• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.028 seconds

Using Roots and Patterns to Detect Arabic Verbs without Affixes Removal

  • Abdulmonem Ahmed;Aybaba Hancrliogullari;Ali Riza Tosun
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.1-6
    • /
    • 2023
  • Morphological analysis is a branch of natural language processing, is now a rapidly growing field. The fundamental tenet of morphological analysis is that it can establish the roots or stems of words and enable comparison to the original term. Arabic is a highly inflected and derivational language and it has a strong structure. Each root or stem can have a large number of affixes attached to it due to the non-concatenative nature of Arabic morphology, increasing the number of possible inflected words that can be created. Accurate verb recognition and extraction are necessary nearly all issues in well-known study topics include Web Search, Information Retrieval, Machine Translation, Question Answering and so forth. in this work we have designed and implemented an algorithm to detect and recognize Arbic Verbs from Arabic text.The suggested technique was created with "Python" and the "pyqt5" visual package, allowing for quick modification and easy addition of new patterns. We employed 17 alternative patterns to represent all verbs in terms of singular, plural, masculine, and feminine pronouns as well as past, present, and imperative verb tenses. All of the verbs that matched these patterns were used when a verb has a root, and the outcomes were reliable. The approach is able to recognize all verbs with the same structure without requiring any alterations to the code or design. The verbs that are not recognized by our method have no antecedents in the Arabic roots. According to our work, the strategy can rapidly and precisely identify verbs with roots, but it cannot be used to identify verbs that are not in the Arabic language. We advise employing a hybrid approach that combines many principles as a result.

A Study on the New RFP for the PMO-based Development of Next-Generation MIS (PMO 기반의 차세대 MIS개발을 위한 신RFP 작성 연구)

  • Han, Moonhee;Kim, Yousin;Kim, Dae Ho
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.11
    • /
    • pp.585-594
    • /
    • 2016
  • Information system development projects are increasingly enlarging in size and are becoming more complex in the development environment. The traditional approaches for the development of information system, however, haven't shown the expected performances in the management for them and many researchers have been trying to find a new approach for overcoming this challenges. And one of the new approaches is the PMO and it is introduced to solve the problems of project management and the related organizational, technical, and administrative problems. This study attempted to find the efficient information system establishment plan. In particular, this study wants to research the practicality of PMO and the detailed utilization plans. As a result, this study proposes the structure of project implementation, the requirements, the direction of the basic system design, the scope of system development, and the budgeting for the systems. It is expected to contribute the successful implementation of the project.

Design and development of non-contact locks including face recognition function based on machine learning (머신러닝 기반 안면인식 기능을 포함한 비접촉 잠금장치 설계 및 개발)

  • Yeo Hoon Yoon;Ki Chang Kim;Whi Jin Jo;Hongjun Kim
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.29-38
    • /
    • 2022
  • The importance of prevention of epidemics is increasing due to the serious spread of infectious diseases. For prevention of epidemics, we need to focus on the non-contact industry. Therefore, in this paper, a face recognition door lock that controls access through non-contact is designed and developed. First very simple features are combined to find objects and face recognition is performed using Haar-based cascade algorithm. Then the texture of the image is binarized to find features using LBPH. An non-contact door lock system which composed of Raspberry PI 3B+ board, an ultrasonic sensor, a camera module, a motor, etc. are suggested. To verify actual performance and ascertain the impact of light sources, various experiment were conducted. As experimental results, the maximum value of the recognition rate was about 85.7%.

ZigBee Authentication Protocol with Enhanced User Convenience and Safety (사용자 편의성 및 안전성이 강화된 ZigBee 인증 프로토콜)

  • Ho-jei Yu;Chan-hee Kim;Sung-sik Im;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.81-92
    • /
    • 2022
  • The rapidly growing IoT market is expanding not only in general households but also in smart homes and smart cities. Among the major protocols used in IoT, ZigBee accounts for more than 90% of the smart home's door lock market and is mainly used in miniaturized sensor devices, so the safety of the protocol is very important. However, the device using Zig Bee is not satisfied with the omnidirectional safety because it uses a fixed key during the authentication process that connects to the network, and it has not been resolved in the recently developed ZigBee 3.0. This paper proposes a design method that provides omnidirectional safety to the ZigBee authentication protocol and can be quickly applied to existing protocols. The proposed improved ZigBee authentication protocol analyzed and applied the recently developed OWE protocol to apply ECDH, which has low computational volume and provides omnidirectional safety in IoT. Based on this, it provides the safety of the ZigBee authentication protocol, and it is expected that it will be able to provide user convenience as it does not require a separate certificate or password input.

