• Title/Summary/Keyword: security modeling

Search Result 602, Processing Time 0.024 seconds

Modeling and Simulation of the Photocatalytic Treatment of Wastewater using Natural Bauxite and TiO2 doped by Quantum Dots

  • Becheikh, Nidhal;Eladeb, Aboulbaba;Ghazouani, Nejib
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.91-96
    • /
    • 2022
  • The photocatalytic degradation of salicylic acid takes place in several stages involving coupled phenomena, such as the transport of molecules and the chemical reaction. The systems of transport equations and the photocatalytic reaction are numerically solved using COMSOL Mutiphysics (CM) simulation software. CM will make it possible to couple the phenomena of flow, the transport of pollutants (salicylic acid) by convection and diffusion, and the chemical reaction to the catalytic area (bauxite or TiO2 doped by nanoparticles). The simulation of the conversion rate allows to correctly fit the experimental results. The temporal simulation shows that the reaction reaches equilibrium after a transitional stage lasting over one minute. The outcomes of the study highlight the importance of diffusion in the boundary layer and the usefulness of injecting micro-agitation into the microchannel flow. Under such conditions, salicylic acid degrades completely.

A New Methodology for Software Reliability based on Statistical Modeling

  • Avinash S;Y.Srinivas;P.Annan naidu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.157-161
    • /
    • 2023
  • Reliability is one of the computable quality features of the software. To assess the reliability the software reliability growth models(SRGMS) are used at different test times based on statistical learning models. In all situations, Tradational time-based SRGMS may not be enough, and such models cannot recognize errors in small and medium sized applications.Numerous traditional reliability measures are used to test software errors during application development and testing. In the software testing and maintenance phase, however, new errors are taken into consideration in real time in order to decide the reliability estimate. In this article, we suggest using the Weibull model as a computational approach to eradicate the problem of software reliability modeling. In the suggested model, a new distribution model is suggested to improve the reliability estimation method. We compute the model developed and stabilize its efficiency with other popular software reliability growth models from the research publication. Our assessment results show that the proposed Model is worthier to S-shaped Yamada, Generalized Poisson, NHPP.

Takagi-Sugeno Fuzzy Model for Greenhouse Climate

  • Imen Haj Hamad;Amine Chouchaine;Hajer Bouzaouache
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.24-30
    • /
    • 2024
  • This paper investigates the identification and modeling of a climate greenhouse. Given real climate data from greenhouse installed in the LAPER laboratory in Tunisia, the objective of this paper is to propose a solution of the problem of nonlinear time variant inputs and outputs of greenhouse internal climate. Based on fuzzy logic technique combined with least mean squares (lms) a robust greenhouse climate model for internal temperature prediction is proposed. The simulation results are presented to demonstrate the effectiveness of the identification approach and the power of the implemented Takagi-Sugeno Fuzzy model based Algorithm.

Modeling on Policy Conflict for Managing Heterogeneous Security Systems in Distributed Network Environment (분산 환경에서 이종의 보안시스템 관리를 위한 정책 충돌 모델링)

  • Lee, Dong-Young;Seo, Hee-Suk;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • Enterprise security management system proposed to properly manage heterogeneous security products is the security management infrastructure designed to avoid needless duplications of management tasks and inter-operate those security products effectively. In this paper, we defined the security policies using Z-Notation and the detection algorithm of policy conflict for managing heterogeneous firewall systems. It is designed to help security management build invulnerable security policies that can unify various existing management infrastructures of security policies. Its goal is not only to improve security strength and increase the management efficiency and convenience but also to make it possible to include different security management infrastructures while building security policies. With the process of the detection and resolution for policy conflict, it is possible to integrate heterogeneous security policies and guarantee the integrity of them by avoiding conflicts or duplications among security policies. And further, it provides convenience to manage many security products existing in large networks.

An Exploratory Study on Customer-oriented Attributes for the Revitalization of Digital Healthcare Service : Using Interpretive Structural Modeling (디지털 헬스케어 서비스 활성화를 위한 고객지향적 속성에 관한 탐색적 연구 : 해석적 구조 모형을 이용하여)

  • Ji, Daebum;Choi, Jeongil;Kim, Yonghee
    • Journal of Information Technology Services
    • /
    • v.17 no.1
    • /
    • pp.105-119
    • /
    • 2018
  • The healthcare business is growing as a global core business because of the phenomenon of global aging, as well as in South Korea, skyrocketing health care costs accordingly, and changing the paradigm from treatment to the prevention-centered medical service. Especially, as the digital healthcare service stands out as a solution, major countries actively promote and support policies at the government level. Thus, this study will present attributes of a market-oriented service that would vitalize the digital healthcare service industry by investigating major attributes of the digital healthcare service. To analyze the relationships of the influences of attributes, this study used Interpretive Structural Modeling. As a result of literature research and ISM, this study can understand the eight basic attributes of the digital healthcare service (network scalability, context awareness, connection among information platforms, cost, trust, security, ease of use, usefulness) and analyze the relationships of the influences among the attributes. In addition, as this study finds some significant differences in Order Winner and Order Qualifier between the experts' group (security) and the users' group (trust, ease of use, usefulness), It provides meaningful implications for revitalization and promotion of digital healthcare service industry.

