• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.034 seconds

Introducing Smart Learning Framework in the Digital World: Towards the Enhancement of Technology-Driven Innovation of Arabic Smart Learning

  • Alkhammash, Eman H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.331-337
    • /
    • 2022
  • Smart learning is augmented with digital, context-aware, and adaptable technologies to encourage students to learn better and faster. To ensure that digital learning is successful and that implementation is efficient, it is critical that the dimensions of digital learning are arranged correctly and that interactions between the various elements are merged in an efficient and optimal manner. This paper builds and discusses a basic framework for smart learning in the digital age, aimed to improve students' abilities and performance in learning. The proposed framework consists of five dimensions: Teacher, Technology, Learner, Digital content, and Evaluation. The Teacher and Learner dimensions operate on two levels: (a) an abstract level to fit in knowledge and skills or interpersonal characteristics and (b) a concrete level in the form of digital devices used by teachers and learners. Moreover, this paper proposes asynchronous online course delivery model. An Arabic smart learning platform has been developed, based on these smart learning core dimensions and the asynchronous online course delivery model, because despite the official status of this language in many countries, there is a lack of Arabic platforms to teach Arabic. Moreover, many non-native Arabic speakers around the world have expressed an interest in learning it. The Arabic digital platform consists of over 70 lessons classified into three competence levels: beginner, intermediate, and advanced, delivered by Arabic experts and Arabic linguists from various Arab countries. The five dimensions are described for the Arabic platform in this paper. Learner dimension is the Arabic and non-Arabic speakers, Teacher dimension is Arabic experts and Arabic linguistics, Technology dimension consists of technology for Arabic platform that includes web design, cloud computing, big data, etc. The digital contents dimension consists of web-based video, records, etc. The evaluation dimension consists of Teachers rating, comments, and surveys.

The Effect of using Gamma Titanium RF Electrodes on the Ablation Volume during the Radiofrequency Ablation Process

  • Mohammed S. Ahmed;Mohamed Tarek El-Wakad;Mohammed A. Hassan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.183-192
    • /
    • 2023
  • Radiofrequency ablation (RFA) is an alternative treatment for liver cancer to the surgical intervention preferred by surgeons. However, the main challenge remains the use of RF for the ablation of large tumours (i.e., tumours with a diameter of >3 cm). For large tumours, RFA takes a large duration in the ablation process compared with surgery, which increases patient pain. Therefore, RFA for large tumours is not preferred by surgeons. The currently materials used in RF electrodes, such as the nickeltitanium alloy (nitinol), are characterized by low thermal and electrical conductivities. On the other hand, the use of materials that have high thermal and electrical conductivities, such as titanium aluminide alloy (gamma titanium), produces more thermal energy for tumours. In this paper, we developed a cool-tip RF electrode model that uses nickel-titanium alloy and replaced it with titanium aluminide alloy by using the finite element model (FEM). The aim of this paper is to study the effect of the thermal and electrical conductivities of gamma titanium on the ablation volume. Results showed that the proposed design of the electrode increased the ablation rate by 1 cm3 /minute and 6.3 cm3/10 minutes, with a decrease in the required time ablation. Finally, the proposed model reduces the ablation time and damages healthy tissue while increasing the ablation volume from 22.5% cm3 to 62.5% cm3 in ten minutes compared to recent studies.

Unveiling a Website Development for Car Inquiry

  • Loay F. Hussein;Islam Abdalla Mohamed Abass;Anis Ben Aissa;Mishaal Hammoud Al-Ruwaili
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.111-125
    • /
    • 2023
  • Due to the car's central role in modern life, the industry has become more fiercely competitive, with each manufacturer doing everything it can to attract buyers with features like plush interiors, comprehensive warranties, and helpful customer service departments. Customers may not have the luxury of buying a new car, so they will have to buy a used car. Nevertheless, in most cases, the customer (car driver) may be deceived about the vehicle information and history and thus will be confused in making his/her decision to purchase. In addition, after all attempts to obtain vehicle information (plate number, model, year of manufacture, number of maintenance times, accidents, etc.), the customer's many attempts may fail. In general, the government records and verifies the information of all cars, even those that pass through their borders. However, there might still be some trouble in obtaining this information. From this standpoint, we will design a website that makes it easier for car drivers, car companies and governments to carry out all the above-mentioned processes. It will also allow users, whether a driver or a car company, to inquire about all vehicle information through detailed and integrated reports on its condition since its entry into the Kingdom of Saudi Arabia until the present time, in addition to information supported by numbers and statistics to ensure the integrity and reliability of the information. This platform will save the trouble of searching for car information for drivers and car companies. It will also help governments keep track of the information of all cars entering and leaving the Kingdom of Saudi Arabia, which will contribute to facilitating the process of viewing the history of any car that has previously entered the Kingdom's borders.