Design of Face with Mask Detection System in Thermal Images Using Deep Learning (딥러닝을 이용한 열영상 기반 마스크 검출 시스템 설계)

  • Yong Joong Kim;Byung Sang Choi;Ki Seop Lee;Kyung Kwon Jung
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.21-26
    • /
    • 2022
  • Wearing face masks is an effective measure to prevent COVID-19 infection. Infrared thermal image based temperature measurement and identity recognition system has been widely used in many large enterprises and universities in China, so it is totally necessary to research the face mask detection of thermal infrared imaging. Recently introduced MTCNN (Multi-task Cascaded Convolutional Networks)presents a conceptually simple, flexible, general framework for instance segmentation of objects. In this paper, we propose an algorithm for efficiently searching objects of images, while creating a segmentation of heat generation part for an instance which is a heating element in a heat sensed image acquired from a thermal infrared camera. This method called a mask MTCNN is an algorithm that extends MTCNN by adding a branch for predicting an object mask in parallel with an existing branch for recognition of a bounding box. It is easy to generalize the R-CNN to other tasks. In this paper, we proposed an infrared image detection algorithm based on R-CNN and detect heating elements which can not be distinguished by RGB images.

The Status of Teachers of Students with Intellectual Disabilities in Practicing Strategies for the Modification of Aggressive Behaviour in Saudi Arabia

  • Alqurashi, Yasser O.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.241-247
    • /
    • 2022
  • This study examines teachers' implementation of strategies to modify the aggressive behavior of students with intellectual disabilities in Saudi Arabia, to determine the obstacles to their real-world execution. In addition, it presents potential approaches to overcome the obstacles to implementing strategies with this group of students. The research employed a qualitative design using semi-structured interviews as a data collection tool and applied a thematic analysis. The study population comprised 35 teachers of students with intellectual disabilities and the study sample numbered six teachers. The interviews were conducted via different methods: three by phone, two face-to face, and one using the Zoom platform. The results revealed inadequate understanding among teachers of intellectual disability and behaviour modification strategies, and this affected their capacity to develop plans that were compatible with the needs of students with intellectual disability. The findings also identified multiple obstacles that impede teachers' implementation of strategies to modify aggressive behaviour among students with intellectual disabilities; the most important being the lack of input from a psychological specialist when developing programs to modify aggressive behaviour. In general, it is apparent that programs for modifying aggressive behaviour are neither structured nor complementary, due to the scarcity of administrators with sufficient knowledge and familiarity with the characteristics and personalities of students with intellectual disabilities. This study presents several recommendations, the most important of which is that teachers of students with intellectual disability should develop themselves through training courses to enable them to deal with these students and create treatment plans that include strategies and clear steps to modify the aggressive behaviour of students with intellectual disabilities. To support teachers, it is also necessary to remove the obstacles facing education centres by providing financial support to create an environment in which they can access the required devices and equipment in their classes.

A Study on the Intention of Early Users of Digital Finance baesd Mydata Service Application (디지털금융 기반 마이데이터 앱 초기 사용자들의 이용의도에 관한 연구)

