• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.029 seconds

Inelastic two-degree-of-freedom model for roof frame under airblast loading

  • Park, Jong Yil;Krauthammer, Theodor
    • Structural Engineering and Mechanics
    • /
    • v.32 no.2
    • /
    • pp.321-335
    • /
    • 2009
  • When a roof frame is subjected to the airblast loading, the conventional way to analyze the damage of the frame or design the frame is to use single degree of freedom (SDOF) model. Although a roof frame consists of beams and girders, a typical SDOF analysis can be conducted only separately for each component. Thus, the rigid body motion of beams by deflections of supporting girders can not be easily considered. Neglecting the beam-girder interaction in the SDOF analysis may cause serious inaccuracies in the response values in both Pressure-Impulse curve (P-I) and Charge Weight-Standoff Diagrams (CWSD). In this paper, an inelastic two degrees of freedom (TDOF) model is developed, based on force equilibrium equations, to consider beam-girder interaction, and to assess if the modified SDOF analysis can be a reasonable design approach.

Design & Implementation of a Host Based Access Control System (호스트 기반 접근제어시스템의 설계 및 구현)

  • Kim, Jin-Chun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.34-39
    • /
    • 2007
  • According to the active use of internet the need for security in various environment is being emphasized. Moreover with the broad use of Messenger on PC and P2P applications. the security and management of individual hosts on internet became very important issues. Therefore in this paper we propose the design and implementation of a host based access control system for the hosts on internet including window based PC which provides access control, information on packets, and record and monitoring of log files.

A Design of Access Control Mechanism for the Secure Use of Internet (안전한 인터넷 사용을 위한 접근제어 메커니즘 설계)

  • Lee, Ho;Jung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.84-90
    • /
    • 2000
  • This paper presents a design of an access control mechanism that can resolves the complicated problems of access control requirements in internet environment. In this paper, we proposed an access control mechanism which can satisfy the combined goals of confidentiality integrity and availability of any resource. We defined an access control mechanism from the viewpoints of identity-based, rule-based and role-based policy and implemented 6 access control operations. The Proposed access control mechanism can protect resources from unauthorized accesses based on the multi-level security policies of security label, integrity level, role and ownership.

  • PDF

Theoretical Principles Of Using Innovative Modern Technologies In Higher Education Institutions

  • Komar, Olha;Bazhenkov, Ievgen;Vnukova, Оlga;Kolomoiets, Halyna;Yanchyshyn, Anatolii;Polishchuk, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.185-190
    • /
    • 2021
  • The article is assigned to a prelude to the joke of effective pedagogical technologies in professional education in the minds of її continuity. Analyzed the definitions "innovation", "technology", "pedagogical technology", "Innovation pedagogical technology". Blocks have been added, which are stored in innovation processes in the light. The significant role of innovation in education is stated. Presented warehouses pedagogical technologies: conceptual, conceptual-processual and professional. The purpose of introducing innovative technologies into the educational process of vocational education institutions has been clarified. The reasons for finding and implementing innovative pedagogical technologies in education are analyzed.

A Study on the Design and Cryptanalysis of 80-bit Block Cipher Algorithm(80-DES) (80비트 블록 암호알고리즘(80-DES)의 설계 및 비도분석에 관한 연구)

  • Yoon, Yong-Jung;Kong, Hun-Taek;Nam, Kil-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.5 no.1
    • /
    • pp.25-36
    • /
    • 1995
  • Differential Cryptanalysis(DC) and Linear Cryptanalysis(LC) are considered to be efficient attack methods which could be applied to DES and other DES-like private key Cryptosystems. This paper analyzes the DC and LC attack to DES and design a 80-bit block Cipher (80-DES) which could be strong against DC and LC Attack.

Design of Montgomery Modular Multiplier based on Systolic Array (시스토릭 어레이를 이용한 Montgomery 모듈라 곱셈기 설계)

  • 하재철;문상재
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.135-146
    • /
    • 1999
  • Most public key cryptosystems are constructed based on a modular exponentiation, which is further decomposed into a series of modular multiplications. We design a new systolic array multiplier to speed up modular multiplication using Montgomery algorithm. This multiplier with simple circuit for each processing element will save about 14% logic gates of hardware and 20% execution time compared with previous one.

Innovative Solutions for Design and Fabrication of Deep Learning Based Soft Sensor

  • Khdhir, Radhia;Belghith, Aymen
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.131-138
    • /
    • 2022
  • Soft sensors are used to anticipate complicated model parameters using data from classifiers that are comparatively easy to gather. The goal of this study is to use artificial intelligence techniques to design and build soft sensors. The combination of a Long Short-Term Memory (LSTM) network and Grey Wolf Optimization (GWO) is used to create a unique soft sensor. LSTM is developed to tackle linear model with strong nonlinearity and unpredictability of manufacturing applications in the learning approach. GWO is used to accomplish input optimization technique for LSTM in order to reduce the model's inappropriate complication. The newly designed soft sensor originally brought LSTM's superior dynamic modeling with GWO's exact variable selection. The performance of our proposal is demonstrated using simulations on real-world datasets.

Formation Of Empathy In Applicants For Higher Education Of Pedagogical Profile In The Process Of Educational Activity

  • Postolenko, Iryna;Vozniuk, Alla;Kyrychenko, Rymma;Gavran, Iryna;Brukhovetska, Oleksandra;Chausova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.11-16
    • /
    • 2021
  • The article proposes that empathy differs in severity and types among students of different specialties. And to test this hypothesis, an experimental study of students from 4 different faculties was carried out. As a result of the study, it was found that empathy is more pronounced among students of "humanitarian" specialties, and students of "exact" specialties have the least pronounced empathic abilities.

The Role of Computer Technologies in Contemporary Jewelry

  • Romanenkova, Julia;Bratus, Ivan;Gnatiuk, Liliia;Zaitseva, Veronika;Karpenko, Olga;Misko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.71-76
    • /
    • 2022
  • The article aims to consider the role of computer technologies in contemporary jewelry art. The importance of computer programming, 3D-modeling and 3D-printing for the process of jewelry creating, its advertising and sales is emphasized. Both the positive features of the possibility of using computer technologies in jewelry and their shortcomings are considered. The process of changing the nature of jewelry design after the start of the use of digital technologies is highlighted. The issue of changing the perception and evaluation of a work of jewelry art, the creation of which uses mechanization, has been updated.

A Proposed Framework for Evaluating the Return on Investment of E-Learning Programs at Saudi Universities

  • Hanaa Yamani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.39-46
    • /
    • 2023
  • The purpose of this study is to introduce a proposed Framework for Evaluating the Return on Investment (ROI) of E-Learning Programs at Saudi Universities. To achieve this goal, the descriptive analysis methodology is used to analyze the literature review about e-learning and its evaluation from different viewpoints, especially from the ROI-related perspective. As well as the literature reviews related to ROI and the methods of calculating it inside society institutes. This study suggests a conceptual framework for evaluating the ROI of E-Learning Programs at Saudi Universities. This framework is based on the merging process among the analyze, design, develop, implement, and evaluate (ADDIE) model for designing e-learning programs, which gives detailed procedures for executing the program, several evaluating models for e-learning, and the Kirkpatrick model for evaluating the ROI of e-learning. It consists of seven stages (analysis, calculating the costs, design, development, implementation, calculation of the benefits, and calculation of the final ROI).