International Journal of Computer Science & Network Security
International Journal of Computer Science & Network Security (IJCSNS)
- Monthly
- /
- 1738-7906(pISSN)
Volume 22 Issue 7
-
The current progression in the Internet of Things (IoT) and Machine Learning (ML) based technologies converted the traditional healthcare system into a smart healthcare system. The incorporation of IoT and ML has changed the way of treating patients and offers lots of opportunities in the healthcare domain. In this view, this research article presents a new IoT and ML-based disease diagnosis model for the diagnosis of different diseases. In the proposed model, vital signs are collected via IoT-based smart medical devices, and the analysis is done by using different data mining techniques for detecting the possibility of risk in people's health status. Recommendations are made based on the results generated by different data mining techniques, for high-risk patients, an emergency alert will be generated to healthcare service providers and family members. Implementation of this model is done on Anaconda Jupyter notebook by using different Python libraries in it. The result states that among all data mining techniques, SVM achieved the highest accuracy of 0.897 on the same dataset for classification of Parkinson's disease.
-
Basically Mobile Ad Hoc Network (MANET) is an autonomous system with the collection of mobile nodes, these nodes are connected to each other by using wireless networks. A mobile ad hoc network poses this quality which makes topology in dynamic manner. As this type of network is Ad Hoc in nature hence it doesn't have fixed infrastructure. If a node wishes to transfer data from source node to a sink node in the network, the data must be passed through intermediate nodes to reach the destination node, hence in this process data packet loss occurs in various MANET protocols. This research study gives a comparison of various Mobile Ad Hoc Network routing protocols like proactive (DSDV) and reactive (AODV, DSR) by using random topology with more intermediate nodes using CBR traffic. Our simulation used 50, 100, and 150 nodes variations to examine the performance of the MANET routing protocols. We compared the performance of DSDV, AODV and DSR, MANET routing protocols with the result of existing protocol using NS-2 environment, on the basis of different performance parameters like Packet Delivery Ratio, average throughput and average end to end delay. Finally we found that our results are better in terms of throughput and packet delivery ratio along with low data loss.
-
Iryna, Kalenyuk;Iryna, Uninets;Yevhen, Panchenko;Nataliia, Datsenko;Maxym, Bohun 21
The increase in the number of large cities and the size of their population sharpens attention to the new role of cities as entities to ensure a high-quality, safe and modern life of citizens, which has become significantly more active in recent years. The rapid spread of smart cities in the modern world has actualized the issue of analyzing their success and assessing the role of various factors in this. Every success of a smart city is always the result of a unique combination of the most modern technologies, environmental and social initiatives, skillful and consistent management, as well as available human potential. The purpose of the article is to analyze the success factors of smart cities based on the generalization of the results of the most famous ratings. In order to identify the impact of various factors, primarily intellectual, on the success and leadership positions of smart cities, the following ratings were consistently analyzed: Smart City Index (SCI), City in Motion Index (CIMI), Global Power City Index (GPCI), Global Cities Index (GCI), Global Cities Outlook (GCO). They have a different list of indicators and main pillars (dimensions), but all ratings take into account aspects such as: governance, ICT, mobility, functionality, human capital, etc. The highest correlation coefficient, that is, the strongest linear relationship of the CIMI index was found with such factors as: Human capital, Economy, Governance and Technologies. Summarizing the results of the TOP 20 smart cities according to different ratings allowed us to confirm that the list of leaders is very similar in all ratings. Among those cities that are in the TOP-20 in all five indexes are: London, Sydney and Singapore. There are four indices: New York, Paris, Tokyo, Copenhagen, Berlin, Amsterdam, Melbourne. Achieving leadership positions in smart city rankings is always the result of a combination and synergy of certain factors, and first of all, it is the quality of human capital. The intensity and success of the use of information and communication technologies in locality management processes, city planning and improvement of the city's living conditions depend on it. -
Yatsko, Maksym;Panfilova, Yanina;Zozuliak, Marta;Koval, Oleksandr;Golubka, Yaroslav 29
The innovative process of digitalization and creation of innovation from an idea to its commercialization requires certain financial costs, labor and mental efforts. The amount of investment (corporate and public) is the most important imperative to enhance innovation and is traditionally considered as the main "input" indicators of the development of innovation infrastructure, in this case, the financial infrastructure of innovation. At the same time, the modern theory of innovation development assumes a systematic approach to the organization of innovation activity, which provides for the close interaction of several subsystems: human (including intellectual) potential, financial and technological capital, as well as relevant institutions and methods of regulation.. Thus, the main task of the study is to analyze the features of investment support for the process of digitalization of socio-economic systems in the context of strengthening international economic relations. As a result of the study, current trends and prerequisites of investment support for the process of digitalization of socio-economic systems in the context of strengthening international economic relations were revealed. -
Oseredchuk, Olga;Drachuk, Ihor;Teslenko, Valentyn;Ushnevych, Solomiia;Dushechkina, Nataliia;Kubitskyi, Serhii;Сhychuk, Antonina 35
The article identifies the problem of monitoring the quality of higher education in three main areas, which are comparative pedagogical systems of education. The first direction is determined by dissertation works, the second - monographs and textbooks, and the third reveals scientific periodicals. According to its internal structure, monitoring the quality of education combines important management components identified in the article (analysis, evaluation and forecasting of processes in education; a set of methods for tracking processes in education; collecting and processing information to prepare recommendations for research processes and make necessary adjustments). Depending on the objectives, three areas of monitoring are identified: informational (involves the accumulation, structuring and dissemination of information), basic (aimed at identifying new problems and threats before they are realized at the management level), problematic (clarification of patterns, processes, hazards, those problems that are known and significant from the point of view of management). According to its internal structure, monitoring the quality of education combines the following important management components: analysis, evaluation and forecasting of processes in education; a set of techniques for tracking processes in education; collection and processing of information in order to prepare recommendations for the development of the studied processes and make the necessary adjustments. One of the priorities of the higher education modernization program during the COVID-19 pandemic is distance learning, which is possible due to the existence of information and educational technologies and communication systems, especially for effective education and its monitoring in higher education. The conditions under which the effectiveness of pedagogical support of monitoring activities in the process of distance learning is achieved are highlighted. According to the results of the survey, the problems faced by higher education seekers are revealed. A survey of students was conducted, which had a certain level of subjectivity in personal assessments, but the sample was quite representative. -
Kurniawan, Fachrul;Haviluddin, Haviluddin;Collantes, Leonel Hernandez;Nugroho, Supeno Mardi Susiki;Hariadi, Mochamad 43
Continuous development is the key of development issue in developing nations. Smart city measurement is prevalently carried through in the cities in which the nations have been classified as industrialized countries. In addition, cities in Europe becomes the models of smart city system. Smart city concept used in the cities in Europe applies six predominant features i.e. smart economic, smart mobility, smart environment, smart people, smart living, and smart governance. This paper focuses on figuring out city' development strategy in developing nations particularly Indonesia in regard with European Framework by way of Multi Expert Multi Criterion Decision Making (ME-MCDM). Recommendation is resulted from the tests using the data collected from one of the metropolis cities in Indonesia, whereby issuing recommendation must firstly implement smart education, secondly communication, thirdly smart government, and fourthly smart health, as well as simultaneously implement smart energy and smart mobility. -