  • Lee, Tae Won;Sung, Haeng Nam
    • The Journal of Information Systems
    • /
    • v.32 no.1
    • /
    • pp.1-21
    • /
    • 2023
  • Purpose The purpose of this study is to investigate the intention of early application users in consideration of the characteristics of digital finance-based MyData service users. It is expected that user characteristics will affect the intention to use MyData service, which has not yet been advanced, and accordingly, it will examine how the characteristics of the initial users of MyData service and the intention to use it are connected. Design/methodology/approach The model used in this study is a value-based adoption model (VAM), and a lot of research has been conducted on information technology and online user acceptance and continuous use intention of online users. VAM has been proven useful through empirical analysis in many studies. The value-based acceptance model is a method of analyzing the intention to use Benefits and Sacrifices as the main elements of perceived value. It can be said to be a model that can analyze the benefits of use and the sacrifices to be made. Findings According to the analysis results of this study, it was found that usefulness, enjoyment, and reliability, which are the benefits of MyData service apps, had a positive effect on perceived value, which is partially consistent with existing research results. However, it was found that complexity, which is the sacrifice of MyData service apps, negatively affects perceived value and security has no negative impact. The results of security are considered to be complementary to financial institutions because MyData service deals with financial data based on personal information, and the research hypothesis is rejected because users' demands are relatively low. Therefore, MyData service apps should do more to increase benefits (usefulness, enjoyment, and reliability) than to reduce sacrifice (complexity) to users.

The Design and Implementation of an Elevator 3D Model Simulator Framework based on Unreal Engine (언리얼엔진 기반 승강기 3D모델 시뮬레이터 프레임워크 설계 및 구현)

  • Woon-Yong Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.67-74
    • /
    • 2023
  • An elevator is a mechanical and electronic device composed of about 20,000 various parts, and is systematically operated with a close relationship with each other. By intuitively understanding this complex elevator structure and efficiently recognizing the operating model, it will be possible to increase the understanding of the elevator system and the efficiency of maintenance. The existing elevator management system is a process of collecting and understanding information based on data generated from elevators, and has a structure that lacks efficiency in expressing and managing real-world information during elevator maintenance. Therefore, this paper proposes a simulator framework that can operate efficiently based on the actual elevator model. By constructing the recognition of specific objects through a 3D-based service model and visualizing the operation process, it will be possible to enhance the understanding of the structure and operation required for elevator operation. To this end, the core components of the elevator system are identified, the relationship between them and the operating method are visualized, and a simulator is implemented. Based on this, it will be possible to provide a realistic information management and operating environment in virtual space and real platform.

Performance Evaluation of SDN Controllers: RYU and POX for WBAN-based Healthcare Applications

  • Lama Alfaify;Nujud Alnajem;Haya Alanzi;Rawan Almutiri;Areej Alotaibi;Nourah Alhazri;Awatif Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.219-230
    • /
    • 2023
  • Wireless Body Area Networks (WBANs) have made it easier for healthcare workers and patients to monitor patients' status continuously in real time. WBANs have complex and diverse network structures; thus, management and control can be challenging. Therefore, considering emerging Software-defined networks (SDN) with WBANs is a promising technology since SDN implements a new network management and design approach. The SDN concept is used in this study to create more adaptable and dynamic network architectures for WBANs. The study focuses on comparing the performance of two SDN controllers, POX and Ryu, using Mininet, an open-source simulation tool, to construct network topologies. The performance of the controllers is evaluated based on bandwidth, throughput, and round-trip time metrics for networks using an OpenFlow switch with sixteen nodes and a controller for each topology. The study finds that the choice of network controller can significantly impact network performance and suggests that monitoring network performance indicators is crucial for optimizing network performance. The project provides valuable insights into the performance of SDN-based WBANs using POX and Ryu controllers and highlights the importance of selecting the appropriate network controller for a given network architecture.

Development of Protection Profile for Malware App Analysis Tool (악성 앱 분석 도구 보호프로파일 개발)

  • Jung, Jae-eun;Jung, Soo-bin;Gho, Sang-seok;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.374-376
    • /
    • 2022
  • The Malware App Analysis Tool is a system that analyzes Android-based apps by the AI-based algorithm defined in the tool and detects whether malware code is included. Currently, as the spred of smartphones is activated, crimes using malware apps have increased, and accordingly, security for malware apps is required. Android operating systems used in smartphones have a share of more than 70% and are open-source-based, so not only will there be many vulnerabilities and malware, but also more damage to malware apps, increasing demand for tools to detect and analyze malware apps. However, this paper is proposed because there are many difficulties in designing and developing a malware app analysis tool because the security functional requirements for the malware app analysis tool are not clearly specified. Through the developed protection profile, technology can be improved based on the design and development of malware app analysis tools, safety can be secured by minimizing damage to malware apps, and furthermore, trust in malware app analysis tools can be guaranted through common criteria.

  • PDF