• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.036 seconds

The Essence Of Pedagogical Technologies In Modern Education

  • Korets, Mykola;Popova, Alla;Sinenko, Oksana;Trynko, Olga;Karolop, Olena;Krasovskyi, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.48-51
    • /
    • 2021
  • The article discusses the use of modern technologies in the learning process. It has been determined that the modern period of the development of society is characterized by a strong influence of computer technologies on it, a new education system is being formed, focused on entering the world information and educational space. This process is accompanied by significant changes in the pedagogical theory and practice of the educational process associated with making adjustments to the content of learning technologies, which should be adequate to modern technical capabilities, and contribute to the harmonious entry of a teenager into the information society. Computer technologies are designed to become not an additional "makeweight" in training, but an integral part of a holistic educational process, significantly increasing its effectiveness

Priorities And Problems In The Development Of Modern Information Technologies In Education

  • Prykhodkina, Nataliia;Tymoshko, Hanna;Zuieva, Alona;Sholokh, Olena;Noskova, Margaryta;Lebid, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.231-236
    • /
    • 2021
  • The article assesses the functioning of the DE system or a separate educational institution, where it can be carried out on the basis of developed criteria or on a regulatory basis. The assessment was carried out on the basis of a qualitative and quantitative nature by comparing the actual state of affairs with a certain "ideal" (educational standard), which must be defined and used as a kind of benchmark against which the assessment is made. Conducted an assessment based on a regulatory framework that represents an alternative approach. It has been emphasized that the exceptional difficulty in determining the ideal indicators (norms) of the activities of universities, it has been found that the normative approach, in which the activities of traditional and open universities are compared, taking into account the differences in social, cultural and economic conditions, is the most acceptable.

Digitization Of Education: Current Challenges Of Education

  • Osaula, Vadym;Parfeniuk, Ihor;Lysyniuk, Maryna;Haludzina-Horobets, Viktoriia;Shyber, Oksana;Levchenko, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.368-372
    • /
    • 2021
  • The article identifies the features of the digital culture of modern society in the dynamics of its impact on the education sector, identifies the main directions of digitalization education, an objective analysis is presented, the possibilities of examination as a scientific assessment are determined "Digital reforms" of education, the role of traditional values of educational culture in expertise and improvement digital innovations in the education system, identified the main contradictions in the development of digital culture, to determine the directions of its improvement. The article describes the three main components of information technology as a complex of hardware, software and a system of organizational and methodological support; the description of analog and digital information technologies is presented. The authors list the most common multifunctional office applications and IT tools; the advantages of using IT in the educational process are highlighted.

New Cellular Neural Networks Template for Image Halftoning based on Bayesian Rough Sets

  • Elsayed Radwan;Basem Y. Alkazemi;Ahmed I. Sharaf
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.85-94
    • /
    • 2023
  • Image halftoning is a technique for varying grayscale images into two-tone binary images. Unfortunately, the static representation of an image-half toning, wherever each pixel intensity is combined by its local neighbors only, causes missing subjective problem. Also, the existing noise causes an instability criterion. In this paper an image half-toning is represented as a dynamical system for recognizing the global representation. Also, noise is reduced based on a probabilistic model. Since image half-toning is considered as 2-D matrix with a full connected pass, this structure is recognized by the dynamical system of Cellular Neural Networks (CNNs) which is defined by its template. Bayesian Rough Sets is used in exploiting the ideal CNNs construction that synthesis its dynamic. Also, Bayesian rough sets contribute to enhance the quality of the halftone image by removing noise and discovering the effective parameters in the CNNs template. The novelty of this method lies in finding a probabilistic based technique to discover the term of CNNs template and define new learning rules for CNNs internal work. A numerical experiment is conducted on image half-toning corrupted by Gaussian noise.

An IoT-Aware System for Managing Patients' Waiting Time Using Bluetooth Low-Energy Technology

  • Reham Alabduljabbar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.83-92
    • /
    • 2024
  • It is a common observation that whenever any patient arrives at the front desk of a hospital, outpatient clinic, or other health-associated centers, they have to first queue up in a line and wait to fill in their registration form to get admitted. The long waiting time without any status updates is the most common complaint, worrying health officials. In this paper, UrNext, a location-aware mobile-based solution using Bluetooth low-energy (BLE) technology, is presented to solve the problem. Recently, a technology-oriented method has been gaining popularity in solving the healthcare sector's problems, namely the Internet of Things (IoT). The implementation of this solution could be explained through a simple example that when a patient arrives at a clinic for her consultation. There, instead of having to wait in long lines, she will be greeted automatically, receive a push notification telling her that she has been admitted along with an estimated waiting time for her consultation session. This will not only provide the patients with a sense of freedom but would also reduce uncertainty levels that are generally observed, thus saving both time and money. This work aimed to improve clinics' quality of services and organize queues and minimize waiting times in clinics, leading to patient comfortability and reducing the burden on nurses and receptionists. The results demonstrated that the presented system was successful in its performance and helped achieve high usability.