KRISHNA, KONDA HARI;NAGPAL, TAPSI;BABU, Y. SURESH 51
In the previous years, Wireless Sensor Networks (WSNs) have increased expanding consideration from both the clients and scientists. It is utilized as a part of different fields which incorporate ecological, social insurance, military and other business applications. Sensor hubs are battery fueled so vitality imperatives on hubs are extremely strict. At the point when battery gets released, sensor hub will get detached from remaining system. This outcomes in connection disappointment and information misfortune. In a few applications battery substitution is likewise impractical. Consequently, vitality proficient strategies ought to be outlined which will upgrade lifetime of system and precise information exchange. In this paper, diverse wellsprings of vitality dissemination are recorded trailed by vitality effective systems to improve lifetime of the system. -
This scientific article is devoted to the study of the legal significance of such a category of legal status of the purchaser of another's thing, as its good faith. The essence of this phenomenon has been studied, it has been established that the criterion of good faith attaches significant importance to the claims of the participants of these relations for the acquisition or preservation of private property rights. The paper emphasizes that, in addition to the importance of good conscience at the time of possession of another's thing, which gives legal certainty the possibility of registration of the title and is part of the actual composition for the acquisition of property or the right of ancient possession, bona fides also characterizes the behavior of the occupier. In this case, good conscience only has some legal consequences when it is opposed to subjective law. Under such conditions, it acquires direct legal significance, including as a condition for the acquisition and protection of rights. Good faith possession of another's property is an internal indicator of the subject's awareness of a certain property status. This sense, the article assesses this status from the standpoint of the scientific concept of the visibility of law. According to this theory, prescription is also considered as a consequence of the appearance of law, however, because it arises and lasts against the will of the parties and despite their awareness of this fact. Therefore, bona fide continuous and open possession of property as one's own, during the acquisition period, was most significantly associated with the appearance of property. Therefore, the concept of good faith, in the sense of personal perception of real values, is closely related to the principle of protection of the appearance of law, as it is aimed at understanding it by third parties. The paper notes certain differences in the application of the theory of the appearance of the right in the acquisition of property by a bona fide purchaser from an unauthorized alienator and the acquisitive prescription. It is emphasized that such a mechanism must be used in presuming the attitude to the thing as its own, by the holder of movable property. But there should be exceptions to the rule, in particular, if the owner has grounds for vindication of the thing.
-
In natural language processing, commonly used words such as prepositions are referred to as stop-words; they have no inherent meaning and are therefore ignored in indexing and retrieval tasks. The removal of stop-words from Arabic text has a significant impact in terms of reducing the size of a cor- pus text, which leads to an improvement in the effectiveness and performance of Arabic-language processing systems. This study investigated the effectiveness of applying a stop-word lists elimination with normalization as a preprocessing step. The idea was to merge statistical method with the linguistic method to attain the best efficacy, and comparing the effects of this two-pronged approach in reducing corpus size for Ara- bic natural language processing systems. Three stop-word lists were considered: an Arabic Text Lookup Stop-list, Frequency- based Stop-list using Zipf's law, and Combined Stop-list. An experiment was conducted using a selected file from the Arabic Newswire data set. In the experiment, the size of the cor- pus was compared after removing the words contained in each list. The results showed that the best reduction in size was achieved by using the Combined Stop-list with normalization, with a word count reduction of 452930 and a compression rate of 30%.
-
Martynenko, Valentyna;Kovalenko, Yuliia;Chunytska, Iryna;Paliukh, Oleksandr;Skoryk, Maryna;Plets, Ivan 75
The efficiency of the regional fiscal policy implementation is based on the achievement of target criteria in the formation and distribution of own financial resources of local budgets, reducing their deficit and reducing dependence on transfers. It is also relevant to compare the development of financial autonomy of regions in the course of decentralisation of fiscal relations. The study consists in the cluster analysis of the effectiveness of fiscal policy implementation in the context of 24 regions and the capital city of Kyiv (except for temporarily occupied territories) under conditions of fiscal decentralisation. Clustering of the regions of Ukraine by 18 indicators of fiscal policy implementation efficiency was carried out using Ward's minimum variance method and k-means clustering algorithm. As a result, the regions of Ukraine are grouped into 5 homogeneous clusters. For each cluster measures were developed to increase own revenues and minimize dependence on official transfers to increase the level of financial autonomy of the regions. It has been proved that clustering algorithms are an effective tool in assessing the effectiveness of fiscal policy implementation at the regional level and stimulating further expansion of financial decentralisation of regions. -
Baranenko, Dmytro;Stepanova, Tetiana;Pillai, Aneesh V.;Kostruba, Anatolii;Akimenko, Yuliia 85
In modern conditions of the development of public relations, there is a continuous development of technologies. This not only reflects the convenience of service users, and new technology but also contributes to the emergence of new disputes to protect the rights of stakeholders. Therefore, it is urgent to study the distinctions between the jurisdiction of commercial, civil and administrative courts in resolving IT disputes. The work aims to study the peculiarities of delimitation of the jurisdiction of commercial, civil, and administrative courts through the prism of IT measurement. The research methodology consists of such methods as a historical, comparative-legal, formal-logical, empirical, method of analogy, method of synthesis, method of analysis, and systematic method. Examining the specifics of delimiting the jurisdiction of commercial, civil, and administrative courts through the IT dimension, it was concluded that there is a problem in determining the jurisdiction of the court. In addition, the judicial practice on this issue is quite variable, which negatively affects the predictability of technology in resolving potential disputes. In this regard, the criterion models for distinguishing between commercial, administrative, and civil proceedings according to the legal classification of the parties, as well as the nature of the claim are identified. This separation will contribute to a more accurate application of legal norms and methods of application of administrative norms and reduce the number of cases of improper proceedings. -
With the evolution of wireless sensor network (WSN) technology, the routing policy has foremost importance in the Internet of Things (IoT). A systematic routing policy is one of the primary mechanics to make certain the precise and robust transmission of wireless sensor networks in an energy-efficient manner. In an IoT environment, WSN is utilized for controlling services concerning data like, data gathering, sensing and transmission. With the advantages of IoT potentialities, the traditional routing in a WSN are augmented with decision-making in an energy efficient manner to concur finer optimization. In this paper, we study how to combine IoT-based deep learning classifier with routing called, Kriging Regressive Deep Belief Neural Learning (KR-DBNL) to propose an efficient data packet routing to cope with scalability issues and therefore ensure robust data packet transmission. The KR-DBNL method includes four layers, namely input layer, two hidden layers and one output layer for performing data transmission between source and destination sensor node. Initially, the KR-DBNL method acquires the patient data from different location. Followed by which, the input layer transmits sensor nodes to first hidden layer where analysis of energy consumption, bandwidth consumption and light intensity are made using kriging regression function to perform classification. According to classified results, sensor nodes are classified into higher performance and lower performance sensor nodes. The higher performance sensor nodes are then transmitted to second hidden layer. Here high performance sensor nodes neighbouring sensor with higher signal strength and frequency are selected and sent to the output layer where the actual data packet transmission is performed. Experimental evaluation is carried out on factors such as energy consumption, packet delivery ratio, packet loss rate and end-to-end delay with respect to number of patient data packets and sensor nodes.
