International Journal of Computer Science & Network Security
국제컴퓨터통신보호논문지학회 (International Journal of Computer Science & Network Security)
- 월간
- /
- 1738-7906(pISSN)
제21권11호
-
Theng, Chong Poh;Othman, Nur Fadzilah;Abdullah, Raihana Syahirah;Anawar, Syarulnaziah;Ayop, Zakiah;Ramli, Sofia Najwa 1
Cyberbullying has become a severe issue and brought a powerful impact on the cyber world. Due to the low cost and fast spreading of news, social media has become a tool that helps spread insult, offensive, and hate messages or opinions in a community. Detecting cyberbullying from social media is an intriguing research topic because it is vital for law enforcement agencies to witness how social media broadcast hate messages. Twitter is one of the famous social media and a platform for users to tell stories, give views, express feelings, and even spread news, whether true or false. Hence, it becomes an excellent resource for sentiment analysis. This paper aims to detect cyberbully threats based on Naïve Bayes, support vector machine (SVM), and k-nearest neighbour (k-NN) classifier model. Sentiment analysis will be applied based on people's opinions on social media and distribute polarity to them as positive, neutral, or negative. The accuracy for each classifier will be evaluated. -
Postolenko, Iryna;Vozniuk, Alla;Kyrychenko, Rymma;Gavran, Iryna;Brukhovetska, Oleksandra;Chausova, Tetiana 11
The article proposes that empathy differs in severity and types among students of different specialties. And to test this hypothesis, an experimental study of students from 4 different faculties was carried out. As a result of the study, it was found that empathy is more pronounced among students of "humanitarian" specialties, and students of "exact" specialties have the least pronounced empathic abilities. -
Muhammad, Wazir;Hussain, Ayaz;Shah, Syed Ali Raza;Shah, Jalal;Bhutto, Zuhaibuddin;Thaheem, Imdadullah;Ali, Shamshad;Masrour, Salman 17
Recently, image super-resolution techniques used in convolutional neural networks (CNN) have led to remarkable performance in the research area of digital image processing applications and computer vision tasks. Convolutional layers stacked on top of each other can design a more complex network architecture, but they also use more memory in terms of the number of parameters and introduce the vanishing gradient problem during training. Furthermore, earlier approaches of single image super-resolution used interpolation technique as a pre-processing stage to upscale the low-resolution image into HR image. The design of these approaches is simple, but not effective and insert the newer unwanted pixels (noises) in the reconstructed HR image. In this paper, authors are propose a novel single image super-resolution architecture based on synchronized depthwise separable convolution with Dense Skip Connection Block (DSCB). In addition, unlike existing SR methods that only rely on single path, but our proposed method used the synchronizes path for generating the SISR image. Extensive quantitative and qualitative experiments show that our method (SDCN) achieves promising improvements than other state-of-the-art methods. -
Sentiment Analysis has become very important field of research because posting of reviews is becoming a trend. Supervised, unsupervised and semi supervised machine learning methods done lot of work to mine this data. Feature engineering is complex and technical part of machine learning. Deep learning is a new trend, where this laborious work can be done automatically. Many researchers have done many works on Deep learning Convolutional Neural Network (CNN) and Long Shor Term Memory (LSTM) Neural Network. These requires high processing speed and memory. Here author suggested two models simple & bidirectional deep leaning, which can work on text data with normal processing speed. At end both models are compared and found bidirectional model is best, because simple model achieve 50% accuracy and bidirectional deep learning model achieve 99% accuracy on trained data while 78% accuracy on test data. But this is based on 10-epochs and 40-batch size. This accuracy can also be increased by making different attempts on epochs and batch size.
-
Several studies have been conducted on market orientation over the last three decades. However, the majority of previous research focused exclusively on an internal vision that conceives the market orientation from an organizational perspective, considering the market orientation as a strictly perceived culture or behavior by company's staff (managers and employees) .This study aims to emphasize the importance of analyzing the market orientation from a dual perspective by investigating simultaneously the perceptions of customers and those of managers. It examines the perceptual gap or perceptual congruence of market orientation between customers and managers. A survey is conducted with Tunisian bank managers and B to B customers to measure their market orientation perception. The results should reveal level of manager's market orientation in Tunisian banks compared to customers' perceptions. The perception gaps of market orientation between managers and customers named congruence is highlighted and categorized. This study provides some contributions to fill the gap emerging from the one-sidedness of market orientation evaluation and gives a dyadic vision of market orientation that helps managers in their continuous learning about markets and sensing customers' needs and expectations. Market orientation level between the two groups is evaluated to give some managerial recommendations.
