• 제목/요약/키워드: use of computer

검색결과 10,224건 처리시간 0.039초

Malware Classification using Dynamic Analysis with Deep Learning

  • Asad Amin;Muhammad Nauman Durrani;Nadeem Kafi;Fahad Samad;Abdul Aziz
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.49-62
    • /
    • 2023
  • There has been a rapid increase in the creation and alteration of new malware samples which is a huge financial risk for many organizations. There is a huge demand for improvement in classification and detection mechanisms available today, as some of the old strategies like classification using mac learning algorithms were proved to be useful but cannot perform well in the scalable auto feature extraction scenario. To overcome this there must be a mechanism to automatically analyze malware based on the automatic feature extraction process. For this purpose, the dynamic analysis of real malware executable files has been done to extract useful features like API call sequence and opcode sequence. The use of different hashing techniques has been analyzed to further generate images and convert them into image representable form which will allow us to use more advanced classification approaches to classify huge amounts of images using deep learning approaches. The use of deep learning algorithms like convolutional neural networks enables the classification of malware by converting it into images. These images when fed into the CNN after being converted into the grayscale image will perform comparatively well in case of dynamic changes in malware code as image samples will be changed by few pixels when classified based on a greyscale image. In this work, we used VGG-16 architecture of CNN for experimentation.

ATCIS 성능개량체계 만족 및 지속사용 의도에 미치는 영향요인 (A Study on the Factors Affecting the User Satisfaction and Continuous Use Intention of the Improved Army Tactical Command Information System)

  • 이태복;백승령
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제31권1호
    • /
    • pp.1-24
    • /
    • 2022
  • Purpose The purpose of this study is to investigate the factors that affect the user satisfaction and continuous use intention of the improved ATCIS in the Korean Army. Design/methodology/approach Based on the various theories in relation to IT continuance, user satisfaction was identified as the main factor with regard to the continuous use intention of the improved ATCIS. In addition, computer self-efficacy, education-training, and system quality were hypothesized as antecedent variables to user satisfaction, and information security stress was set as a moderating variable for these relationships. Findings Survey results show that computer self-efficacy, education and training, and system quality had a positive effect on user satisfaction, and information security stress was found to moderate these relationships. The effects of computer self-efficacy and education-training on user satisfaction were higher in the group with low information security stress. However, the relationship between system quality and user satisfaction was higher in the group with high information security stress. User satisfaction is found to have a positive effect on the continuous use intention even with habit considered as a control variable.

Object Detection Using Deep Learning Algorithm CNN

  • S. Sumahasan;Udaya Kumar Addanki;Navya Irlapati;Amulya Jonnala
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.129-134
    • /
    • 2024
  • Object Detection is an emerging technology in the field of Computer Vision and Image Processing that deals with detecting objects of a particular class in digital images. It has considered being one of the complicated and challenging tasks in computer vision. Earlier several machine learning-based approaches like SIFT (Scale-invariant feature transform) and HOG (Histogram of oriented gradients) are widely used to classify objects in an image. These approaches use the Support vector machine for classification. The biggest challenges with these approaches are that they are computationally intensive for use in real-time applications, and these methods do not work well with massive datasets. To overcome these challenges, we implemented a Deep Learning based approach Convolutional Neural Network (CNN) in this paper. The Proposed approach provides accurate results in detecting objects in an image by the area of object highlighted in a Bounding Box along with its accuracy.