-
Gorai, Oleg;Ohar, Emiliya;Snitsarchuk, Lidiya;Polulyah, Ruslan;Druzhynin, Serhii 103
Mass media in the digital age are not only one of the most important elements of the information society but also a strategic resource for its development. Effectively implemented communication makes it possible to build connections not only between individuals, but also between social institutions and representatives of various generational groups of the mass audience, as well as ensure information security in a crisis period. At the same time, in the context of a constantly increasing amount of information flows, more and more often "a person loses the ability to independently think, analyze, and critically perceive information." At the same time, "imposing" on the representatives of this or that society, through the content of multi-format mass media or active authors of social networks, a certain point of view on the problem becomes a completely realizable task. Thus, the main task of the study is to analyze the anti-crisis communications in legal discourse in terms of ensuring information security. As a result of the study, current trends and prerequisites of anti-crisis communications in legal discourse in terms of ensuring information security were revealed. -
Nesterov, Evgeny Aleksandrovich;Borisov, Andrei Viktorovich;Shadskaja, Irina Gennadievna;Shelygov, Aleksandr Vladimirovich;Sharonin, Pavel Nikolaevich;Frolov, Alexander Lvovich;Lebedeva, Olga Yevgenievna 109
The article is devoted to perfecting the system of management of the financial potential of transport enterprises. It is established that transport as an integral part of the state economy has to organically enter the market economy and provide sustainable transport services to national economy enterprises regardless of ownership, as well as ensure passenger transportation. It is also determined that in the conditions of market relations, transport highways must perform their functions with sufficient economic benefit to keep their material and technical resources in good order, conduct an investment policy with extensive use of scientific and technological progress, as well as a social policy guaranteeing the conditions for employees' motivated work. The study reveals an association between the financial and strategic goals of transport enterprises and the minimization of their economic risks, the prevention of bankruptcy and profit margin shortfalls. It is found that transport enterprises need to strive for the overall improvement of their financial potential through increasing the components of financial potential and assessing the impact of risk factors on them: the capacity of fixed assets, the capacity of financial resources, the capacity of services, and the capacity of credit opportunities. These are the elements of transport enterprises' financial potential that ensure its desired level. It is demonstrated that of critical importance in managing the financial potential of a transport enterprise is the role of financial resources, as a subject cannot reach the desired strategic goals without them. -
Krupa, Oksana;Krupa, Volodymyr;Dydiv, Iryna;Horpynchenko, Olha;Kovalenko, Snizhana 117
The main purpose of the article is to determine the economic consequences of the impact of war on labor resources and tourism in terms of ensuring economic security. Today, in the context of Russia's invasion of the territory of Ukraine, an important aspect of people's lives is confidence in their safety. But no less important is the provision of economic security, its impact on the labor and tourism aspects of this type of security, the negative impact on which is carried out under the influence of war. Modern society is faced with the same problems that were a hundred years ago: technological progress, the balance of power in the world community, social problems, military conflicts. In the modern development of society, no one can deny the amazing scientific progress in new technologies and communications.That is why it is important to understand how dangerous war is not only for human life, but also for the economy of the state, its labor and tourism aspects. -
Researchers had theorized that the earliest years' experiences were extremely critical to a child's future development (Jung, 2008; Liu et al., 2020), and parental involvement was a key character (Lamb et al., 2002; Liu, 2020). Though the critical role of parental involvement in education has been confirmed, less attention has been paid to its influence on infants' development. For the sake of infants' appropriate development, infant teachers always met barriers to finding, designing, and implementing age-appropriate activities. This case study aims at exploring the role of parental involvement in the development in infancy by surveying one director, four infant teachers, and six early childhood pre-service teachers' perspectives and practices regarding parental involvement in infant rooms within a Reggio Emilia-inspired child development center. Findings revealed that all participants: (1) thought parental involvement was essential to their decision-making process; (2) were aware of the benefits of implementing parental involvement in infants' rooms; (3) gained an opportunity to reflect on their practices regarding parental in-volvement and reprocess their previous perspectives. This study recommends that, in order to facilitate infants' development appropriately, child-care centers need to take into account parental involvement and work with parents collaboratively.
-
Alharbi, Nawaf;Soh, Ben;AlZain, Mohammed A;Alharbi, Mawaddah 131
The Internet is becoming a basic need for many individuals globally in this digital age. The youths became more active online than before, with the majority relying on different platforms to communicate and interact with peers. Saudi Arabia is one of the nations where internet usage is high, with an increasing number of active internet users. The youth in Saudi Arabia are engaged in various online platforms. However, they lack adequate knowledge about cybersecurity and the dangers of internet usage, which exposes them to the risk of falling victims to cybercriminals. The most common dangers of internet usage include viruses, malware, phishing, and hacking, compromising users' sensitive information. Increased awareness of these potential threats helps protect Internet users and secure their data. The understanding of the dangers of Internet usage among youths varies across countries. In this regard, our study explores the risks of internet usage among youth in Saudi Arabia compared to the United States, South Africa, and New Zealand. -
Ali, Ashour;Noah, Shahrul Azman Mohd;Zakaria, Lailatul Qadri 147
Ontologies are knowledge containers in which information about a specified domain can be shared and reused. An event happens within a specific time and place and in which some actors engage and show specific action features. The fact is that several ontology models are based on events called Event-Based Models, where the event is an individual entity or concept connected with other entities to describe the underlying ontology because the event can be composed of spatiotemporal extents. However, current event-based ontologies are inadequate to bridge the gap between spatiotemporal extents and participants to describe a specific domain event. This paper reviews, describes and compares the existing event-based ontologies. The paper compares various ways of representing the events and how they have been modelled, constructed, and integrated with the ontologies. The primary criterion for comparison is based on the events' ability to represent spatial and temporal extent and the participants in the event. -
The proposed privacy preserving scheme has identified the drawbacks of existing schemes in Vehicular Networks. This prototype enhances the number of nodes by decreasing the cluster size. This algorithm is integrated with the whale optimization algorithm and Block Chain Technology. A set of results are done through the NS-2 simulator in the direction to check the effectiveness of proposed algorithm. The proposed method shows better results than with the existing techniques in terms of Delay, Drop, Delivery ratio, Overhead, throughout under the denial of attack.