-
Prylipko, Sergii;Vasylieva, Nataliia;Kovalova, Olena;Kulayets, Mariia;Bilous, Yana;Hnatenko, Iryna 43
The article proposes a method of modeling a comprehensive indicator for evaluating the effectiveness of regional management of innovation activity. This will make it possible to assess the effectiveness of personnel, financial and credit and foreign economic activity of the regions from the standpoint of an integrated approach. The modeling technique is proposed to be carried out using the tools of taxonomic analysis and the calculation of a complex indicator of the effectiveness of the innovation activity management. -
DIGITAL TECHNOLOGIES AND RANKINGS AS TOOLS OF THE COMPETITIVENESS IN THE EDUCATIONAL SERVICES MARKETDjakona, Antonina;Lavrov, Ruslan;Anisimova, Liudmyla;Koval, Oksana;Polkhovska, Maryna;Shumaieva, Svitlana 49
Globalization of higher education deepens the competition in the global educational services market. Competition between higher education institutions is based on the use of a wide range of activities and tools that are constantly evolving and becoming more complex. Digitalization significantly transforms the approaches to competition between universities in educational, research and marketing activities. Digital technologies are becoming an integral part of this competition. In addition, in the current conditions of globalization of the scientific and educational space, numerous rankings of universities have become an important tool of the competition; the most significant rankings of universities are as follows: Academic Ranking of World Universities (China), Times Higher Education Rankings of Universities (Great Britain), Webometrics (Spain). In the article, the key principles of the formation of world rankings of universities are analyzed, the main sources of information resources for their compilation are determined. The authors have concluded that the improvement of the position of educational institutions in the world rankings of universities should be implemented within the framework of the state educational policy. The key positive effects of universities due to increasing the competitiveness level of the national higher education system are specified. -
Kamaruddin, Farhan Fikri Mohd;Hadiana, Ana;Lokman, Anitawati Mohd 59
Many incidents of Carbon Monoxide (CO) poisoning have occurred because of people being unaware of its presence. There are currently available systems on the market, but they are limited to measuring CO in a certain area and lack vital functions. Additionally, little to no evidence-based information on their quality was available. Thus, a mobile application for detecting CO gas leakage in a vehicle and critical features to assist victims was developed. A usability and functionality test were conducted to determine the product's quality utilizing nine usability and six functionality task scenarios (n=5). Then, a System Usability Scale test was performed to obtain system satisfaction, usability, and learnability (n=50). The usability and functionality test shows that all the tasks given for both tests were 100% successful. The overall score obtained for SUS was 71.4, which indicates good acceptance and usability. Around 20% of respondents claimed that they would need the support of a technical person to be able to use the application and that they needed to learn a lot of things before they could use the application, which indicates the overall high learnability of the application. The result provides empirical evidence that the CO gas leakage detection mobile application is successful and receives good usability, functionality, acceptability, learnability, and satisfaction assessments. DetGas could benefit automobile owners and other stakeholders by mitigating the risk and harm associated with gas leaking that exceeds the safe limit. -
Khodakivska, Olga;Ramos, Olena Ribeiro;Nechyporenko, Oleksandr;Tsiutsiupa, Svitlana;Krasnoshtan, Olexander;Mayovets, Yaryna 67
The article identifies areas for effective management of innovative development. The competitiveness of the economy in the context of European integration and economic security is assessed. The level of innovative economy of some countries of the world is analyzed. The issue of attracting foreign investors to stimulate innovative production in Ukraine is raised. It is identified the need for the formation of an updated state policy capable of providing innovative development and improving the competitive position of the state in international rankings. Emphasis is placed on the need to form a critical mass of managers-civil servants capable of developing, implementing and monitoring the policy of innovative development of entrepreneurship. -
Alharbi, Shada;Alyoubi, Khaled;Alotaibi, Fahd 73
Nowadays microblogs have become the most popular platforms to obtain and spread information. Twitter is one of the most used platforms to share everyday life event. However, rumors and misinformation on Arabic social media platforms has become pervasive which can create inestimable harm to society. Therefore, it is imperative to tackle and study this issue to distinguish the verified information from the unverified ones. There is an increasing interest in rumor detection on microblogs recently, however, it is mostly applied on English language while the work on Arabic language is still ongoing research topic and need more efforts. In this paper, we propose a combined Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) to detect rumors on Twitter dataset. Various experiments were conducted to choose the best hyper-parameters tuning to achieve the best results. Moreover, different neural network models are used to evaluate performance and compare results. Experiments show that the CNN-LSTM model achieved the best accuracy 0.95 and an F1-score of 0.94 which outperform the state-of-the-art methods. -
Karpenko, Oksana;Bonyar, Svitlana;Tytykalo, Volodymyr;Belianska, Yuliia;Savchenko, Serhii 81
The presented scientific research substantiates the principles of the mechanism of the investment resources involvement in order to introduce innovations at enterprises in the context of digitalization using a resource-functional approach. The importance of attracting investment resources, which contributes to the modernization of production systems, the creation of a stable economic field of development of economic entities, is justified. The expediency of application of the resource-functional approach on research of the mechanism of attraction of investment resources for introduction of innovations at the enterprises in the conditions of digitalization is proved. The investment process is presented in the form of a chain of interdependent processes which include: attraction of investment resources, investments, increase of investment value, profit. It is proved that the mechanism of attracting investment resources for the introduction of innovations in enterprises in the context of digitalization cannot be considered in isolation from the process, due to the fact that the mechanism is aimed at performing specific functions. The functions of the mechanism include management, complex, coordination, monitoring, performance and control functions. Functions of the mechanism of attraction of investment resources for introduction of innovations at the enterprises in the conditions of digitalization are caused by the purposes of attraction of investment resources for innovative development; the presence of an objective nature; relative independence and homogeneity; implementation of functions in the process of investing in innovative activities of the enterprise. -
