• Title/Summary/Keyword: System & Network Security

Search Result 2,715, Processing Time 0.029 seconds

Paradigm of the Transformation of Potential-Forming Space Under the Impact of Intellectual-Innovation Determinants

  • Khanin, Semen;Derhaliuk, Marta;Stavroyany, Serhii;Kudlasevych, Olga;Didkivska, Lesia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.340-346
    • /
    • 2022
  • The article examines the formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants. Based on the study of different scientific views on the nature and properties of potential-forming space through the study of approaches to understanding the concept of "space" clarified the complexity and multifaceted nature of the phenomenon and found that its characteristics are relevant to the industrial development model. It is revealed that the leading modern trends related to the spread of globalization and regionalization, rapid development of information and communication technologies, diffusion of innovations accompany the transition from industrial to post-industrial development and its development, which leads to new development: changes production, nature and relations between business entities, etc. It is proved that under such conditions, the region as a key element of the economic system, acquires a leading role in achieving sustainable and balanced development. These processes significantly affect the potential-forming space of the regional economy under the influence of intellectual and innovative determinants, leading to the need for its transformation and change in accordance with modern realities, which is reflected in thorough research on the formation of scientific paradigm based on the formation of its theoretical foundations and methodological basis. This study reveals the essence, role, functions, structure, process of formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants. It is proved that the formation of the modern scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants occurs in the context of building a post-industrial model of development, accompanied by consideration of the region as a spatial object territories from the physical plane to the spatial environment in which the development of human capital, innovation and self-development of the region. Taking into account the above, the article outlines the prerequisites and factors of formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants.

Organizational-Economic Mechanism of Providing Sustainability of the Region's Development Based on the Impact of the Potential-Forming Space in the Conditions of the Creative Economy Formation

  • Khanin, Semen;Derhaliuk, Marta;Arefieva, Olena;Murashko, Mykola;Nusinova, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.348-356
    • /
    • 2022
  • The article is devoted to substantiation of theoretical and methodical bases of formation of the organizational-economic mechanism of maintenance of stability of development of region on the bases of influence of potential-forming space in the conditions of formation of creative economy. It was found that the organizational-economic mechanism due to its multifaceted nature does not have a single generally accepted definition, and its acceptable scale and complexity is reflected in the structure, which is very dependent on the scope and conditions of its application, can be very different and contain different elements. In view of this, in order to highlight the characteristics that are inherent in the organizational-economic mechanism of sustainable development of the region on the basis of potential-forming space in the formation of creative economy, the article examines the properties and characteristics of direct organizational and economic mechanism. The necessity of basing the process of formation of any organizational-economic mechanism, including the organizational-economic mechanism of ensuring the sustainability of the region on the basis of the potential-forming space in the conditions of creative economy on the system of principles. In this context, the author's vision is proposed and a set of principles for the formation of organizational-economic mechanism for sustainable development of the region on the basis of the potential of the potential-forming space in the creative economy, as well as revealed the essence of each. According to the structural aspect, the organizational-economic mechanism of ensuring the sustainability of the region's development on the basis of the potential-forming space is proposed to be presented as a set of seven stages, which are implemented in a certain sequence. Within the limits of this research the sequence of realization of the stages making process of formation of the organizational-economic mechanism of maintenance of stability of development of region on the basis of influence of potential-forming space in the conditions of formation of creative economy is defined and their maintenance and essence is presented.

Ensuring the Quality of Higher Education in Ukraine

  • Olha Oseredchuk;Mykola Mykhailichenko;Nataliia Rokosovyk;Olha Komar;Valentyna Bielikova;Oleh Plakhotnik;Oleksandr Kuchai
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.142-148
    • /
    • 2023
  • The National Agency for Quality Assurance in Higher Education plays a crucial role in education in Ukraine, as an independent entity creates and ensures quality standards of higher education, which allow to properly implement the educational policy of the state, develop the economy and society as a whole.The purpose of the article: to reveal the crucial role of the National Agency for Quality Assurance in Higher Education to create quality management of higher education institutions, to show its mechanism as an independent entity that creates and ensures quality standards of higher education. and society as a whole. The mission of the National Agency for Quality Assurance in Higher Education is to become a catalyst for positive changes in higher education and the formation of a culture of its quality. The strategic goals of the National Agency are implemented in three main areas: the quality of educational services, recognition of the quality of scientific results, ensuring the systemic impact of the National Agency. The National Agency for Quality Assurance in Higher Education exercises various powers, which can be divided into: regulatory, analytical, accreditation, control, communication.The effectiveness of the work of the National Agency for Quality Assurance in Higher Education for 2020 has been proved. The results of a survey conducted by 183 higher education institutions of Ukraine conducted by the National Agency for Quality Assurance in Higher Education are shown. Emphasis was placed on the development of "Recommendations of the National Agency for Quality Assurance in Higher Education regarding the introduction of an internal quality assurance system." The international activity and international recognition of the National Agency for Quality Assurance in Higher Education are shown.