-
Hossain, S.M. Emdad;Fageeri, Sallam Osman;Soosaimanickam, Arockiasamy;Kausar, Mohammad Abu;Said, Aiman Moyaid 165
Lying is nuisance to all, and all liars knows it is nuisance but still keep on lying. Sometime people are in confusion how to escape from or how to detect the liar when they lie. In this research we are aiming to establish a dynamic platform to identify liar by using video analysis especially by calculating the ratio of changes in their appearance when they lie. The platform will be developed using a machine learning algorithm along with the dynamic classifier to classify the liar. For the experimental analysis the dataset to be processed in two dimensions (people lying and people tell truth). Both parameter of facial appearance will be stored for future identification. Similarly, there will be standard parameter to be built for true speaker and liar. We hope this standard parameter will be able to diagnosed a liar without a pre-captured data. -
In the knowledge development of online assessment in learning management systems (LMSs), many assessments are evaluated weekly in the summer training course for undergraduate students in the Faculty of Computing and Information Technology at King Abdul-Aziz University in Saudi Arabia. The number of performance assessments in the summer training course reaches 15 weeks. Many of them, however, are sent or done informally or through unreliable ways and cannot be verified by third parties. Therefore, applying the concept of digital transformation is essential. This research study reported herein used the action design research (ADR) method to build a new information technology system that could assist in the digital transformation. An electronic platform was designed, developed, implemented, and evaluated using the ADR method so that the main people involved in the summer training process (i.e., students, academic supervisors, and administrators) would have a high level of satisfaction with it. The study was conducted on 452 students, 105 academic supervisors, and 15 administrative staff and was conducted during the summer semester of 2020. All the training processes were digitally transformed and automated to control and raise the level and reliability of the training. All involved people were satisfied, thus, shifting the process to be in a digital form assist in achieving the high-level goal.
-
Zakharov, Vladimir Yakovlevich;Ludushkina, Elena Nikolaevna;Kornilova, Elena Valerievna;Kislinskaya, Marina Vladimirovna;Brykalov, Sergei Mikhailovich 181
The article contains an overview of the results of recent research by think tanks in different countries, devoted to the analysis of economic resilience factors in the Covid-19 crisis and the development of recommendations for improving preparedness for the next crises. The authors consider and propose a theoretical framework for the concept of the resilience of economic systems. The impact of the COVID-19 crisis on national economies is analyzed. Factors explaining the different cability of economic systems to withstand shock in the short and long term are identified. The reactions of market participants and national governments to the crisis are assessed. It is shown how the COVID-19 crisis has affected the digital transformation of economic systems, and how digital transformation helps to increase the resilience of national economies so that the latter can emerge from the crisis even stronger. -
With the ever-increasing frequency of public sector and smalls-cale industries going live on the internet in developing countries, their security of which, while crucial, is often overlooked in most cases. This is especially true in Government services, whilst essential, are poorly monitored if at all. This is due to lack of funds and personnel. Most available software which can help these organizations monitor their services are either expensive or very outdated. Thus, there is a need for any developing country to develop a networking monitoring system. However, developing a network monitoring system is still a challenge and expensive and out sourcing network monitoring system to third party is a security threat. Therefore, in this article we propose a method to anonymize network logs and outsource networking monitoring system to third-party without breach in integrity of their network logs.
-
Safdar, Hashim;Ullah, Rahat;Khalid, Zubair 199
The extensive growth in data rate demand by the smart gadgets and mobile broadband application services in wireless cellular networks. To achieve higher data rate demand which leads to aggressive frequency reuse to improve network capacity at the price of Inter Cell Interference (ICI). Fractional Frequency Reuse (FFR) has been recognized as an effective scheme to get a higher data rate and mitigate ICI for perfect geometry network scenarios. In, an irregular geometric multicellular network, ICI mitigation is a challenging issue. The purpose of this paper is to develop distributed dynamic power allocation scheme for FFR based on game theory to mitigate ICI. In the proposed scheme, each cell region in an irregular multicellular scenario adopts a self-less behavior instead of selfish behavior to improve the overall utility function. This proposed scheme improves the overall data rate and mitigates ICI. -
Dubovyk, Tetiana;Buchatska, Iryna;Diachuk, Iryna;Zerkal, Anastasiia 206
Strengthening global geopolitical instability in the world leads to an aggravation of international conflicts; it destabilizes the domestic political situation in countries, violates the rights and freedoms of man and citizen, and also activates economic crime. The full-scale invasion of the Russian Federation on the territory of Ukraine and the deployment of military operations in a large territory of a sovereign country have created a number of destabilizing factors in the development of digital technologies and negatively affect the state and trends of digital marketing, which allows establishing interaction with a wide audience and facilitating the search for new customers in various places. The purpose of the research lies in substantiating the theoretical and applied principles for studying the features of digital marketing in the conditions of wartime posture in Ukraine. In the course of the research, general and special methods of economic analysis have been used and applied, namely: analysis and synthesis; analogies and comparisons; generalization and systematization; graphic and tabular methods. Regarding the results of the research of digital marketing in the conditions of wartime posture in Ukraine, it has been established that the intensification of the development of digital marketing is caused by the crisis phenomena of social-economic, social-political and military nature, as well as exacerbated by the challenges of the COVID-19 pandemic. It has been proven that highly developed countries use innovative digital technologies more effectively in the field of marketing, which indicates the importance of the Multidimensional Index of Digitization (the USA - MID: 0,92-0,92; the UK - MID: 0,80-0,97; Japan - MID: 0,80-0,88; Canada - MID: 0,78-0,81; Germany - MID: 0,78-0,88; France - MID: 0,72-0,76), however, the developing countries record much lower values (Ukraine - MID: 0,22-0,48). Accordingly, the level of cybersecurity in highly developed countries is also significantly higher than in transitive countries, in particular, in the United States (GCI: 0,919-0,999); Great Britain (GCI: 0,783-0,995); Canada (GCI: 0,818-0,978) and in Ukraine (GCI: 0,501-0,661). -
The Use of Information and Communication Technologies in Education of Students' Civic ResponsibilitySadovyi, Mykola;Terenko, Olena;Filimonova, Tetiana;Malanchuk, Serhii;Vovkochyn, Lyudmyla;Paslawska, Alla;Oros, Ildiko 213
Building Ukraine as an independent, sovereign state requires the education of a citizen-patriot, able to live and work in a democracy, ensure the unity of Ukraine, feel constant responsibility for themselves, their people, country, seek to make a real contribution to the reform process. Modern modernization of the education system requires the search for new information and communication technologies that can ensure the formation of a citizen with an active civic position, which involves not only students mastering the rights and responsibilities of citizens, convincing them of the feasibility of democratic transformation of society, patriotic qualities and feelings, but also the identification of motivated civic actions. The pandemic and hostilities have led to significant changes in the field of education around the world, they have caused educational problems in Ukraine. At the beginning of the quarantine in the spring of 2020, all educational institutions in the emergency mode switched to distance learning. Intensive use of information and communication technologies in the life of modern society has led to a rethinking of the content of education and training of future professionals: the main role is played not so much by the information itself as the ability to work with it, critically comprehend and produce new knowledge; the main thing is not the amount of information, but its quality; information is needed for further practical application and transformation into knowledge, and the ability to work with information becomes one of the important competencies of the modern specialist in the new transformation of society: from information to the knowledge society. In this context, one of the main forms of training is distance learning, which is able to respond to the challenges of society. The main methodological positions that are taken into account in the construction of the structure and dynamics of the formation of civic responsibility of the individual during the use of information and communication technologies are highlighted. The structure of civil responsibility as a holistic system of information and communication technologies is outlined, which includes three subsystems that characterize the natural, social and systemic qualities of citizenship, interconnected hierarchically and synergistically.The constituent elements of the structural part of the model of civic culture of the individual are analyzed. -
Image always carry useful information, detecting a text from scene images is imperative. The proposed work's purpose is to recognize scene text image, example boarding image kept on highways. Scene text detection on highways boarding's plays a vital role in road safety measures. At initial stage applying preprocessing techniques to the image is to sharpen and improve the features exist in the image. Likely, morphological operator were applied on images to remove the close gaps exists between objects. Here we proposed a two phase algorithm for extracting and recognizing text from scene images. In phase I text from scenery image is extracted by applying various image preprocessing techniques like blurring, erosion, tophat followed by applying thresholding, morphological gradient and by fixing kernel sizes, then canny edge detector is applied to detect the text contained in the scene images. In phase II text from scenery image recognized using MSER (Maximally Stable Extremal Region) and OCR; Proposed work aimed to detect the text contained in the scenery images from popular dataset repositories SVT, ICDAR 2003, MSRA-TD 500; these images were captured at various illumination and angles. Proposed algorithm produces higher accuracy in minimal execution time compared with state-of-the-art methodologies.