Almutairi, Mubarak;Mutiullah, Mutiullah;Munir, Kashif;Hashmi, Shadab Alam 89
This work is an extension of my work presented a robust and economically efficient method for the Discrimination of four Mung-Beans [1] varieties based on quantitative parameters. Due to the advancement of technology, users try to find the solutions to their daily life problems using smartphones but still for computing power and memory. Hence, there is a need to find the best classifier to classify the Mung-Beans using already suggested features in previous work with minimum memory requirements and computational power. To achieve this study's goal, we take the experiments on various supervised classifiers with simple architecture and calculations and give the robust performance on the most relevant 10 suggested features selected by Fisher Co-efficient, Probability of Error, Mutual Information, and wavelet features. After the analysis, we replace the Artificial Neural Network and Deep learning with a classifier that gives approximately the same classification results as the above classifier but is efficient in terms of resources and time complexity. This classifier is easily implemented in the smartphone environment. -
Yurchenko, Artem;Drushlyak, Marina;Sapozhnykov, Stanislav;Teplytska, Alina;Koroliova, Larysa;Semenikhina, Olena 97
The authors provide characteristics of the open educational platforms, classification and quantitative analysis regarding the availability of IT courses, teaching language, thematic directions on the following platforms: Coursera, EdX, Udemy, MIT Open Course Ware, OpenLearn, Intuit, Prometheus, UoPeople, Open Learning Initiative, Open University of Maidan (OUM). The quantitative analysis results are structured and visualized by tables and diagrams. The authors propose to use open educational resources (teaching, learning or research materials that are in the public domain or released with an intellectual property license that allows free use, adaptation, and distribution) for organization of independent work; for organization of distance or correspondence training; for professional development of teachers; for possibility and expediency of author's methods dissemination in the development of their own courses and promoting them on open platforms. Post-project activities are considered in comparing the courses content of one thematic direction, as well as studying the experience of their attending on different platforms. -
Al-Mekhlafi, Zeyad Ghaleb;Mohammed, Badiea Abdulkarem 105
Contact between Vehicle-to-vehicle and vehicle-to-infrastructural is becoming increasingly popular in recent years due to their crucial role in the field of intelligent transportation. Vehicular Ad-hoc networks (VANETs) security and privacy are of the highest value since a transparent wireless communication tool allows an intruder to intercept, tamper, reply and erase messages in plain text. The security of a VANET based intelligent transport system may therefore be compromised. There is a strong likelihood. Securing and maintaining message exchange in VANETs is currently the focal point of several security testing teams, as it is reflected in the number of authentication schemes. However, these systems have not fulfilled all aspects of security and privacy criteria. This study is an attempt to provide a detailed history of VANETs and their components; different kinds of attacks and all protection and privacy criteria for VANETs. This paper contributed to the existing literature by systematically analyzes and compares existing authentication and confidentiality systems based on all security needs, the cost of information and communication as well as the level of resistance to different types of attacks. This paper may be used as a guide and reference for any new VANET protection and privacy technologies in the design and development. -
Komandrovska, Veronika;Kolesnyk, Maksym;Barkova, Kateryna;Vasylyk, Sergii;Dorofieiev, Denys 111
The authors of the study highlight the conceptual foundations of the investment mechanism of innovation of enterprises in the context of strategic development. Such indicators of investment attraction for the enterprise as investment attractiveness, investment activity of the enterprise, critical mass of investments, minimum sufficiency of investments and others are singled out. It is proved that the balance of investment resources is facilitated by the action of the investment mechanism of innovation activity at the enterprise in the context of achievements of strategic development tasks. Investment processes and their intensification have an impact on the expansion of production capacity of economic entities in strategic development and on improving the efficiency of existing capacities. The investment mechanism of innovative activity at the enterprise in the context of achievement of tasks of strategic development contains system of complex actions which provides: definition of the clear purpose and tasks for the mechanism and achievement of the purposes of the enterprise; assessment of the investment potential of the enterprise; definition of tasks of innovative development of enterprises and investment resources necessary for this purpose, etc. The tasks of the investment mechanism of innovative activity at the enterprise in the context of achievements of tasks of strategic development and its economic, organizational and information components are singled out, as well as levers of influence and regulators of the investment mechanism of innovation in the enterprise. -
This study aimed at Evaluate Students' Interaction and Happiness in Distance Learning Among Students with Learning-Difficulties, by identifying the level of students' interaction in distance education and differences between them, as well as its impact on their happiness to learn. To achieve the aim of the study, two scales were designed for this purpose and were applied to a sample consisting of (310) individuals. The results showed that the level of students' interaction through the e-learning platform was at a high level. The results also showed that there was no statistically significant difference between the mean scores of males and females in the scale of students' interaction through the e-learning platform. There was no statistically significant difference between them in their happiness for distance learning via the online platform. There were also no statistically significant differences related to the grade variable in the level of interaction through the electronic platform and in the happiness to learn, while there was a positive statistically significant effect of interaction through the electronic platform on students' happiness to learn.