Composing Recommended Route through Machine Learning of Navigational Data (항적 데이터 학습을 통한 추천 항로 구성에 관한 연구)

  • Kim, Joo-Sung;Jeong, Jung Sik;Lee, Seong-Yong;Lee, Eun-seok
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.285-286
    • /
    • 2016
  • We aim to propose the prediction modeling method of ship's position with extracting ship's trajectory model through pattern recognition based on the data that are being collected in VTS centers at real time. Support Vector Machine algorithm was used for data modeling. The optimal parameters are calculated with k-fold cross validation and grid search. We expect that the proposed modeling method could support VTS operators' decision making in case of complex encountering traffic situations.

  • PDF

A Study on Weapon Systems Acquisition for the Use of Modeling & Simulation(M&S) (무기체계 획득을 위한 모델링 및 시뮬레이션(M&S) 활용에 관한 연구)

  • Lee, Pil-Jung;Lee, Young-Uk
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.11-17
    • /
    • 2011
  • The acquisition of weapons systems test and evaluation in the early stages of the acquisition process as a source of data used for modeling and simulation are being actively encouraged. Thus, in the reliability of weapon systems acquisition can be called the most important part, and M&S to apply for this test reliability and accuracy of the assessment can provide, test time and cost savings, the pre-and post-test predictions and available data can provide. In this study, theoretical study of M&S to acquire weapon systems used for the importance of M&S, acquired the characteristics of the model, utilization for weapon systems acquisition, and weapon systems acquisition review for an effective utilization of M&S tries to find out.

Diagrammatic Formalism for Complex Systems: More than One Way to Eventize a Railcar System

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.130-141
    • /
    • 2021
  • This paper is in the intersection of software engineering and system engineering, two intimately intertwined disciplines. A dominating theme in this paper is the integral conceptualization of systems at large, as well as an underlying concern with software systems. In the software development life cycle, challenges still exist in translating requirements into a design artifact and then into an implementation (e.g., coding), then validating the results. From our perspective, software engineering requires an integrating paradigm toward a unified modeling orientation. Many methodologies, languages, and tools exist for facilitating system development processes. This paper is a venture into project development. To focus the materials, we concentrate on Harel's novel (and classic) development environment, which integrates a scenario-based engineering object orientation and statecharts through developing a railcar system. The railcar system is used as a detailed sample of translating requirements into a design artifact and then into an implementation, then validating the result. The project is re-cased as a single integrated modeling endeavor to be contrasted with the scenario and statecharts' development. The result of this scheme is an enriched understanding through experimenting with and contrasting various development methods of software projects.

Aspects Of Architectural Design Using BIM Technologies

  • Tikhonova, Oleksandra;Selikhova, Yana;Donenko, Vasyl;Kulik, Mykhailo;Frolov, Denys;Iasechko, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.85-92
    • /
    • 2022
  • In this article, we look at the application of BIM (Building Information Modeling) in sustainable infrastructures. In response to global warming, energy shortages, and environmental degradation, people are trying to build eco-friendly, low-carbon cities and promote eco-friendly homes. A "green" building is the entire life cycle of a building that includes maximizing the conservation of resources (energy, water, land, and materials), protecting the environment, reducing pollution, providing people with healthy, comfortable, and efficient use of space, and establishing harmony between nature and architecture. In the field of ecological and sustainable buildings, BIM modeling can be integrated into buildings with analog energy, air flow analysis, and solar building ecosystems. Using BIM technologies, you can reduce the amount of waste and improve the quality of construction. These technologies create "visualization" of digital building models through multidimensional digital design solutions that provide" modeling and analysis "of Scientific Collaboration Platforms for designers, architects, utility engineers, developers, and even end users. Moreover, BIM helps them use three-dimensional digital models in project design and construction and operational management.

Beyond SDLC: Process Modeling and Documentation Using Thinging Machines

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.191-204
    • /
    • 2021
  • The software development life cycle (SDLC) is a procedure used to develop a software system that meets both the customer's needs and real-world requirements. The first phase of the SDLC involves creating a conceptual model that represents the involved domain in reality. In requirements engineering, building such a model is considered a bridge to the design and construction phases. However, this type of model can also serve as a basic model for identifying business processes and how these processes are interconnected to achieve the final result. This paper focuses on process modeling in organizations, per se, beyond its application in the SDLC when an organization needs further documentation to meet its growth needs and address regular changes over time. The resultant process documentation is created alongside the daily operations of the business process. The model provides visualization and documentation of processes to assist in defining work patterns, avoiding redundancy, or even designing new processes. In this paper, a proposed diagrammatic representation models each process using one diagram comprising five actions and two types of relations to build three levels of depiction. These levels consist of a static description, events, and the behavior of the modeled process. The viability of a thinging machine is demonstrated by re-modeling some examples from the literature.