-
Aljahdali, Asia Othman;Alsaidi, Nawal;Alsafri, Maram 229
Today's Internet of Things (IoT) has had a dramatic increase in the use of various daily aspects. As a consequence, many homes adopt IoT technology to move towards the smart home. So, the home can be called smart when it has a range of smart devices that are united into one network, such as cameras, sensors, etc. While IoT smart home devices bring numerous benefits to human life, there are many security concerns associated with these devices. These security concerns, such as user privacy, can result in an insecure application. In this research, we focused on analyzing the vulnerabilities of IoT smart home cameras. This will be done by designing a new model that follows the STRIDE approach to identify these threats in order to afford an efficient and secure IoT device. Then, apply a number of test cases on a smart home camera in order to verify the usage of the proposed model. Lastly, we present a scheme for mitigation techniques to prevent any vulnerabilities that might occur in IoT devices. -
KRISHNA, KONDA. HARI;NAGPAL, TAPSI;BABU, Y. SURESH 240
The common goals of designing a routing algorithm are not only to reduce control packet overhead, maximize throughput and minimize the end-to-end delay, but also take into consideration the energy consumption. Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSN's). Three metrics (power consumption, time of transmission and packet loss rate) are used in order to compare three routing protocols which are AODV, DSDV and LEACH. -
Shevchenko, Olha;Bahinska, Olha;Markova, Olena;Broiakovskyi, Oleksandr;Bielkova, Tetyana;Honcharenko, Ivan;Bida, Olena 245
Educational reform in Ukraine encourages the use of multimedia technologies in the training of specialists in Physical Education and Sports, which is one of the promising directions of education development. Therefore, the article specifies the content of the terms "innovation" and "technology". For modern society, the introduction of multimedia technologies in education is not so much theoretical as pragmatic, since under condition of globalization it concerns its historical development and prospects associated with the so-called "high technologies".Our goal is to improve the training of Physical Education and Sports specialists by means of multimedia technologies. All of innovative technologies can be divided into four groups, depending on the appropriate form of educational activity for their use. The development of multimedia technologies in the training of specialists in Physical Education and Sport at the present stage of education development should be carried out in accordance with the criteria of manufacturability, which are presented in the article: scientism, to rely on the theoretical provisions of pedagogical science and methods of teaching the discipline, socially recognized educational goals, prospects for modernization of Education; consistency, which provides for the interaction of parts and the whole in the organization of the study environment, as a result of which the physical development of the young generation is an integral entity; guarantee, that is, the error between the planned and obtained results should be minimal; manageability, that is, full management of the stages of work of the teacher and students, which make up the completed cycle of actions; mass participation, for the purpose of applying the technology does not depend on the physical training of students, the pedagogical skill of the teacher and the type of educational institutions. The article presents the theory and method of organizing sports events and circuses in the training of specialists in Physical Education and Sports by means of multimedia technologies. In order to increase the level of physical development of a person, physical fitness and the state of health of students, which has a clear trend to constant deterioration, it is necessary to instill love for sports, carry out high-quality training and organize sports events using multimedia technologies. In the process of sports activities, the participants' mental education is carried out. There are two types of communication here: direct and indirect, which are described in the article.In games and sports competitions, there are many opportunities for forming rules of collective behavior. The main issues of the organization of sports activities by means of multimedia technologies have been clarified. During sports competitions, the tasks presented in Physical Education and sports classes are improved, which ensure the improvement of physical and theoretical training of the individual. The pleasure of sports, bright, emotional spectacles, confirmed by multimedia technologies, arises from the participation of the viewer in them. -
Melnyk, Stepan;Petrukha, Nina;Shuprudko, Nataliia;Ilychok, Bohdan;Balanutsa, Oleksandr 252
Ukraine has a significant in quantity and unique in quality parameters, in particular, the level of education, a resource - the labor force, which, along with natural resources, can serve as the basis for economic growth and the achievement of sustainable development goals. The study is aimed at a thorough identification of the main factors influencing the formation and use of the labor force in Ukraine, including by comparing with the indicators of the EU countries, before the start of the active phase of military aggression by the Russian Federation. It was found that until February 24, 2022, there were negative trends in the change in the quantitative and qualitative indicators of the labor force due to the demographic crisis, the transformation of the national economy and shortcomings in state regulation of labor market development processes. The military actions not only exacerbated pre-existing problems, but also led to the emergence of new ones. A significant number of refugees and internally displaced persons, with the termination of the activities of half of the economic entities, provoked a sharp increase in real unemployment and a decrease in wages. The specific problem of the labor market of Ukraine - the "labor crisis", which has and will have a significant impact on the labor force, is carefully considered. -
Kovalchuk, Vasyl;Zaika, Artem;Hriadushcha, Vira;Kucherak, Iryna 259
With the rapid development and introduction of digital technologies, both everyday human life and technological processes of any production are changing, which stimulates the transformation of the economy and education. Digital technologies are not only a tool, but also a living environment of modern human, which opens up new opportunities: learning at any convenient time, continuing education, the ability to form individual educational learning trajectories and more. However, the digital environment requires teachers to take a modern approach to the organization of the educational process, the formation of new skills and abilities to work in the digital educational environment. As a result of the study, it was found that the system of vocational education should provide training for masters of industrial training who have a high level of digital competence. The purpose of the article is to single out, theoretically substantiate and determine the level of formation of structural components of digital competence of future masters of agricultural training. The structure of digital competence of agricultural master was analyzed on the basis of domestic and foreign scientists researches. Systematized research results indicate that digital competence consists of four components: motivational-value (combination of internal and external motives for the use of digital technologies in future professional activities), cognitive (a set of theoretical knowledge, skills and abilities of future master of industrial training to effectively build educational process with the use of digital technologies), activity-professional (expansion and deepening of knowledge, skills, necessary skills for effective implementation of digital technologies in the educational process) and evaluative-reflexive (ability to analyze and self-analyze own activities and its results taking into account professional characteristics, self-realization in professional activities through the use of digital technologies). These components are comparable with the indicators that describe the knowledge, skills and abilities needed by the future master of industrial training to organize the modern educational process. A questionnaire was conducted to determine the levels of this competence formation, which allows us to conclude that it is necessary to increase the level of formation of all components of digital competence of future masters of industrial training in agriculture. The results of the study can be used as a basis for the development of disciplines that form the special competencies of masters of industrial training in agriculture and programs of advanced training of teachers. -