-
Yurchenko, Liubov;Lazorenko, Serhii;Mnozhynska, Ruslana;Tymoshenko, Yelyzaveta;Hatsenko, Halyna;Narozhna, Nadiia 131
The article conducted an interdisciplinary study of the concepts of innovation, innovation, innovative educational process, pedagogical innovation, management of an educational institution. Based on the study of psychological, methodological, philosophical literature, scientific approaches to the management of an innovative educational institution have been analyzed, and a strategy for its improvement has been determined. Purpose of the work: to study and characterize innovations in education, as well as in the education system. -
Matveev, Vitaliy;Eduardivna, Nykytchenko Olena;Stefanova, Nataliia;Khrypko, Svitlana;Ishchuk, Alla;Ishchuk, Olena;Bondar, Tetiana 135
The article reveals the essence of cybercrime, approaches to understanding this concept, classification of cybercrime, and other illegal acts in this area. The concept of cybercrime has multi-discourse nature and a certain legal uncertainty. Cybercrimes, their forms and types are analyzed in the economic context. The research vocabulary of the economic industry is defined. The scope and content of concepts denoted by the terms of the sphere covered by cybercrime are studied, and its types and forms are analyzed. The article studies problems, achievements, and prospects of resisting and combating cybercrime during the development of the civil information society and Ukraine's entry into the global information space. The study focuses on the economic motivation of most cybercrimes since some material benefit from the fact of cyber offenses is assumed directly or indirectly. -
Matvieiev, Petro;Baadzhy, Nataliia;Gurenko, Maria;Myroshnychenko, Volodymyr;Feofanova, Iryna 143
International economic and legal cooperation can ensure the transition of agriculture to the trajectory of sustainable development. The paper considers in detail the set of common goals and problems of an international nature, the solution of which is aimed at global legal regulation of cooperation between states. It is also noted about the impact of information technology on agricultural development. The following methods of scientific cognition are used: a historical, systematic approach to research, method of analysis, and synthesis. Research results: a scientific idea of the importance of international cooperation in general and global collaboration in the field of agricultural production in particular. It is stated that states are obliged to cooperate, regardless of differences in their political, economic, and social systems, in various areas of international relations to maintain international peace, security and promote worldwide economic stability and progress, the common good of peoples. It is emphasized the need to build such relations in the agricultural sector, which take into account the interests of all states. -
Diachenko, Iurii;Ovchar, Oleksandr;Dubka, Oleksandr;Pastukhov, Oleksandr;Duve, Khrystyna;Kostiuk, Dmytro 151
The article provides an examination of those temporary states of disturbances in the psychophysiological and socio-psychological spheres of a person, which develop against the background of normally formed mechanisms of mental activity, that is, in mentally healthy people. A healthy person is a person adapted to the conditions of the external environment, and mental health is inseparable from the physical and social well-being of a person. The cause of the disorder is the impact on a person of any environmental factors that weaken the mechanisms of social and psychological adaptation of the individual. -
This endeavor is an attempt to explore the effect of flipped classroom strategy (FCS) on (a) academic achievement in the computer and information technology course and (b) students' attitudes towards this strategy. The sample of the study consisted of 64 students, divided into two groups: experimental and control groups. Two instruments were used to collect the data: a test and a questionnaire. The test was used to measure the students' achievement and the questionnaire to measure their attitudes towards the FCS. The results show statistically significant differences at the level of 0.05 in support of the experimental group at all Bloom's levels. Similarly, students' positive attitude towards the FCS was evident. Therefore, expanding this strategy in different courses is highly recommended because it positively impacts students' achievements. Organizing workshops and designing courses that encourage teachers to implement the strategy in the classroom and develop their technical skills are also recommended.
-
Discrete event systems interact with the external environment to decide which action plan is adequate. Some of these interactions are not predictable in the modelling phase and require consequently an adaptation of the system to the metamorphosed behavior of the environment. One of the challenging issues is to guarantee safety behavior when failures tend to derive the system from normal status. In this paper we propose a framework to combine diagnose technique with adaptive control to avoid unsafe sate an maintain the normal behavior as long as possible.
-
Kushnir, Iryna;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Stepanova, Yuliia;Kushnir, Yaroslav 171
The article considers some issues of criminal law protection of information relations. With the emergence of new types of threats to Ukraine's national security in the field of protection and defense of the state border, the issues of development and strengthening of information protection become especially important. Proper compliance with information legislation also depends on the established responsibility for its violation, which rests on certain provisions of the Criminal Code of Ukraine. It is stated that these norms are placed in different sections and do not have a proper systematization. The article singles out the subjects of information relations in the border area, which are subject to criminal law protection: persons who are not bound by stable relations with the SBGS (who cross the state border of Ukraine, etc.); persons who are members of the SBGS (servicemen and employees); SBGS as a public authority (official and secret information, information about the activities of the agency, its officials, etc.). -
Kravchuk, Nadiia;Kinakh, Nelia;Bortniuk, Tetiana;Fedosenko, Karina;Burlaka, Anna 177
The theoretical and methodological provisions that allow to systematically and comprehensively study the postgraduate pedagogical education of teachers; the essence and features of postgraduate pedagogical education of teachers of diverse training institutions, providing professional and pedagogical training of this category of pedagogical personnel, have been determined; regularities, principles and conditions for the implementation of promising directions of development of the system of postgraduate pedagogical education for teachers of diverse training have been developed; developed technological support for the development of postgraduate pedagogical education for teachers of multidisciplinary training; identified and substantiated promising directions for the development of postgraduate pedagogical education for teachers of multidisciplinary training in vocational education, due to the modernization. -