Study on the Development for Traffic Safety Curriculum of Automated Vehicles on Public Roads (실 도로 기반 자율주행자동차 교통안전 교육과정 개발 연구)

  • Jin ho Choi;Jung rae Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.266-283
    • /
    • 2022
  • With the rapid development of autonomous vehicle technology, unexpected accidents are occurring. Therefore, it is necessary to minimize user accident damage through the development of autonomous traffic safety education. Since edge cases, accident type, and risk factor analysis are important for realistic education, overseas case studies and demonstrations were carried out, and based on this, two curriculum for service providers and general users were developed. The service provider curriculum consisted of OEDR, sudden stop, cut-in, take-over, defensive driving, system malfunction, policy and information security education, and the general user curriculum consisted of attention duty, take-over, operating design domain, accidents type, laws, functions, information security education.

A Study on Insider Threat Dataset Sharing Using Blockchain (블록체인을 활용한 내부자 유출위협 데이터 공유 연구)

  • Wonseok Yoon;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.15-25
    • /
    • 2023
  • This study analyzes the limitations of the insider threat datasets used for insider threat detection research and compares and analyzes the solution-based insider threat data with public insider threat data using a security solution to overcome this. Through this, we design a data format suitable for insider threat detection and implement a system that can safely share insider threat information between different institutions and companies using blockchain technology. Currently, there is no dataset collected based on actual events in the insider threat dataset that is revealed to researchers. Public datasets are virtual synthetic data randomly created for research, and when used as a learning model, there are many limitations in the real environment. In this study, to improve these limitations, a private blockchain was designed to secure information sharing between institutions of different affiliations, and a method was derived to increase reliability and maintain information integrity and consistency through agreement and verification among participants. The proposed method is expected to collect data through an outflow threat collector and collect quality data sets that posed a threat, not synthetic data, through a blockchain-based sharing system, to solve the current outflow threat dataset problem and contribute to the insider threat detection model in the future.

  • PDF

Outdoor Care System using WEMOS and Arduino MEGA (WEMOS와 아두이노 MEGA를 이용한 외출 케어 시스템)

  • Jeong-Geun Choi;Chang-Hyun Kim;Chan-Gyu Lee;Geon-Ho Choi;Boong-Joo Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.4
    • /
    • pp.677-686
    • /
    • 2023
  • In this paper, we study the design and implementation of a smart home outing care system that recognizes the user's purpose of going out and delivers useful information that can help when going out. RSS service data of the Korea Meteorological Administration can be transmitted in real time using ESP8266, and a system that can provide weather information to users after analyzing the data using Arduino MEGA is implemented. Using App Inventor, you can pack the necessary items without forgetting, and you can change the settings according to the desired weather and purpose. The position of the microphone was placed outside to increase awareness by 12%, and the sensitivity of the pressure sensor was set to a maximum of 210 kΩ. If there is an obstacle between the doors, the doors open automatically. An ultrasonic sensor was placed on the ceiling of the drawer to recognize an object within the range of 0.5cm to 10cm to check the existence of an object, and a camera was installed to research a security reinforcement system.

Performance Comparison of Autoencoder based OFDM Communication System with Wi-Fi

  • Shiho Oshiro;Takao Toma;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.172-178
    • /
    • 2023
  • In this paper, performance of autoencoder based OFDM communication systems is compared with IEEE 802.11a Wireless Lan System (Wi-Fi). The proposed autoencoder based OFDM system is composed of the following steps. First, one sub-carrier's transmitter - channel - receiver system is created by autoencoder. Then learning process of the one sub-carrier autoencoder generates constellation map. Secondly, using the plural sub-carrier autoencoder systems, parallel bundle is configured with inserting IFFT and FFT before and after the channel to configure OFDM system. Finally, the receiver part of the OFDM communication system was updated by re-learning process for adapting channel condition such as multipath channel. For performance comparison, IEEE802.11a and the proposed autoencoder based OFDM system are compared. For channel estimation, Wi-Fi uses initial long preamble to measure channel condition. but Autoencoder needs re-learning process to create an equalizer which compensate a distortion caused by the transmission channel. Therefore, this autoencoder based system has basic advantage to the Wi-Fi system. For the comparison of the system, additive random noise and 2-wave and 4-wave multipaths are assumed in the transmission path with no inter-symbol interference. A simulation was performed to compare the conventional type and the autoencoder. As a result of the simulation, the autoencoder properly generated automatic constellations with QPSK, 16QAM, and 64QAM. In the previous simulation, the received data was relearned, thus the performance was poor, but the performance improved by making the initial value of reception a random number. A function equivalent to an equalizer for multipath channels has been realized in OFDM systems. As a future task, there is not include error correction at this time, we plan to make further improvements by incorporating error correction in the future.