Computer use experience of nurses working in hospital

  • Kim, Jung-ae;Cho, Eui-young
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제10권1호
    • /
    • pp.31-39
    • /
    • 2018
  • The purpose of this study was to examine the meaning and structure of nurses' computer using experience. To do this, we conducted a total of three interviews with 11 nurses working between the ages of 26 and 48. Interview data were interpreted using Giori method (1985) and Lincoln & Guba method (1985). As a result, 112 semantic units were derived, and then 18 sub-components were divided into 5 final components. As a result of the analysis, the computer experience that the nurses used in the hospital consisted of 'used for almost every task', 'usefulness', 'important', 'convenience', 'burden', 'anxiety', desire', simple work level', 'no problems', 'eye, muscle and movement discomfort', 'depends on task', 'more complex', 'accuracy', 'organize contents', 'simple', 'incomparable', and 'easy'. Based on the above conclusions, the nurses' experiences of using the computer in the hospital could be concluded as follows. Currently, almost all nursing jobs in hospitals are using computers. However, most of the tasks related to simple computer tasks related to the ability to use the computer was low, and because of this, the computer did not work properly, or when new programs were introduced to feel the burden and anxiety, want more systematic computer education Found. Especially, according to the career, the difference between computer and hand work was different, Nurses over 20 years said that computers can handle simple tasks that are a bit more complicated than manual tasks, whereas emotional tasks were handicapped, in the 10 to 20 years of experience, computer work was more accurate and appropriate to organize content, Nurses under 10 years were not only easy to work with computers but also have no experience in manual work, they could not compare the computer and the hand work. This study suggests that the use of computers in nurses' work is essential and that more systematic computer-based education should be provided. In addition, due to the nature of the nursing service, the professional opinions of the nurses should be reflected in the development of programs for the emotional nursing work.

TMUML: A Singular TM Model with UML Use Cases and Classes

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.127-136
    • /
    • 2021
  • In the systems and software modeling field, a conceptual model involves modeling with concepts to support development and design. An example of a conceptual model is a description developed using the Unified Modeling Language (UML). UML uses a model multiplicity formulation approach, wherein a number of models are used to represent alternative views. By contrast, a model singularity approach uses only a single integrated model. Each of these styles of modeling has its strengths and weaknesses. This paper introduces a partial solution to the issue of multiplicity vs. singularity in modeling by adopting UML use cases and class models into the conceptual thinging machine (TM) model. To apply use cases, we adopt the observation that a use-case diagram is a description that shows the internal structure of the part of the system represented by the use case in addition to being useful to people outside of the system. Additionally, the UML class diagram is recast in TM representation. Accordingly, we develop a TMUML model that embraces the TM specification of the UML class diagram and the internal structure extracted from the UML use case. TMUML modeling introduces some of the advantages that have made UML a popular modeling language to TM modeling. At the same time, this approach supplies UML with partial model singularity. The paper details experimentation with TMUML using examples from the literature. Our results indicate that mixing UML with other models could be a viable approach.

초·중학생의 컴퓨터 활용 및 정보(컴퓨터) 교육 경험이 ICT 리터러시 수준에 미치는 영향 (The Effects of Elementary and Middle School Students' Computer Use and Information(Computer) Educational Experiences on their ICT Literacy Levels)

  • 남창우;안성훈
    • 한국콘텐츠학회논문지
    • /
    • 제16권10호
    • /
    • pp.18-32
    • /
    • 2016
  • 본 연구의 목적은 초 중학생들의 컴퓨터 활용 및 정보(컴퓨터) 교육 경험에 따른 ICT 리러터시 수준을 측정하여 분석하고자 하였다. 이를 위해, 2015년도 초등학교 300개 학교의 4~6학년, 중학교 300개 학교의 1~3학년을 대상으로 ICT 리터러시 검사를 실시하였다. 검사의 내용에는 능력요소와 내용요소이라는 두 가지 영역을 포함하고 있다. 주요 연구 결과를 살펴보면 다음과 같다. 첫째, 초 중학교 모두에서 가정 내 컴퓨터 이용 정도 및 학교 밖 컴퓨터 이용 정도가 높을수록 대체로 ICT 리터러시 수준이 높아지지만, 과도한 컴퓨터 활용은 오히려 ICT 리터러시 수준을 낮추는 부정적인 결과를 나타내고 있다. 둘째, 초 중학교 모두에서 정보(컴퓨터) 교육 경험 시간이 많을수록, ICT 리터러시 수준도 함께 증가하는 것으로 나타내고 있다.