Alharbi, Nawaf F;Soh, Ben;AlZain, Mohammed A;Alharbi, Mawaddah F 181
The use of the internet has become a basic need for many across the globe. The situation is very much the same for the youth in many countries like Saudi Arabia who have grown up surrounded and accessing the internet. This demographic, however, is at an increased risk of falling as victims to cybercrime because of a low level of technical awareness. This review looks at the level of technical awareness of internet use in 3 different countries which include the USA, South Africa, and New Zealand. The review will compare the situation in these nations with those in KSA. Based on the review and comparisons, recommendations are made for culturally and socially acceptable e-Safety awareness of Saudi youths. -
Andrusiv, Uliana;Skrypnyk, Volodymyr;Zihunova, Inna;Klochko, Oleksii;Khutkyy, Volodymyr 189
The article is devoted to the issue of the content of legal instruments in terms of tourism business, namely the problems of legal regulation of insurance in tourism. The analysis of the state of development of the problem in question shows that the issue of legal regulation of the insurance contract in general and the contract in tourism services, in general, is insufficiently studied. The article is devoted to topical issues of legal regulation of insurance in the field of tourism, the search for effective mechanisms to increase the liability of both underwriters and insurers. Therefore, insurance can be considered as one of the methods of preventing unfortunate consequences during the implementation of tourism activities. The author's vision of the content of the package of measures that can positively influence not only the development of the tourist industry in general but primarily to help identify those legal segments that need improvement in the future has been stated. -
Abdurrohman, Abdurrohman;Rahman, Aedah Abd;Hadiana, Ana;Lokman, Anitawati Mohd 193
The application of e-Voting plays an important role in order to support democracy activities in Indonesia, such as elections at different levels. E-Voting has the function of providing better service to people in order to participate in elections. This research attempts to develop the appearance of the user interface of e-Voting based on users' emotional preferences using Kansei Engineering. Kansei Engineering is used in this research to analyze emotional feelings regarding e-Voting applications' presented Kansei words and give a recommendation on the most suitable user interface to be considered in their development. This research observed two main users' emotional feelings ("calm" and "formal") selected from ten Kansei words. The final recommendation is a conceptual element designed for designing e-Voting applications based on the Kansei word "calm". -
Dutta, Ashit Kumar;Wahab sait, Abdul Rahaman;Keshta, Ismail Mohamed;Elhalles, Abheer 199
Rhetorical relations between two text fragments are essential information and support natural language processing applications such as Question - Answering (QA) system and automatic text summarization to produce an effective outcome. Question - Answering (QA) system facilitates users to retrieve a meaningful response. There is a demand for rhetorical relation based datasets to develop such a system to interpret and respond to user requests. There are a limited number of datasets for developing an Arabic QA system. Thus, there is a lack of an effective QA system in the Arabic language. Recent research works reveal that unsupervised learning can support the QA system to reply to users queries. In this study, researchers intend to develop a rhetorical relation based dataset for implementing unsupervised learning applications. A web crawler is developed to crawl Arabic content from the web. A discourse-annotated corpus is generated using the rhetorical structural theory. A Naïve Bayes based QA system is developed to evaluate the performance of datasets. The outcome shows that the performance of the QA system is improved with proposed dataset and able to answer user queries with an appropriate response. In addition, the results on fine-grained and coarse-grained relations reveal that the dataset is highly reliable. -
Dubyna, Maksym;Panchenko, Olena;Bazilinska, Olena;Donkohlova, Tetyana;Shpomer, Alla;Rudenko, Oksana 207
The aim of the article is to study the role of informal institutions in the development of the financial services market. The study outlines the concepts of scholars to identify the main types of informal institutions. The mechanism of research of influence of the informal factor on functioning of economic object is developed. The main types of informal institutions are systematized. The main informal institutions influencing the development of the financial services market are considered. The application of a synergetic approach to the consideration of the impact of the institution of trust on the financial services market is proposed. -
Advances in technology have given educators a tool to empower them to assist with developing the best possible human resources. Teachers at universities prefer to use more modern technological advances to help them educate their students. This opens up a necessity to research the capabilities of cloud-based learning services so that educational solutions can be found among the available options. Based on that, this essay looks at models and levels of deployment for the e-learning cloud architecture in the education system. A project involving educators explores whether gement Systems (LMS) can function well in a collaborative remote learning environment. The study was performed on how Blackboard was being used by a public institution and included research on cloud computing. This test examined how Blackboard Learn performs as a teaching tool and featured 60 participants. It is evident from the completed research that computers are beneficial to student education, especially in improving how schools administer lessons. Convenient tools for processing educational content are included as well as effective organizational strategies for educational processes and better ways to monitor and manage knowledge. In addition, this project's conclusions help highlight the advantages of rolling out cloud-based e-learning in higher educational institutions, which are responsible for creating the integrated educational product. The study showed that a shift to cloud computing can bring progress to educational material and substantial improvement to student academic outcomes, which is related to the increased use of better learning tools and methods.