Radix-2 16 Points FFT Algorithm Accelerator Implementation Using FPGA (FPGA를 사용한 radix-2 16 points FFT 알고리즘 가속기 구현)

  • Gyu Sup Lee;Seong-Min Cho;Seung-Hyun Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.11-19
    • /
    • 2024
  • The increased utilization of the FFT in signal processing, cryptography, and various other fields has highlighted the importance of optimization. In this paper, we propose the implementation of an accelerator that processes the radix-2 16 points FFT algorithm more rapidly and efficiently than FFT implementation of existing studies, using FPGA(Field Programmable Gate Array) hardware. Leveraging the hardware advantages of FPGA, such as parallel processing and pipelining, we design and implement the FFT logic in the PL (Programmable Logic) part using the Verilog language. We implement the FFT using only the Zynq processor in the PS (Processing System) part, and compare the computation times of the implementation in the PL and PS part. Additionally, we demonstrate the efficiency of our implementation in terms of computation time and resource usage, in comparison with related works.

Cyber Threat Analysis of UAM Communications, Navigation, Surveillance and Information System (UAM 통신, 항법, 감시 및 정보 시스템의 사이버 위협 분석)

  • Kyungwook Kim;Hyoung-keun Yoon
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.4
    • /
    • pp.442-449
    • /
    • 2024
  • In this paper, we aim to propose a comprehensive framework for cyber threat analysis of urban air mobility (UAM) or advanced air mobility (AAM) communications, navigation, surveillance, and information system infrastructure. By examining potential vulnerabilities and threat vectors, we seek to enhance the security and resilience of UAM infrastructure. We conduct a detailed cyber threat analysis to identify and categorize various types of cyber threats, assess their impact on the CNSi systems, and evaluate the vulnerabilities within these systems that may be exploited by such threats. This analysis will provide valuable insights for stakeholders involved in the deployment and operation of UAM systems, ultimately contributing to the safe and efficient integration of urban air transportation.

Early Fire Detection System for Embedded Platforms: Deep Learning Approach to Minimize False Alarms (임베디드 플랫폼을 위한 화재 조기 감지 시스템: 오경보 최소화를 위한 딥러닝 접근 방식)

  • Seong-Jun Ro;Kwangjae Lee
    • Journal of Sensor Science and Technology
    • /
    • v.33 no.5
    • /
    • pp.298-304
    • /
    • 2024
  • In Korea, fires are the second most common type of disaster, causing large-scale damages. The installation of fire detectors is legislated to prevent fires and minimize damage. Conventional fire detectors have limitations in initial suppression of failures because they detect fires when large amounts of smoke and heat are generated. Additionally, frequent malfunctions in fire detectors may cause users to turn them off. To address these issues, recent studies focus on accurately detecting even small-scale fires using multi-sensor and deep-learning technologies. They also aim at quick fire detection and thermal decomposition using gas. However, these studies are not practical because they overlook the heavy computations involved. Therefore, we propose a fast and accurate fire detection system based on multi-sensor and deep-learning technologies. In addition, we propose a computation-reduction method for selecting sensors suitable for detection using the Pearson correlation coefficient. Specifically, we use a moving average to handle outliers and two-stage labeling to reduce false detections during preprocessing. Subsequently, a deep-learning model is selected as LSTM for analyzing the temporal sequence. Then, we analyze the data using a correlation analysis. Consequently, the model using a small data group with low correlation achieves an accuracy of 99.88% and a false detection rate of 0.12%.

A study on the Foreign Senior Citizens' Welfare Act (외국 노인복지법에 관한 연구)

  • kim, hyeon-su
    • Journal of the Korea society of information convergence
    • /
    • v.7 no.2
    • /
    • pp.31-40
    • /
    • 2014
  • The old age officially means time when Health is weakened. To complete the social security against the social risks it is on the one hand necessary to provide an elaborate system of coordination in the field of social security. It should be pursued on law as well as policy. Social security benefits should be comparatively analysed to have implications for the national legislation.

  • PDF

The Study on Improvement of the Program that Traces the Binary Codes in Execution (실행 중인 바이너리 코드 추출 프로그램의 기능 확장 연구)

  • Chang, Hang-Bae;Kwon, Hyuk-Jun;Kim, Yang-Hoon;Kim, Guk-Boh
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1309-1315
    • /
    • 2009
  • This research goal of developing and producing a tool that finds security weakness that may happen when a usual program is executed. The analyzing tool for security weakness has the major functions as follows. In case that a part of anticipated security weakness are in execution, it traces a machine language to a part in execution. And Monitoring System calls and DLL(API) calls when a program is in execution. The result of this study will enable to contribute to use as educational materials for security service in companies and related agencies and to prevent from hacking of external information invaders in the final analysis.

  • PDF