taking classes is an important factor in earning credits. There are fewer time and space constraints for distance learning students than for commuting students. It is also easy for distance learning students to take classes at their own timing. There should be more ease of learning than for students who commute to school with restrictions. However, it is easier to take a course at a commuter university that conducts face-to-face classes. I thought that the reason for this was that commuting to school was a part of the process of taking classes for commuting students. Commuting to school was thought to increase the willingness and motivation to take classes. Therefore, I thought that the inconvenient constraints might encourage students to take the course. In this research, I focused on the act of commuting to school by students. These situations are also applied to the distance learning environment. The students have physical time constraints. To achieve this goal, I will implement a course restriction method that aims to promote the willingness and attitude of students. Therefore, in this paper, I have implemented a virtual school system called "virtual go to school (VG2S)" that reflects the actual route to school.

KAB: Knowledge Augmented BERT2BERT Automated Questions-Answering system for Jurisprudential Legal Opinions

  • Alotaibi, Saud S.;Munshi, Amr A.;Farag, Abdullah Tarek;Rakha, Omar Essam;Al Sallab, Ahmad A.;Alotaibi, Majid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.346-356
    • /
    • 2022
  • The jurisprudential legal rules govern the way Muslims react and interact to daily life. This creates a huge stream of questions, that require highly qualified and well-educated individuals, called Muftis. With Muslims representing almost 25% of the planet population, and the scarcity of qualified Muftis, this creates a demand supply problem calling for Automation solutions. This motivates the application of Artificial Intelligence (AI) to solve this problem, which requires a well-designed Question-Answering (QA) system to solve it. In this work, we propose a QA system, based on retrieval augmented generative transformer model for jurisprudential legal question. The main idea in the proposed architecture is the leverage of both state-of-the art transformer models, and the existing knowledge base of legal sources and question-answers. With the sensitivity of the domain in mind, due to its importance in Muslims daily lives, our design balances between exploitation of knowledge bases, and exploration provided by the generative transformer models. We collect a custom data set of 850,000 entries, that includes the question, answer, and category of the question. Our evaluation methodology is based on both quantitative and qualitative methods. We use metrics like BERTScore and METEOR to evaluate the precision and recall of the system. We also provide many qualitative results that show the quality of the generated answers, and how relevant they are to the asked questions.

The Experimental Study for Variance of Depositation Due to Sediment Volume Concentration of Debris Flow (토석류의 토사체적농도에 따른 퇴적 특성 변화에 관한 실험 연구)

  • Choi, Youngdo;Kim, Sungduk;Lee, Hojin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.15-21
    • /
    • 2022
  • The purpose of this study is to investigate the sedimentation area and runout distance in the downstream when debris flow occurred on a mountain slope through an experimental performance. Super typhoons and torrential rains caused by climate change cause large-scale debris flow disasters in the downstream areas of mountainous areas, mainly where sediments are deposited and flowed downstream. To analyze the characteristics of the sediment deposited downstream, the disposition area and runout distance were investigated through experiments in the case of a straight channel and channel with berm, respectively. As experimental conditions, changes in sediment volume concentration and channel slope, and channel with or without berm, reduction rates in sedimentation area and runout distance were investigated. In the straight channel, the steeper the channel slope and the lower the sedimentation concentration, the sedimentation area and runout distnace were increased. In a channel with berm, the runout distance and sediment area increased as the slope became steeper and the sediment area decreased.

A Study on the Estimation of the Design Flood for Small Catchment in Jirisan (지리산 소하천유역의 홍수량 산정에 대한 고찰)

  • Chang, Hyung Joon;Kim, Seong Goo;Yoon, Young Ho;Kim, Min Ho
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.23-29
    • /
    • 2022
  • The frequency of localized heavy rain is increasing due to the influence of abnormal climate that is rapidly increasing in recent years. As a result, the difficulty of safe water resource management is increasing and human and material damage is increasing. Various countermeasures are being established to reduce the damage caused by localized heavy rain, but small-scale mountain catchments are experiencing many difficulties due to the lack of a basic plan. Therefore in this study the risk of flooding was evaluated using the rainfall-runoff model in the Yu-pyeong catchment national park among national parks in Korea. As a result of the analysis, it was simulated that flooding occurred in the Yu-pyeong catchment of Mt. Jirisan when rainfall with a recurrence frequency of 50 years or more occurred, and it was confirmed that there was a high risk of structures, safety facilities and trails.