• 제목/요약/키워드: information security system

Search Result 6,591, Processing Time 0.044 seconds

Environment and Development of the Weather Monitoring Application in Kosovo

  • Shabani, Milazim;Baftiu, Naim;Baftiu, Egzon;Maloku, Betim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.371-379
    • /
    • 2022
  • The environment in Kosovo is a topic of concern for the citizens and the state because of the temperatures that affect the health of the citizens and the climate around the world. Kosovo's climate is related to its geographical position. Stretching in the middle latitude, Kosovo's climate depends on the amount of heat coming from the Sun, the proximity of the Adriatic Sea, the Vardar valley, the openness to the north. In order to better understand the climatic features of Kosovo, one must know the elements of the climate such as: sunshine, temperature, precipitation, atmospheric pressure, winds. The Meteorological Institute of Kosovo is responsible for measuring temperatures in Kosovo since 2014 and until now 12 meteorological stations have been operationalized with automatic measurement and real-time data transfer to the central system for data collection and archiving. The hydrometeorological institute lacks an application for measuring temperatures in all the countries of Kosovo. Software applications are generally built to suit the requirements of different governments and clients in order to enable easier management of the jobs they operate on. One of the forms of application development is the development of mobile applications based on android. The purpose of the work is to create a mobile application based on the Android operating system that aims to display information about the weather, this type of application is necessary and important for users who want to see the temperature in different places in Kosovo, but also the world. This type of application offers many options such as maximum temperature, minimum temperature, humidity, and air pressure. The built application will have real and accurate data; this will be done by comparing the results with other similar applications. Such an application is necessary for everyone, especially for those people whose daily work is dependent on the weather or even for those who decide to spend their vacations, such as summer or winter. In this paper, comparisons are also made within android applications for tablets, televisions and smart watches.

COVID-19 Diagnosis from CXR images through pre-trained Deep Visual Embeddings

  • Khalid, Shahzaib;Syed, Muhammad Shehram Shah;Saba, Erum;Pirzada, Nasrullah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.175-181
    • /
    • 2022
  • COVID-19 is an acute respiratory syndrome that affects the host's breathing and respiratory system. The novel disease's first case was reported in 2019 and has created a state of emergency in the whole world and declared a global pandemic within months after the first case. The disease created elements of socioeconomic crisis globally. The emergency has made it imperative for professionals to take the necessary measures to make early diagnoses of the disease. The conventional diagnosis for COVID-19 is through Polymerase Chain Reaction (PCR) testing. However, in a lot of rural societies, these tests are not available or take a lot of time to provide results. Hence, we propose a COVID-19 classification system by means of machine learning and transfer learning models. The proposed approach identifies individuals with COVID-19 and distinguishes them from those who are healthy with the help of Deep Visual Embeddings (DVE). Five state-of-the-art models: VGG-19, ResNet50, Inceptionv3, MobileNetv3, and EfficientNetB7, were used in this study along with five different pooling schemes to perform deep feature extraction. In addition, the features are normalized using standard scaling, and 4-fold cross-validation is used to validate the performance over multiple versions of the validation data. The best results of 88.86% UAR, 88.27% Specificity, 89.44% Sensitivity, 88.62% Accuracy, 89.06% Precision, and 87.52% F1-score were obtained using ResNet-50 with Average Pooling and Logistic regression with class weight as the classifier.

Volume Control using Gesture Recognition System

  • Shreyansh Gupta;Samyak Barnwal
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.161-170
    • /
    • 2024
  • With the technological advances, the humans have made so much progress in the ease of living and now incorporating the use of sight, motion, sound, speech etc. for various application and software controls. In this paper, we have explored the project in which gestures plays a very significant role in the project. The topic of gesture control which has been researched a lot and is just getting evolved every day. We see the usage of computer vision in this project. The main objective that we achieved in this project is controlling the computer settings with hand gestures using computer vision. In this project we are creating a module which acts a volume controlling program in which we use hand gestures to control the computer system volume. We have included the use of OpenCV. This module is used in the implementation of hand gestures in computer controls. The module in execution uses the web camera of the computer to record the images or videos and then processes them to find the needed information and then based on the input, performs the action on the volume settings if that computer. The program has the functionality of increasing and decreasing the volume of the computer. The setup needed for the program execution is a web camera to record the input images and videos which will be given by the user. The program will perform gesture recognition with the help of OpenCV and python and its libraries and them it will recognize or identify the specified human gestures and use them to perform or carry out the changes in the device setting. The objective is to adjust the volume of a computer device without the need for physical interaction using a mouse or keyboard. OpenCV, a widely utilized tool for image processing and computer vision applications in this domain, enjoys extensive popularity. The OpenCV community consists of over 47,000 individuals, and as of a survey conducted in 2020, the estimated number of downloads exceeds 18 million.