Asiri, Dalia Mohammed Eissa;Allehaibi, Khalid Hamed;Basori, Ahmad Hoirul 268
One of the most important technologies today is augmented reality technology, it allows users to experience the real world using virtual objects that are combined with the real world. This technology is interesting and has become applied in many sectors such as the shopping and medicine, also it has been included in the sector of education. In the field of education, AR technology has become widely used due to its effectiveness. It has many benefits, such as arousing students' interest in learning imaginative concepts that are difficult to understand. On the other hand, studies have proven that collaborative between students increases learning opportunities by exchanging information, and this is known as Collaborative Learning. The use of multimodal creates a distinctive and interesting experience, especially for students, as it increases the interaction of users with the technologies. The research aims at developing collaborative framework for developing achievement of 6th graders through designing a framework that integrated a collaborative framework with a multimodal input "hand-gesture and touch", considering the development of an effective, fun and easy to use framework with a multimodal interaction in AR technology that was applied to reformulate the genetics and traits lesson from the science textbook for the 6th grade, the first semester, the second lesson, in an interactive manner by creating a video based on the science teachers' consultations and a puzzle game in which the game images were inserted. As well, the framework adopted the cooperative between students to solve the questions. The finding showed a significant difference between post-test and pre-test of the experimental group on the mean scores of the science course at the level of remembering, understanding, and applying. Which indicates the success of the framework, in addition to the fact that 43 students preferred to use the framework over traditional education. -
Pletsan, Khrystyna;Konovalova, Marta;Varenia, Nataliia;Khodanovych, Vitalii;Rozvadovskyi, Oleksandr 283
One of the important areas of state policy in the socio-economic and cultural development of the country is cultural diplomacy. It contributes to the information dissemination about the country, strengthens interstate relations, and forms a positive image. Through cultural diplomacy, we achieve a positive perception of the world community of the country, determined by its place in the modern system of international relations. The aim of the study is a comparative analysis of cultural diplomacy opportunities for sustainable development at different levels of public relations, as well as the impact of cultural diplomacy opportunities on the indicators of the Global Sustainable Competitiveness Index and the Global Sustainable Development Index. Regarding the results of the research on the impact of cultural diplomacy opportunities on the indicators of the Global Index of Sustainable Competitiveness and the Global Index of Sustainable Development, four groups are identified among the countries of the European Union: countries with a very high level of sustainable competitiveness and sustainable development; countries with a high level of sustainable competitiveness and sustainable development; countries with low levels of sustainable competitiveness and sustainable development. -
Tatiana, Voropayeva;Marina, Jarvis;Svitlana, Boiko;Hanna, Tolchieva;Nataliia, Statsenko 294
The article highlights the European experience of innovative educational technologies of training management specialists. Based on existing strategies, relevant in the European educational space, the introduction of regulatory elements to maintain a balance between the traditional and innovative format of the educational process, which is typical for the Ukrainian education system is proposed. The article aims to single out educational and technological innovations into a separate cluster of managerial training at different levels in the context of the principles of the modern synergetic sociocultural paradigm. The main objectives of the work are to develop settings to ensure the effective functioning of innovative educational technologies. Among the synergetic principles of educational technologies, providing the formation of necessary competencies of future managers, are: self-organization, interdisciplinarity, nonlinearity, individuality, and technologization. The methods used in the scientific study can be attributed to the group of scientific synergetic methodology. So, the training of specialists in management, implemented in the European practice assumes the use of new educational strategies. These technologies provide both the necessary skills of different levels (hard-soft-digital skills) and the observance of value components (solidarity, ethics, inclusiveness, openness). -
Energy consumption has grown alongside dramatic population increases. Statistics show that buildings in particular utilize a significant amount of energy, worldwide. Because of this, building energy prediction is crucial to best optimize utilities' energy plans and also create a predictive model for consumers. To improve energy prediction performance, this paper proposes a ResNet-LSTM model that combines residual networks (ResNets) and long short-term memory (LSTM) for energy consumption prediction. ResNets are utilized to extract complex and rich features, while LSTM has the ability to learn temporal correlation; the dense layer is used as a regression to forecast energy consumption. To make our model more robust, we employed Huber loss during the optimization process. Huber loss obtains high efficiency by handling minor errors quadratically. It also takes the absolute error for large errors to increase robustness. This makes our model less sensitive to outlier data. Our proposed system was trained on historical data to forecast energy consumption for different time series. To evaluate our proposed model, we compared our model's performance with several popular machine learning and deep learning methods such as linear regression, neural networks, decision tree, and convolutional neural networks, etc. The results show that our proposed model predicted energy consumption most accurately.
-
As a result of the global effect of infectious diseases like COVID-19, remote patient monitoring has become a vital need. Surgical ICU monitors are attached around the clock for patients in critical care. Most ICU monitor systems, on the other hand, lack an output port for transferring data to an auxiliary device for post-processing. Similarly, strapping a slew of wearables to a patient for remote monitoring creates a great deal of discomfort and limits the patient's mobility. Hence, an unique remote monitoring technique for the ICU monitor's physiologically vital readings has been presented, recognizing this need as a research gap. This mechanism has been put to the test in a variety of modes, yielding an overall accuracy of close to 90%.
-
Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.