RFID Ubiquitous Public Information Documental Administration System construction and Security research (RFID 유비쿼터스 영구기록물관리시스템 구축과 보안 연구)

  • Jang, Young-Sang;Lee, Sung-Yooung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.111-121
    • /
    • 2009
  • Public Information Documental of the administrative, legislative and judicial etc. is lastingness documental and need administration. Whenever the crime event happens, judicature's documental is lent frequently to reference data and is returned, event posting of documental, hysteresis inquiry, lending/return, conservation search, documental exhaust management must consist for administration of lastingness documental. RFID is utilized by the practical use plan of recent Ubiquitous information. Because attaching tag to lastingness documental that use RFID in this treatise, register and manage documental, and chase hysteresis, and design upkeep, present condition analysis of lastingness documental to search, S/W, H/W, network layout, Ubiquitous RFID lastingness recording administration system. Construct lastingness recording administration system after a performance experiment and a chase experiment that is applied in spot that attach 900MHz important duty's RFID tag. After construction practice, create link sex with connection system, security analysis and Forensic data and analyze improvement effect. Is going to contribute Ubiquitous information technology application and Forensic technology development in country documental administration through. research of this treatise.

A New BISON-like Construction Block Cipher: DBISON

  • Zhao, Haixia;Wei, Yongzhuang;Liu, Zhenghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1611-1633
    • /
    • 2022
  • At EUROCRYPT 2019, a new block cipher algorithm called BISON was proposed by Canteaut et al. which uses a novel structure named as Whitened Swap-Or-Not (WSN). Unlike the traditional wide trail strategy, the differential and linear properties of this algorithm can be easily determined. However, the encryption speed of the BISON algorithm is quite low due to a large number of iterative rounds needed to ensure certain security margins. Commonly, denoting by n is the data block length, this design requires 3n encryption rounds. Moreover, the block size n of BISON is always odd, which is not convenient for operations performed on a byte level. In order to overcome these issues, we propose a new block cipher, named DBISON, which more efficiently employs the ideas of double layers typical to the BISON-like construction. More precisely, DBISON divides the input into two parts of size n/2 bits and performs the round computations in parallel, which leads to an increased encryption speed. In particular, the data block length n of DBISON can be even, which gives certain additional implementation benefits over BISON. Furthermore, the resistance of DBISON against differential and linear attacks is also investigated. It is shown the maximal differential probability (MDP) is 1/2n-1 for n encryption rounds and that the maximal linear probability (MLP) is strictly less than 1/2n-1 when (n/2+3) iterative encryption rounds are used. These estimates are very close to the ideal values when n is close to 256.

Assessment of INSPYRE-extended fuel performance codes against the SUPERFACT-1 fast reactor irradiation experiment

  • L. Luzzi;T. Barani;B. Boer;A. Del Nevo;M. Lainet;S. Lemehov;A. Magni;V. Marelle;B. Michel;D. Pizzocri;A. Schubert;P. Van Uffelen;M. Bertolus
    • Nuclear Engineering and Technology
    • /
    • v.55 no.3
    • /
    • pp.884-894
    • /
    • 2023
  • Design and safety assessment of fuel pins for application in innovative Generation IV fast reactors calls for a dedicated nuclear fuel modelling and for the extension of the fuel performance code capabilities to the envisaged materials and irradiation conditions. In the INSPYRE Project, comprehensive and physics-based models for the thermal-mechanical properties of U-Pu mixed-oxide (MOX) fuels and for fission gas behaviour were developed and implemented in the European fuel performance codes GERMINAL, MACROS and TRANSURANUS. As a follow-up to the assessment of the reference code versions ("pre-INSPYRE", NET 53 (2021) 3367-3378), this work presents the integral validation and benchmark of the code versions extended in INSPYRE ("post-INSPYRE") against two pins from the SUPERFACT-1 fast reactor irradiation experiment. The post-INSPYRE simulation results are compared to the available integral and local data from post-irradiation examinations, and benchmarked on the evolution during irradiation of quantities of engineering interest (e.g., fuel central temperature, fission gas release). The comparison with the pre-INSPYRE results is reported to evaluate the impact of the novel models on the predicted pin performance. The outcome represents a step forward towards the description of fuel behaviour in fast reactor irradiation conditions, and allows the identification of the main remaining gaps.