Prospects For the Development Of Distance Educational Learning Technologies During The Training Of Students Of Higher Education

  • Oksana Rohach;Tetiana Pryhalinska;Iryna Kvasnytsya;Mykhailo Pohorielov;Mykola Rudnichenko; Olena Lastochkina
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.179-183
    • /
    • 2024
  • This article identifies the problems and substantiates the directions for the development of distance learning technologies in the training of personnel. An example of using digital media to create a remote access laboratory is given. The article is devoted to the definition of the main aspects of the organization of distance education. Rapid digitization, economic, political and social changes taking place in Ukraine necessitate the reform of the education system. First of all, it concerns meeting the educational needs of citizens throughout their lives, providing access to educational and professional training for all who have the necessary abilities and adequate training. The most effective solution to the above-mentioned problems is facilitated by distance learning. The article analyzes the essence and methods of distance learning organization, reveals the features of the use of electronic platforms for the organization of this form of education in different countries of the world. The positive characteristics of distance learning are identified, namely: extraterritoriality; savings on transport costs; the interest of modern youth in the use of information tools in everyday life; increase in the number of students; simplicity and accessibility of training; convenient consultation system; democratic relations between the student and the teacher; convenience for organizations in training their employees without interrupting their regular work; low level of payment for distance education compared to traditional education; individual learning pace; new teacher status. Among the negative features of online education, the author refers to the following problems: authentication of users during knowledge verification, calculation of the teacher's methodological load and copyright of educational materials; the high labor intensity of developing high-quality educational content and the high cost of distance learning equipment; the need to provide users with a personal computer and access to the Internet; the need to find and use effective motivation mechanisms for education seekers.

A Proposal of Personal Information DB Encryption Assurance Framework (개인정보 DB 암호화 검증 프레임웍 제안)

  • Ko, Youngdai;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.397-409
    • /
    • 2014
  • According to the Personal Information Protection Act(PIPA) which is legislated in March 2011, the individual or company that handles personal information, called Personal information processor, should encrypt some kinds of personal information kept in his Database. For convenience sake we call it DB Encryption in this paper. Law enforcement and the implementation agency accordingly are being strengthen the supervision that the status of DB Encryption is being properly applied and implemented as the PIPA. However, the process of DB Encryption is very complicate and difficult as well as there are many factors to consider in reality. For example, there are so many considerations and requirements in the process of DB Encryption like pre-analysis and design, real application and test, etc.. And also there are surely points to be considered in related system components, business process and time and costs. Like this, although there are plenty of factors significantly associated with DB Encryption, yet more concrete and realistic validation entry seems somewhat lacking. In this paper, we propose a realistic DB Encryption Assurance Framework that it is acceptable and resonable in the performance of the PIPA duty (the aspect of the individual or company) and standard direction of inspection and verification of DB Encryption (the aspect of law enforcement).

Research on the Design of Drone System for Field Support Using AR Smart Glasses Technology (AR스마트안경 기술을 접목한 현장 지원용 드론(Drone)시스템 설계에 대한 연구)

  • Lee, Kyung-Hwan;Jeong, Jin-Kuk;Ryu, Gab-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.4
    • /
    • pp.27-32
    • /
    • 2020
  • High-resolution images taken by drones are being used for a variety of information, including monitoring. The management of agricultural facilities still uses mostly human survey methods. Surveying agricultural facilities, surveying the appearance of agricultural facilities, and the sleeping environment have legal and environmental constraints that are inaccessible to humans. In addition, in an area where information such as 3D maps and satellite maps are outdated or not provided, human investigation is inevitable, and a lot of time and money are invested. The purpose of this research is to design and develop drone system for field support incorporating AR smart glasses technology for the maintenance and management of agricultural facilities to improve the difficulties of using existing drones. In addition, We will also suggest ways to secure the safety of personal information in order to solve the damages caused by the exposure of personal information that may occur through video shooting.