A 2×2 MIMO Spatial Multiplexing 5G Signal Reception in a 500 km/h High-Speed Vehicle using an Augmented Channel Matrix Generated by a Delay and Doppler Profiler

  • Suguru Kuniyoshi;Rie Saotome;Shiho Oshiro;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.1-10
    • /
    • 2023
  • This paper proposes a method to extend Inter-Carrier Interference (ICI) canceling Orthogonal Frequency Division Multiplexing (OFDM) receivers for 5G mobile systems to spatial multiplexing 2×2 MIMO (Multiple Input Multiple Output) systems to support high-speed ground transportation services by linear motor cars traveling at 500 km/h. In Japan, linear-motor high-speed ground transportation service is scheduled to begin in 2027. To expand the coverage area of base stations, 5G mobile systems in high-speed moving trains will have multiple base station antennas transmitting the same downlink (DL) signal, forming an expanded cell size along the train rails. 5G terminals in a fast-moving train can cause the forward and backward antenna signals to be Doppler-shifted in opposite directions, so the receiver in the train may have trouble estimating the exact channel transfer function (CTF) for demodulation. A receiver in such high-speed train sees the transmission channel which is composed of multiple Doppler-shifted propagation paths. Then, a loss of sub-carrier orthogonality due to Doppler-spread channels causes ICI. The ICI Canceller is realized by the following three steps. First, using the Demodulation Reference Symbol (DMRS) pilot signals, it analyzes three parameters such as attenuation, relative delay, and Doppler-shift of each multi-path component. Secondly, based on the sets of three parameters, Channel Transfer Function (CTF) of sender sub-carrier number n to receiver sub-carrier number l is generated. In case of n≠l, the CTF corresponds to ICI factor. Thirdly, since ICI factor is obtained, by applying ICI reverse operation by Multi-Tap Equalizer, ICI canceling can be realized. ICI canceling performance has been simulated assuming severe channel condition such as 500 km/h, 8 path reverse Doppler Shift for QPSK, 16QAM, 64QAM and 256QAM modulations. In particular, 2×2MIMO QPSK and 16QAM modulation schemes, BER (Bit Error Rate) improvement was observed when the number of taps in the multi-tap equalizer was set to 31 or more taps, at a moving speed of 500 km/h and in an 8-pass reverse doppler shift environment.

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.

Load-Aware Cell Selection Method for Efficient Use of Network Resources (효율적 망 자원 이용을 위한 부하 인지 셀 선택 기법)

  • Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2443-2449
    • /
    • 2015
  • Downlink (DL) data rate for a MS is influenced by not only the signal to interference and noise ratio (SINR) but also the amount of radio resources allocated to the MS. Therefore, when a MS uses SINR to select a cell to associate with, it cannot receive the fastest DL data rate all the time if it associates with a congested cell. Moreover, the SINR-based cell selection may result in cell loads unbalance, which decreases the efficiency of a network. To address the issue, we propose a novel cell selection method by considering not only SINR but also a cell load which are combined into two cell selection criteria. One is the maximum achievable data rate and the other is the minimum outage probability. The simulation results show that the cell selection based on the maximum achievable data rate is superior to the SINR-based method and the method using the minimum outage probability in terms of the system efficiency and the fairness in cell loads while the cell selection method based on the minimum outage probability is superior to the others in terms of the outage probability of a MS.

A Study of Intrusion Detection Scheme based on Software-Defined Networking in Wireless Sensor Networks (무선 센서 네트워크에서 소프트웨어 정의 네트워킹 기법을 사용한 침입 탐지 기법에 대한 연구)

  • Kang, Yong-Hyeog;Kim, Moon Jeong;Han, Moonseog
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.8
    • /
    • pp.51-57
    • /
    • 2017
  • A wireless sensor network is composed of many resource constrained sensor nodes. These networks are attacked by malicious attacks like DDoS and routing attacks. In this paper, we propose the intrusion detection and prevention system using convergence of software-defined networking and security technology in wireless sensor networks. Our proposed scheme detects various intrusions in a central server by accumulating log messages of OpenFlow switch through SDN controller and prevents the intrusions by configuring OpenFlow switch. In order to validate our proposed scheme, we show it can detect and prevent some malicious attacks in wireless sensor networks.

Technical analysis of Cloud storage for Cloud Computing (클라우드 컴퓨팅을 위한 클라우드 스토리지 기술 분석)

  • Park, Jeong-Su;Jung, Sung-Jae;Bae, Yu-Mi;Kyung, Ji-Hun;Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.757-760
    • /
    • 2012
  • Cloud storage system that cloud computing providers provides large amounts of data storage and processing of cloud computing is a key component. Large vendors (such as Facebook, YouTube, Google) in the mass sending of data through the network quickly and easily share photos, videos, documents, etc. from heterogeneous devices, such as tablets, smartphones, and the data that is stored in the cloud storage using was approached. At time, growth and development of the globally data, the cloud storage business model emerging is getting. Analysis new network storage cloud storage services concepts and technologies, including data manipulation, storage virtualization, data replication and duplication, security, cloud computing core.

  • PDF

Bibliometric Analysis on the Research Trends in Journal of Convergence for Information Technology (중소기업융합학회 수록 논문의 연구동향에 대한 계량서지학적 분석)

  • Kim, Shin-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.122-130
    • /
    • 2020
  • The purpose of this study is to identify current states and trends of convergence researches by conducting a bibliometric analysis of the papers in the Convergence Society for SMB. After 792 papers from 2012 to 2019 were collected, we analyzed network analysis by using centrality through extracting of nouns and compound nouns with text mining and 3 times of pre-processing and purification processing. According to the results, first, quantitative and qualitative aspects of the researches since 2016 improved, studies focused on words such as influence, convergence, mediating effect, satisfaction, and effect. Second, in the first half (2012-2015), engineering and technical studies were intensively conducted based on topics such as information, system, and security. Third, in the period of the second half (2016-2019), the research scope was expanded to college students, parents, teenagers under the topics of job, self-efficacy, education, satisfaction, depression, and stress. The results of this study are meaningful in identifying existing research trends and in providing information which requires the expansion of new research areas.

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.