Be Aware -Application for Measuring Crowds Through Crowdsourcing Technique in Makkah Al-Mukarramh

  • Mirza, Olfat M.;Alharbi, Israa;Khayyat, Sereen;Aleidarous, Rawa;Albishri, Doaa;Alzhrani, Wejdan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.199-208
    • /
    • 2022
  • The world health organization classified the emerging coronavirus (known as Covid-19) as a pandemic after confirming the extent of spread and scale. As a matter of fact, outbreaks of similar scale or even worse have been witnessed throughout history. Thus, the development of prevention strategies exists to protect against such calamaties. One of the widely proven measures that controls the spread of any contagious diseases is social distancing. As a result, this paper will demonstrate the concept of an application "Be Aware" on enabling the implementation of this preventive measure. In particular "Be aware" evaluates the extent of congestion in public places using current time data. The proposed project will use Global Positioning System (GPS), and Application Programming Interface (API), to ensure information accuracy, and the API use Crowdsourcing to collect Real-Time Data (RTD) from the selected places. One line

실내 건축 설계를 위한 CAD 소프트웨어 개발에 관한 연구-CAD로부터 가상현실 GRAPHIC PROGRAM으로의 전환을 통하여- (A Study on the Development of Computer Aided Design Software for Interior Architectural Design-From CAD(Computer Aided Design) to Virtual Reality of Transforting)

  • 이남수
    • 한국실내디자인학회논문집
    • /
    • 제12호
    • /
    • pp.40-49
    • /
    • 1997
  • What's the direction of INTERIOR ARCHITECTURAL DESIGN in 21 Century High Tech\ulcorner The purpose of this research is to show not only practical use of Computer Graphic(CG) as simple tool function, but offering conversation with computer and other ways of method. When we consider poor CG market, investment on the research of VR(Virtual Reality) is the most urgent. The investment on VR will solve various problems. Firstly. It will solve the problems drived from Interior design process by making spatial images like reality. Secondly, It will solve high wages and financial difficulties caused by raise cost funds. Thirdly, It prevents in a road from foreign company that will bring enormous program, caused by opening the domestic market. Also, It help interior designer check in advance the problems in constructure through showing him a supposed imagination including the system and location of equipments. But it is reality that even ordinary American can't offer VR(Virtual Reality) System. We should have noted that it is normal to spend 10 billion won for such presentation as Model House in the large corporation. We must acknowledge that it is such a waist of money nationally. Therefore, investment on CG & VR System is essential in order to save cost more effective presentation & interior design. We will see great result within a year. As we can see, there is huge area we have make develop. One of them is specific technical plan on VR System and study of flow chart. We close with simple methodological way to use VR System and will study Computer System. Which is fitting to CG that we have to solve the link of hardware and software on VR System\ulcorner We know from the cases in other countries that continuous research on this subject has great value for Interior Architectural Design and its effective use. When we try hard not only for methodological use but practical use, the purpose of CG and VR System will be a factor to contribute on this subject for better Interior design & presentation.

  • PDF

The Level of ELMS Success in Satisfying Students at Al-Jouf University During the Corona Crisis

  • Azim, Zeinab M. Abdel;Shahin, Osama R.;Khalaf, Mohamed H. Ragab;Taloba, Ahmed I.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.241-249
    • /
    • 2022
  • The current research attempts to measure the level of the acceptance of the Blackboard System (BBS) during the Corona crisis, and whether this is one of the reasons for the low use of the BBS at Al-Jouf University. To achieve this, the technology accepting model in the time of crisis (TAMTC) has been proposed to measure the degree of acceptance by students, which was then applied to a random sample of 339 of such. The results show a high level of student acceptance, despite their lower use of the system. The research also highlights the importance of upgrading e-courses and that the discontinuation of exam disqualification of students is secondary to their poor course attendance.

A Newly Telesecurity of VoIP using SIP protocol in VPN

  • Lee, Sung-Ki;Hwang, Doh-Yeun;Yi, Seung-Ryong;Yu, Seung-Sun;Kwak, Hoon-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1391-1394
    • /
    • 2005
  • The VoIP (Voice over IP) is being used world-widely and already put to practical use in many fields. However, it is needed to ensure the security of VoIP call in special situations. It is relatively difficult to eavesdrop commonly used PSTN network in that a 1:1 circuit connects it. However, it is difficult to ensure the security of a call on Internet because many users are connected to the Internet concurrently. This paper suggests a new model for Internet telephony to prevent eavesdrops, using VoIP (using SIP protocol) with the use the VPN protocol and establish the feasibility of its practical use comparing it with the conventional Internet telephony.

  • PDF