Performance Analysis of Detection Algorithms for the Specific Pattern in Packet Payloads (패킷 페이로드 내 특정 패턴 탐지 알고리즘들의 성능 분석에 관한 연구)

  • Jung, Ku-Hyun;Lee, Bong-Hwan;Yang, Dongmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.794-804
    • /
    • 2018
  • Various applications running in computers exchange information in the form of packets through the network. Most packets are formatted into UDP/IP or TCP/IP standard. Network management administrators of enterprises and organizations should be able to monitor and manage packets transmitted over the network for Internet traffic measurement & monitoring, network security, and so on. The goal of this paper is to analyze the performance of several algorithms which closely examine and analyze payloads in a DPI(Deep Packet Inspection) system. The main procedure of packet payload analysis is to quickly search for a specific pattern in a payload. In this paper, we introduce several algorithms which detect a specific pattern in payloads, analyze the performance of them from three perspectives, and suggest an application method suitable for requirements of a given DPI system.

The Design and Implementation of Web Agents for vCard Service in Mobile Enviromnent (모바일 환경에서 vCard 서비스를 위한 웹 에이전트의 설계 및 구현)

  • Yun, Se-Mi;Jo, Ik-Seong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.477-486
    • /
    • 2002
  • vCard that is the electronic business card automates the exchange of personal information typically found on a traditional business card. vCard information contains not only simple text, but also graphics and multimedia data like pictures, company logos, Web addresses, and so on. This paper describes the design and implementation of Web-based vCard agent system for exchanging vCard, an electronic business card and searching another user's vCard in mobile phone environment. In today's business environment, such as that this information is typically exchanged on business cards. Our web agent system in this paper connect web server which provide vCard service and search, edit vCard information displayed by web browser of mobile phone and exchange vCard with another user through internet. Considering characteristics of wireless devices that have limited storage space, It also saves constructed XML documents that include user's informations in a web server and solves the security problem by exchanging not personal data or XML but encrypted directory name where XML document exits as exchanging vcard.

Fusion of Blockchain-IoT network to improve supply chain traceability using Ethermint Smart chain: A Review

  • George, Geethu Mary;Jayashree, LS
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3694-3722
    • /
    • 2022
  • In today's globalized world, there is no transparency in exchanging data and information between producers and consumers. However, these tasks experience many challenges, such as administrative barriers, confidential data leakage, and extensive time delays. To overcome these challenges, we propose a decentralized, secured, and verified smart chain framework using Ethereum Smart Contract which employs Inter Planetary File Systems (IPFS) and MongoDB as storage systems to automate the process and exchange information into blocks using the Tendermint algorithm. The proposed work promotes complete traceability of the product, ensures data integrity and transparency in addition to providing security to their personal information using the Lelantos mode of shipping. The Tendermint algorithm helps to speed up the process of validating and authenticating the transaction quickly. More so in this time of pandemic, it is easier to meet the needs of customers through the Ethermint Smart Chain, which increases customer satisfaction, thus boosting their confidence. Moreover, Smart contracts help to exploit more international transaction services and provide an instant block time finality of around 5 sec using Ethermint. The paper concludes with a description of product storage and distribution adopting the Ethermint technique. The proposed system was executed based on the Ethereum-Tendermint Smart chain. Experiments were conducted on variable block sizes and the number of transactions. The experimental results indicate that the proposed system seems to perform better than existing blockchain-based systems. Two configuration files were used, the first one was to describe the storage part, including its topology. The second one was a modified file to include the test rounds that Caliper should execute, including the running time and the workload content. Our findings indicate this is a promising technology for food supply chain storage and distribution.

Proposal of SMPC Biometric Authentication System Based on Public Blockchain (퍼블릭 블록체인 기반 SMPC 생체인증 시스템 제안)

  • Ji-Su Doo;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.77-82
    • /
    • 2023
  • As the method of collecting and utilizing structured and unstructured data develops due to the influence of the Fourth Industrial Revolution, unwanted personal information data is also being collected and utilized, and hackers are attempting various attacks to steal information. As a result, the importance of information protection has increased, and various protection techniques have emerged, among which many studies have been conducted using decentralized techniques of blockchain and various algorithms to strengthen the security of biometric authentication techniques. This paper proposed a public blockchain biometric authentication system that allows users to protect their data in a safer biometric authentication method in the public blockchain and use it in the blockchain through signature with authenticated information.