-
Lepeyko, Tetyana;Chernoivanova, Hanna;Pererva, Ivanna;Poberezhna, Zarina;Zabashtanska, Tetiana 223
The presented research is devoted to determining the role of the mechanism of attracting investment resources in innovative development in the conditions of transformation using the process approach. It is proved that the process approach is dominant for this study because investments are considered as a process of investing in innovative development in the enterprise in the context of digitalization, and its application allows to take into account the impact on the mechanism of attracting investment resources. related to the mechanism of attracting investment resources of the enterprise. It is substantiated that the mechanism of attracting investment resources for innovative development in the context of digitalization is a specific way of organizing, mobilizing and using investment resources for innovative development of the enterprise in the context of digitalization under the influence of economic development laws, government regulation. The effectiveness of attracting investment resources in innovative development is ensured by the mechanism that exists in the enterprise. The mechanism of attraction of investment resources in innovative development in the conditions of digitalization gives the chance to define an optimum ratio between sources and volume of attraction of investments in innovation sphere. -
This paper presents the definition of a business process and a taxonomy of anomalies in BPMN. Graphical modeling is very popular nowadays and is easily understood by various specialists from different fields. Modeling is a graphical representation of processes in an organization using available rules and resources. Therefore, it is important to use a universal and comprehensive standard to describe models of processes, decisions and software. Such a standard is the BPMN notation, which is a precise notation, but unfortunately it is only a descriptive and graphical form that may contain inaccuracies. The aim of this paper is to collect and analyze available literature describing current state of knowledge about BPMN notation and to present problems and shortcomings related to this topic. The paper includes a taxonomy of problems, their definitions and examples of occurrence in real cases.
-
Vorokhobin, Igor;Burmaka, Igor;Ivanov, Oleksandr;Perepechayev, Sergiy;Naboka, Ivan;Kulakov, Maksym 241
In the article, an analysis of the factors was carried out, which injected into the efficiency of the function of navigation systems in the minds of unimportance. Carrying out analyzes allowing for the visibility of relevant direct adjustments to the effectiveness of the function Inertial navigation systems in the minds of non-value. The designation of the navigation system was assigned to a complex of navigation systems on ships processing of the vector of navigation parameters, so that they can be victorious in the control systems of the ship's collapse, and the safety of floating is safe. -
Нritchenko, Tetiana;Dekarchuk, Serhii;Byedakova, Sofiia;Shkrobot, Svitlana;Denysiuk, Nataliia 248
The article discusses the evolution of the development of distance learning in world practice; investigated the essence and modern content of the concepts of "distance learning" and "distance education"; studied the principles of distance learning in the educational process; analyze the use of distance learning in higher educational institutions of Ukraine; substantiated the effectiveness of introducing distance learning into the higher education system; formed new management approaches in the distance learning system; proposals for the organization and improvement of distance learning at the university were developed on the basis of the analysis. -
Hamid, Erman;Hasbullah, M. Syafiq E.;Harum, Norharyati;Anawar, Syarulnaziah;Ayop, Zakiah;Zakaria, Nurul Azma;Shah, Wahidah Md 257
Home networking and its security issues are directly related. Previous studies have shown that home-network and understanding the security of it is a problem for non-technical users. The existing network management tools or ISP adapter tools are far too technical and difficult to be understood by ordinary home-network users. Its interface is not non-technical user-directed and does not address the home user's needs in securing their network. This paper presents an interactive security monitoring tool, which emphasizes support features for home-network users. The tool combines an interactive visual appearance with a persuasive approach that supports sustainability. It is not only an easy-to-use tool for all categories of home-network users but also acts as a monitoring feature for the user to secure their home-network. -
Soroka, Maryna;Shtefiuk, Valeriia;Tatarenko, Maryna;Babchenko, Yanina;Ivashchenko, Irina 266
The article clarifies and divorces the concepts of distance learning systems "distance learning", "distance education", "distance technologies", "open education". The central concept of the DO system is "distance learning"; - an assessment of the use of distance technologies in the system of higher professional education in Ukraine was carried out, which showed that the dominant teaching technology at the moment is the technology of teaching using cases (case technology on paper and electronic media). It is determined that distance technologies based on the active use of technical teaching aids (network technologies, telecommunication technologies) find little use in the system of higher professional education in Ukraine. -
Kovalenko, Yelena;Kirdan, Oleksandr;Krivonos, Anatoliy;Dobrovolska, Olena;Gutsul, Tetiana;Hromov, Sergii 271
The article assesses the role of the human factor in management, analyzes the personnel policy, as well as the style and methods of management at the enterprise. The purpose of the article is to study the place and role of personnel management in the general management system of an organization. Particular tasks of the research have been solved: the place and role of personnel management in the system of general management theory have been determined; determined the place of personnel management in the system of modern sciences. -
The aim of this paper is to examine the importance of skills development in the process of employee performance. As part of this research, we will seek to determine the nature and extent of skills development impact in improving employee performance. This research project is one of the new themes that some researchers have started in recent years. The novelty of this theme is the inclusion of the skill development factor. This factor is likely to have a positive impact on employee motivation and performance. Some of the factors already known to have an impact on employee performance, such as motivation, career development, training, and experience, will be adopted. It is assumed that the results of this research will have a positive impact on employee performance and employee retention.