-
Budniuk, Olexandr;Pereviznyk, Viacheslav;Mazurenko, Hanna;Shcherbakov, Serhii;Antonova, Liudmyla 320
The main purpose of the article is to determine the role of the digitalization phenomenon (its positive and negative sides) as a means of anti-corruption policy in the healthcare sector of Ukraine and provide practical recommendations for transforming the domestic healthcare sector based on digitalization through the implementation of organizational and legal measures. The definitions of such concepts as: corruption in the healthcare sector; digitalization; digitalization of the healthcare sector; e-medicine. A typology of reasons for promoting the development of corruption in the healthcare sector of modern Ukraine is given. As a result of the study, a number of scientific tasks were implemented. The negative side of the introduction of digitalization in the healthcare sector has been identified and illustrated. The types of e-services in the healthcare sector are systematized, each of them is characterized and the fundamental directions of their development are indicated. The existing problems of technostress are characterized (techno-overload; techno-invasion; techno-complexity; techno-insecurity; techno-uncertainty). In the context of considering digitalization as a means of anti-corruption policy in the healthcare sector, practical organizational and legal measures are proposed for implementation. -
Buglimova, Olga V.;Goncharov, Igor;Malinenko, Elvira;Matveeva, Natalya;Stepanenko, Yuri;Chernichkina, Galina 327
The article aims at studying the institution of human rights in an ever-evolving world in the context of the interdisciplinary approach. The main scientific method was deduction that allowed examining the specific interdisciplinary approach in relation to the institution of human rights on the global scale. To solve the issue set, it is necessary to study legal foundations and features of the interdisciplinary approach to the institution of human rights in the modern world. The article proves there is no theoretical anthropological understanding of the institution of human rights. It has been concluded that the appeal to anthropological jurisprudence requires the identification of the initial theoretical and methodological principles, parameters and axioms of cognition, the integration of a person into the subject field of legal science, linking jurisprudence with the chosen external environment (philosophy, sociology, theology, etc.), predetermining the existence (understanding) of a person, causing qualitative differences and the structure of subject-methodological phenomena. In addition to the identification of such hypotheses, prerequisites and axioms, the basic method (principle) of cognition and its heuristic potential are also being searched (defined). The terminological designation of the formed subject-methodological phenomenon (legal anthropology, anthropology of law, anthropological approach, etc.) reveals its role in the system of interdisciplinary relations of legal science. -
Alghamdi, Ahmed M.;Bahaddad, Adel A.;Almarhabi, Khalid A. 332
Digital transformation represents one of the main obstacles facing several government, private, and non-profit sectors that help stabilize digital transformation in the Arabic region. One of the helpful ways to improve the level of freedom, productivity, and flexibility among employees to accept the BYOD approach is using their own devices to perform their work both in and outside the workplace. This study focuses to present the differences between the main three economic sectors, which represent the most important pillars of the economy in Saudi Arabia within the Kingdom's Vision 2030. BYOD also has great importance to the stakeholders for raising their awareness by expressing the implications, if the concept of BYOD is widely and correctly adopted. The study uses the diffusion of innovation (DOI) framework and quantitative analysis data to determine the main dimensions and important factors that help increase the awareness of the target audience. The number of participants in this study was 830, and the participants are mixing between the government, private, and non-profit sectors. The main findings showed a significant impact of several factors such as the importance of knowledge, ease of use, employee satisfaction, risk awareness, and attention to increase the level of acceptance in three main sectors study for using the BYOD approach widespread and professional use. -
Srinivas, V. Sesha;Pompapathi, M.;Rao, G. Srinivasa;Chaitanya, Smt. M. 347
Farmers E-Market is a website that allows agricultural workers to direct market their products to buyers without the use of a middleman. That theory is blockchain system will be used by authors to accomplish this. The system, which is built on a public blockchain system, supports sustainability, shippers, and consumers. Farmers can keep track of their farming activities. Customers can review the product's history and track its journey through carriers to delivery after making a purchase. Farmers are encouraged to get information about their interests promptly in a blockchain-enabled system like this. This functionality is being used by small-scale farmers to form groups based on their location to attract large-scale customers, renegotiate farming techniques or volumes, and enter into contracts with buyers. The analysis shows the use of blockchain technology with a farmer's portal that keeps the video of trading data of crops, taking into account the qualities of blockchain such as values and create or transaction data. The proposal merges python as a programming language with a blockchain system to benefit farmers, vendors, and individuals by preserving transactions. -
Annaluri, Sreenivasa Rao;Attili, Venkata Ramana 352
Text mining is an important process used for analyzing the data collected from different sources like videos, audio, social media, and so on. The tools like Natural Language Processing (NLP) are mostly used in real-time applications. In the earlier research, text mining approaches were implemented using long-short memory (LSTM) networks. In this paper, text mining is performed using average-stochastic gradient descent weight-dropped (AWD)-LSTM techniques to obtain better accuracy and performance. The proposed model is effectively demonstrated by considering the internet movie database (IMDB) reviews. To implement the proposed model Python language was used due to easy adaptability and flexibility while dealing with massive data sets/databases. From the results, it is seen that the proposed LSTM plus weight dropped plus embedding model demonstrated an accuracy of 88.36% as compared to the previous models of AWD LSTM as 85.64. This result proved to be far better when compared with the results obtained by just LSTM model (with 85.16%) accuracy. Finally, the loss function proved to decrease from 0.341 to 0.299 using the proposed model -
Semenkova, Svetlana Nikolaevna;Goncharenko, Olga Nikolaevna;Galanov, Alexandr Eduardovich 359
Scholars are paying increasingly close attention to brain research and the creation of biological neural networks, artificial neural networks, artificial intelligence, neurochips, brain-computer interfaces, prostheses, new research instruments and methods, methods of treatment, as well as the prevention of neurodegenerative diseases based on these data. The authors of the study propose their hypothesis on the understanding of the phenomenon of consciousness that answers questions concerning the criteria of consciousness, its localization, and principles of operation. In the study of the hard problem of consciousness, the philosophical and scientific categories of consciousness, and prominent hypotheses and theories of consciousness, the authors distinguish "the area of the conscious mind", which encompasses several states of consciousness united by the phenomenon of integrated consciousness. According to the authors, consciousness is a kind of executor of the phenomenological idea of the "chalice", so the search for it should be conducted deeper than the processes in the power of thought consciousness and transconsciousness, to which integrated consciousness can act as a lever. However, integrated consciousness may have the capacity to transcend into lower states of consciousness, which requires further study. -
Taranenko, Yuliia;Buhaiets, Nataliia;Kyrychenko, Rymma;Cherniak, Daryna;Mnozhynska, Ruslana;Paskevska, Iuliia 366
The article deals with the theoretical and methodological foundations of innovative approaches in the modern education system. The issues of introducing computerized and telecommunication technologies are characterized, which allow switching to distance learning (DL), which is a promising form of the system of open education support in the modern educational process. Special attention is paid to the study of practical technologies of vocational training and the activities of a teacher and innovative areas of vocational training of students. -
Almarhabi, Khalid A.;Alghamdi, Ahmed M.;Bahaddad, Adel A. 371
The trend of Bring Your Own Device (BYOD) is gaining popularity all over the world with its innumerable benefits such as financial gain, greater employee satisfaction, better job efficiency, boosted morale, and improved flexibility. However, this unstoppable and inevitable trend also brings its own challenges and risks while managing and controlling corporate data and networks. BYOD is vulnerable to attacks by viruses, malware, or spyware that can reach sensitive data and disclose information, modify access policies, disrupt services, create financial issues, minimise productivity, and entail some legal implications. The key focus of this research is how Saudi Arabia has approached BYOD with the help of their 5-step solution model and quantitative research methodology. The result of this study is a statement about what users know about this trend, their opinions about it, and suggestion to increase the employee awareness. -
Many methods used for secret data steganography are based on least significant bit method, which is suffering from security and the embedded message can be easily hacked. In this paper research a proposed method of adding security issues will be introduced, a complex private key will be constructed, the contents of this key will depend on the results of secrete message segmentation. The proposed method will be implemented and the obtained experimental results will be compared with least significant method results to prove that the proposed method raises the image quality parameters.