-
Hubarieva, Daria;Polisuchenko, Anna;Matviienko, Olena;Savenko, Oksana;Hrebnieva, Iryna 287
The purpose of this article is to consider the distance education system, its principles, features and means. One of its existing and promising tools is video conferencing. The article discusses the types of video conferencing, hardware and software, features and requirements for communication channels, types of information transmitted through these channels. -
Yin, Cheng Jet;Ayop, Zakiah;Anawar, Syarulnaziah;Othman, Nur Fadzilah;Zainudin, Norulzahrah Mohd 294
The current society relies upon social media on an everyday basis, which contributes to finding which of the following supervised machine learning algorithms used in sentiment analysis have higher accuracy in detecting Malay internet slang and short forms which can be offensive to a person. This paper is to determine which of the algorithms chosen in supervised machine learning with higher accuracy in detecting internet slang and short forms. To analyze the results of the supervised machine learning classifiers, we have chosen two types of datasets, one is political topic-based, and another same set but is mixed with 50 tweets per targeted keyword. The datasets are then manually labelled positive and negative, before separating the 275 tweets into training and testing sets. Naïve Bayes and Random Forest classifiers are then analyzed and evaluated from their performances. Our experiment results show that Random Forest is a better classifier compared to Naïve Bayes. -
bibi, Nawab;Iqbal, Faiza;Akhtar, Salwa Muhammad;Anwar, Rabia;bibi, Shamshad 301
The technological advancements of the last two decades directed the era of the Internet of Things (IoT). IoT enables billions of devices to connect through the internet and share their information and resources on a global level. These devices can be anything, from smartphones to embedded sensors. The main purpose of IoT is to make devices capable of achieving the desired goal with minimal to no human intervention. Although it hascome as a social and economic blessing, it still brought forward many security risks. This paper focuses on providing a survey of the most commonly used application layer protocols in the IoT domain, namely, Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Extensible Messaging and Presence Protocol (XMPP). MQTT, AMQP, and XMPP use TCP for device-to-device communication, while CoAP utilizes UDP to achieve this purpose. MQTT and AMQP are based on a publish/subscribe model, CoAP uses the request/reply model for its structuring. In addition to this, the quality of service provision of MQTT, AMQP, and CoAP is not very high, especially when the deliverance of messages is concerned. The selection of protocols for each application is very a tedious task.This survey discusses the architectures, advantages, disadvantages, and applications of each of these protocols. The main contribution of this work is to describe each of the aforementioned application protocols in detail as well as providing their thorough comparative analysis. This survey will be helpful to the developers in selecting the protocol ideal for their system and/or application. -
Increase in computational cost and exhaustive search can lead to more complexity and computational energy. Thus, there is need for effective and efficient scheme to reduce the complexity to achieve optimal energy utilization. This will improve the energy efficiency and enhance the proficiency in terms of the resources needed to achieve convergence. This paper primarily focuses on the development of hybrid swarm intelligence scheme for reducing the computational complexity in binary optimization. In order to reduce the complexity, both artificial bee colony (ABC) and particle swarm optimization (PSO) have been employed to effectively minimize the exhaustive search and increase convergence. First, a new approach using ABC and PSO has been proposed and developed to solve the binary optimization problem. Second, the scout for good quality food sources is accomplished through the deployment of PSO in order to optimally search and explore the best source. Extensive experimental simulations conducted have demonstrate that the proposed scheme outperforms the ABC approaches for reducing complexity and energy consumption in terms of convergence, search and error minimization performance measures.
-
Mobile devices have recently developed to be an integral part of humans' daily lives because they meet business and personal needs. It is challenging to design a feasible and effective user authentication method for mobile devices because security issues and data privacy threats have significantly increased. Biometric approaches are more effective than traditional authentication methods. Therefore, this paper aims to analyze the existing biometric user authentication methods on mobile platforms, particularly those that use face recognition, to demonstrate the methods' feasibility and challenges. Next, this paper evaluates the methods according to seven characteristics: universality, uniqueness, permanence, collectability, performance, acceptability, and circumvention. Last, this paper suggests that solely using the method of biometric authentication is not enough to identify whether users are authentic based on biometric traits.
-
Zahrebniuk, Yuliia;Zheliaskov, Vasyl;Romanyshyn, Ihor;Varekh, Nonna;Yakymenko, Polina 328
The article considers general tendencies in world and education, and also both principles and methods of forming professional, communicative, intercultural competences and in the process of teaching foreign language for professional purposes in the conditions of engineering, economic and other non-linguistic specialties at technical university. The article views some essential issues of this competence including awareness of pedagogical values, the construction of the pedagogical process, pedagogical communication and behavior; pedagogical technology, its essence, structural components, understanding of innovative components of professional activity, requirements for the design and engineering of pedagogical technologies. -
Shapoval, Oksana;Kotlyaria, Svitlana;Medvedieva, Alla;Lishafai, Oleksandr;Barabash, Oleh;Oleksyuk, Oksana 333
The article reveals the essence of cyber socialization influencing the process of education and development. The general and potential possibilities of cyber socialization in the process of using the cyberspace of the Internet environment are presented. The sudden transition to distance learning in the spring of 2020 put the pedagogical community in the face of problems related to the content, organizational and methodological basis of the educational process. During the training in distance mode, a rich experience was gained in the use of information and communication technologies. The article discusses the techniques and methods of teaching using the capabilities of information and communication and digital technologies. -
Mehmood, Tariq;Naeem, Nadeem;Parveen, Sajida 338