-
Generate Optimal Number of Features in Mobile Malware Classification using Venn Diagram IntersectionIsmail, Najiahtul Syafiqah;Yusof, Robiah Binti;MA, Faiza 389
Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms. -
Enterprise resource planning (ERP) is widely adopted among enterprises and organizations. In recent years, researchers have become increasingly interested in factors related to ERP implementation success. In this paper, top management members, IT professionals, and end-users were interviewed in the study. The study used Hofstede's main cultural dimensions as a theoretical framework to identify cultural characteristics and their influence on ERP implementation within public organizations in Saudi Arabia. The study followed a qualitative methodology approach to carry on the study to investigate the national culture characteristics in Saudi Arabia that may influence ERP implementation success. The study found some culturally related factors that could influence success in ERP implantation projects in Saudi Arabia..
-
Horban, Yurii;Koshelieva, Oksana;Bigus, Olga;Chepalov, Oleksandr;Bazela, Dmytro 404
An increasing number of students from different cultures study in higher primary schools. This trend is due to: 1) the government's discourse on increasing the level of participation of foreign students in national educational programs and the need for internationalization; 2) the need of employers for professionals who are trained to work in a multicultural environment to meet the needs of different markets and customers. Methodology. This study is based on the results of the OECD (2018) structured survey of 1,093 teachers at universities in Australia, Colombia, the Czech Republic, Denmark, Georgia, Malta, Vietnam, Turkey, and Argentina, examined policy, the practice of cultural characteristics in training specialists, and teachers' attitudes to cultural diversity. Results. The attitude and perception of cultural features by teachers does not determine the practice of forming a cultural environment and managing this environment to ensure quality education of students of different nations. The main culturological aspects of training are self-expression of cultural and ethnic identities, expression of cultural characteristics and their value through multicultural activities in universities, teaching students to combat ethnic or cultural discrimination. Therefore, the formation of a multicultural environment in higher education occurs through the activities of students and teachers, which complement each other. The practical value lies in identifying two important components of the formation of cultural diversity among students, such as self-expression of ethnic and cultural identity and the expression of cultural differences by teachers in the course of educational activities. -
Hnatchuk, Yelyzaveta;Hovorushchenko, Tetiana;Medzatyi, Dmytro 413
The review of known methods and decision support systems regarding the possibility of using the reproductive technologies showed that currently there are no methods and decision support systems regarding the possibility of using reproductive technologies taking into account civil law. Although the analyzed methods and systems have great potential for use in different contexts, these methods and systems do not take into account the civil law requirements of any country. The paper has developed a decision support system regarding the possibility of using the reproductive technologies taking into account civil law, which automatically and free of charge determines the possibility/impossibility of surrogate motherhood or in vitro fertilization. If it is determined that surrogate motherhood or in vitro fertilization is impossible, the sufficiency of the information in the analyzed contract is evaluated, and the reasons for the impossibility of surrogate motherhood or in vitro fertilization are presented to the user. -
Alla, Lukіianchuk;Dmytro, Yefimov;Oksana, Biletska;Andrii, Hrytsenko;Oxana, Hevko 421
This study aimed to determine the effectiveness of the Moodle system in the organization of independent work of students of pedagogical profile.The purpose of the article is to analyze the Moodle platform as an innovative element of educational and pedagogical strategies and a component of the educational and methodological content for the self-study of students.Methodology is divided into clusters: general scientific (analysis, classification), ICT methods (modeling, informatization), and philosophical (synergetics). The study revealed the reorientation of Moodle from an auxiliary element to an alternative format in the organization of independent work of student teachers. Prospects for further scientific research determined in the interest of all participants in the educational process in the further development of Moodle as an effective tool for self-education of future teachers. -
Alarood, Alaa Abdulsalm;Alghamdi, Ahmed Mohammed;Alzahrani, Ahmed Omar;Alzahrani, Abdulrahman;Alsolami, Eesa 427
MP3 is one of the most widely used file formats for encoding and representing audio data. One of the reasons for this popularity is their significant ability to reduce audio file sizes in comparison to other encoding techniques. Additionally, other reasons also include ease of implementation, its availability and good technical support. Steganography is the art of shielding the communication between two parties from the eyes of attackers. In steganography, a secret message in the form of a copyright mark, concealed communication, or serial number can be embedded in an innocuous file (e.g., computer code, video film, or audio recording), making it impossible for the wrong party to access the hidden message during the exchange of data. This paper describes a new steganography algorithm for encoding secret messages in MP3 audio files using an improved least significant bit (LSB) technique with high embedding capacity. Test results obtained shows that the efficiency of this technique is higher compared to other LSB techniques. -
Lukianchuk, Iurii;Tulashvili, Yurii;Podolyak, Volodymyr;Horbariuk, Roman;Kovalchuk, Vasyl;Bazyl, Serhii 443
The method of studying 3D-technologies abroad and in Ukraine is considered. The analysis of educational resources and experience of use of the equipment in branch is carried out. The didactic principles of the educational process for 3D-printing specialists are determined. The use of FDM technology and the ability to minimize the occurrence of defects in the future have been studied. An analysis of the international experience of the educational process of relevant specialists in the field. The content of training for 3D printing specialists has been developed. The experience of using 3D-technologies is described and the list of recommendations for elimination of defects during production of products by means of additive technologies is made. The recommendations will be useful not only for beginners, but also for experienced professionals in additive technologies. The need to study such experience is the main condition for the development of enterprises in Ukraine that plan to automate their own production. A 3D printing engineer must know the basics of economics and marketing, because his responsibilities include optimizing workflows to reduce the cost and speed up printing. Therefore, the knowledge gained from practical experience presented and in building for learning 3D printing engineers by the authors will be important. -
Bezliudniy, Oleksandr;Kravchenko, Oksana;Kondur, Oksana;Reznichenko, Iryna;Kyrsta, Nataliia;Kuzmenko, Yulia;Tkachuk, Larysa 451
This article is devoted to the problem of national and patriotic education of young students by means of digital technologies in the conditions of distance learning environment. It is emphasized that national and patriotic education is a powerful means of strengthening the unity and integrity of Ukraine. It is proved that national and patriotic education will be effective under the condition of systematic and purposeful activity on formation of patriotic consciousness in youth, sense of national dignity, necessity of service of ideals and values of the country. Various forms of educational work of national and patriotic orientation at Pavlo Tychyna Uman State Pedagogical University, which were conducted by digital technologies: online thematic lectures, educational classes, round tables, workshops, guest online meetings with famous researchers of historical heritage of Ukraine, online tours of historical places, virtual exhibitions of art, participation in the national-patriotic student camp "Diia" (Action) and etc. The activity of the University Library and V. O. Sukhomlinsky State Scientific and Pedagogical Library of Ukraine of the National Academy of Pedagogical Sciences of Ukraine, which has a significant impact on the formation of national consciousness and social and political activity of students by modern means of information and communication technologies. It is determined that the project "Inclusive 3D map" helps to broaden the horizons and deepen the knowledge of young students, education of a true citizen, the formation of cognitive interest in the subjects studied, motivation to study, raising awareness of Ukrainians on historical and cultural heritage. The study showed that young students take an active social attitude: they speak Ukrainian, want to live and work in Ukraine, respect their homeland, its traditions, cultural and historical past, love to travel and they are tolerant of people with special needs. Promising areas of educational work with students based on the use of a wide range of information and communication technologies, namely 3D games, TV tandems, podcasts, social networks, video resources in national and patriotic education of youth.