The recently continuous enhancement and development in the biomedical side for the betterment of human life. The Wireless Body Area Networks is a significant tool for the current researcher to design and transfer data with greater data rates among the sensors and sensor nodes for biomedical applications. The core area for research in WBANs is power efficiency, battery-driven devices for health and medical, the Charging limitation is a major and serious problem for the WBANs.this research work is proposed to find out the optimal solution for battery-friendly technology. In this research we have addressed the solution to increasing the battery lifetime with variable data transmission rates from medical equipment as Wireless Endoscopy Capsules, this device will analyze a patient's inner body gastrointestinal tract by capturing images and visualization at the workstation. The second major issue is that the Wireless Endoscopy Capsule based systems are currently not used for clinical applications due to their low data rate as well as low resolution and limited battery lifetime, in case of these devices are more enhanced in these cases it will be the best solution for the medical applications. The main objective of this research is to power optimization by reducing the power consumption of the battery in the Wireless Endoscopy Capsule to make it battery-friendly. To overcome the problem we have proposed the algorithm for "Battery Friendly Algorithm" and we have compared the different frame rates of buffer sizes for Transmissions. The proposed Battery Friendly Algorithm is to send the images on average frame rate instead of transmitting the images on maximum or minimum frame rates. The proposed algorithm extends the battery lifetime in comparison with the previous baseline proposed algorithm as well as increased the battery lifetime of the capsule. -
Saxena, Shailesh;Khan, Mohammad Zubair;Singh, Ravendra;Noorwali, Abdulfattah 345
Cloud computing represent a new era of computing that's forms through the combination of service-oriented architecture (SOA), Internet and grid computing with virtualization technology. Virtualization is a concept through which every cloud is enable to provide on-demand services to the users. Most IT service provider adopt cloud based services for their users to meet the high demand of computation, as it is most flexible, reliable and scalable technology. Energy based performance tradeoff become the main challenge in cloud computing, as its acceptance and popularity increases day by day. Cloud data centers required a huge amount of power supply to the virtualization of servers for maintain on- demand high computing. High power demand increase the energy cost of service providers as well as it also harm the environment through the emission of CO2. An optimization of cloud computing based on energy-performance tradeoff is required to obtain the balance between energy saving and QoS (quality of services) policies of cloud. A study about power usage of resources in cloud data centers based on workload assign to them, says that an idle server consume near about 50% of its peak utilization power [1]. Therefore, more number of underutilized servers in any cloud data center is responsible to reduce the energy performance tradeoff. To handle this issue, a lots of research proposed as energy efficient algorithms for minimize the consumption of energy and also maintain the SLA (service level agreement) at a satisfactory level. VM (virtual machine) consolidation is one such technique that ensured about the balance of energy based SLA. In the scope of this paper, we explore reinforcement with fuzzy logic (RFL) for VM consolidation to achieve energy based SLA. In this proposed RFL based active VM consolidation, the primary objective is to manage physical server (PS) nodes in order to avoid over-utilized and under-utilized, and to optimize the placement of VMs. A dynamic threshold (based on RFL) is proposed for over-utilized PS detection. For over-utilized PS, a VM selection policy based on fuzzy logic is proposed, which selects VM for migration to maintain the balance of SLA. Additionally, it incorporate VM placement policy through categorization of non-overutilized servers as- balanced, under-utilized and critical. CloudSim toolkit is used to simulate the proposed work on real-world work load traces of CoMon Project define by PlanetLab. Simulation results shows that the proposed policies is most energy efficient compared to others in terms of reduction in both electricity usage and SLA violation. -
The device to device (D2D) communication is an important and emerging area for future cellular networks. It is concerned about all aspect of secure data transmission between end devices along with originality of the data. In this paradigm, the major concerns are about how keys are delivered between the devices when the devices require the cryptographic keys. Another major concern is how effectively the receiver device verifies the data sent by the sender device which means that the receiver checks the originality of the data. In order to fulfill these requirements, the proposed system able to derive a cryptographic key using a single secret key and these derived keys are securely transmitted to the intended receiver with procedure called mutual authentication. Initially, derived keys are computed by applying robust procedure so that any adversary feel difficulties for cracking the keys. The experimental results shows that both sender and receiver can identify themselves and receiver device will decrypt the data only after verifying the originality of the data. Only the devices which are mutually authenticated each other can interchange the data so that entry of the intruder node at any stage is not possible.
-
Seiko, Nataliia;Yershov, Mykola-Oleg;Sakhnenko, Anna;Shevchenko, Marina;Bezsmertnyi, Roman;Kostyrya, Inna 363
This article analyzes the state and development of multimedia technologies in the educational process. The reasons for the emergence of multimedia educational technologies are shown. The definition of the concept of "multimedia education" is given. The advantages and disadvantages of teaching using multimedia technologies are presented. The article, based on multimedia technologies, provides one of the ways to solve the problem of lack of classroom time for the presentation of all educational material in the process of teaching engineering students. The creation and application of educational videos in education is discussed, an example of teaching electrical engineering is given; the requirements for the development of video lessons, their advantages and importance in the educational process are indicated. -
Osaula, Vadym;Parfeniuk, Ihor;Lysyniuk, Maryna;Haludzina-Horobets, Viktoriia;Shyber, Oksana;Levchenko, Oksana 368
The article identifies the features of the digital culture of modern society in the dynamics of its impact on the education sector, identifies the main directions of digitalization education, an objective analysis is presented, the possibilities of examination as a scientific assessment are determined "Digital reforms" of education, the role of traditional values of educational culture in expertise and improvement digital innovations in the education system, identified the main contradictions in the development of digital culture, to determine the directions of its improvement. The article describes the three main components of information technology as a complex of hardware, software and a system of organizational and methodological support; the description of analog and digital information technologies is presented. The authors list the most common multifunctional office applications and IT tools; the advantages of using IT in the educational process are highlighted.