• Title/Summary/Keyword: Common number network

Search Result 210, Processing Time 0.023 seconds

Regulatory Policy: Bibliometric Analysis Using the VOSviewer Program

  • Zhavoronok, Artur;Chub, Anton;Yakushko, Inna;Kotelevets, Dmytro;Lozychenko, Oleksandr;Kupchyshynа, Olga
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.39-48
    • /
    • 2022
  • Today the regulation of socio-economic development has been the subject of active scientific debate. The modern paradigm of regulatory policy in foreign countries involves a change in the role and strategy of the state, which determines the relevance of this topic. The aim of the article is to study the current state of regulatory policy research. The article is based on a bibliographic analysis of the study of regulatory policy. The study is based on the data search functions of the Scopus platform. It uses a set of VOSviewer program, online visualization of keywords in the titles of scientific journals and citations of publications. The study led to the conclusion that the number of publications that directly study the nature and features of regulatory policy is insignificant, but constantly growing. In our opinion, further research should determine the essence of regulatory policy as a separate category, a description of its features and factors of formation. It is also necessary to develop a common concept that governments should be actively involved in ensuring the quality of regulation, rather than responding to the shortcomings of regulation, which is evolving into regulatory governance.

Understanding the Risks on Saudi Arabian's Youth Being Online Without Having Strong Cyber-Security Awareness

  • Alharbi, Nawaf;Soh, Ben;AlZain, Mohammed A;Alharbi, Mawaddah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.131-146
    • /
    • 2022
  • The Internet is becoming a basic need for many individuals globally in this digital age. The youths became more active online than before, with the majority relying on different platforms to communicate and interact with peers. Saudi Arabia is one of the nations where internet usage is high, with an increasing number of active internet users. The youth in Saudi Arabia are engaged in various online platforms. However, they lack adequate knowledge about cybersecurity and the dangers of internet usage, which exposes them to the risk of falling victims to cybercriminals. The most common dangers of internet usage include viruses, malware, phishing, and hacking, compromising users' sensitive information. Increased awareness of these potential threats helps protect Internet users and secure their data. The understanding of the dangers of Internet usage among youths varies across countries. In this regard, our study explores the risks of internet usage among youth in Saudi Arabia compared to the United States, South Africa, and New Zealand.

Detection and Recognition of Vehicle License Plates using Deep Learning in Video Surveillance

  • Farooq, Muhammad Umer;Ahmed, Saad;Latif, Mustafa;Jawaid, Danish;Khan, Muhammad Zofeen;Khan, Yahya
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.121-126
    • /
    • 2022
  • The number of vehicles has increased exponentially over the past 20 years due to technological advancements. It is becoming almost impossible to manually control and manage the traffic in a city like Karachi. Without license plate recognition, traffic management is impossible. The Framework for License Plate Detection & Recognition to overcome these issues is proposed. License Plate Detection & Recognition is primarily performed in two steps. The first step is to accurately detect the license plate in the given image, and the second step is to successfully read and recognize each character of that license plate. Some of the most common algorithms used in the past are based on colour, texture, edge-detection and template matching. Nowadays, many researchers are proposing methods based on deep learning. This research proposes a framework for License Plate Detection & Recognition using a custom YOLOv5 Object Detector, image segmentation techniques, and Tesseract's optical character recognition OCR. The accuracy of this framework is 0.89.

Factors for Better Adoption of Information Security on Custom-Made Software at SMEs: A Systematic Review and Framework

  • Fatimah Alghamdi;Moutasm Tamimi;Nermin Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.65-78
    • /
    • 2023
  • Investigations on information security factors re- main elusive at small and medium enterprises (SMEs), es- specially for custom-made software solutions. This article aims to investigate, classify, adopt factors from recent literature addressing information security resources. SMEs al- ready have information security in place, but they are not easy to adopt through the negotiation processes between the in-house software development companies and custom-made software clients at SMEs. This article proposes a strategic framework for implementing the process of adoption of the information security factors at SMEs after conducting a systematic snapshot approach for investigating and classifying the resources. The systematic snapshot was conducted using a search strategy with inclusion and exclusion criteria to retain 128 final reviewed papers from a large number of papers within the period of 2001-2022. These papers were analyzed based on a classification schema including management, organizational, development, and environmental categories in software development lifecycle (SDLC) phases in order to define new security factors. The reviewed articles addressed research gaps, trends, and common covered evidence-based decisions based on the findings of the systematic mapping. Hence, this paper boosts the broader cooperation between in-house software development companies and their clients to elicit, customize, and adopt the factors based on clients' demands.

A Prediction Model for studying the Impact of Separated Families on Students using Decision Tree

  • Ourida Ben boubaker;Ines Hosni;Hala Elhadidy
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.79-84
    • /
    • 2023
  • Social studies show that the number of separated families have lately increased due to different reasons. Despite the causes for family rift, many problems are resulted which affected the children physically and psychologically. This effect may cause them fail in their life especially at school. This paper focuses on the negative reaction of the parents' separation with other factors from the computer science prospective. Since the artificial intelligent field is the most common widespread in computer science, a predictive model is built to predict if a specific child whose parents separated, may complete the school successfully or fail to continue his education. This will be done using Decision Tree that have proved their effectiveness on the predication applications. As an experiment, a sample of individuals is randomly chosen and applied on our prediction model. As a result, this model shows that the separation may cause the child success at school if other factors are satisfied; the intelligent of the guardian, the relation between the parents after the separation, his age at the separation time, etc.

AdaMM-DepthNet: Unsupervised Adaptive Depth Estimation Guided by Min and Max Depth Priors for Monocular Images

  • Bello, Juan Luis Gonzalez;Kim, Munchurl
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.11a
    • /
    • pp.252-255
    • /
    • 2020
  • Unsupervised deep learning methods have shown impressive results for the challenging monocular depth estimation task, a field of study that has gained attention in recent years. A common approach for this task is to train a deep convolutional neural network (DCNN) via an image synthesis sub-task, where additional views are utilized during training to minimize a photometric reconstruction error. Previous unsupervised depth estimation networks are trained within a fixed depth estimation range, irrespective of its possible range for a given image, leading to suboptimal estimates. To overcome this suboptimal limitation, we first propose an unsupervised adaptive depth estimation method guided by minimum and maximum (min-max) depth priors for a given input image. The incorporation of min-max depth priors can drastically reduce the depth estimation complexity and produce depth estimates with higher accuracy. Moreover, we propose a novel network architecture for adaptive depth estimation, called the AdaMM-DepthNet, which adopts the min-max depth estimation in its front side. Intensive experimental results demonstrate that the adaptive depth estimation can significantly boost up the accuracy with a fewer number of parameters over the conventional approaches with a fixed minimum and maximum depth range.

  • PDF

A Study on the Development Direction of Medical Tourism and Wellness Tourism Using Big Data

  • JINHO LEE;Gi-Hwan Ryu
    • International journal of advanced smart convergence
    • /
    • v.13 no.1
    • /
    • pp.180-184
    • /
    • 2024
  • Since COVID-19, many foreign tourists have visited Korea for medical tourism. When statistical data were checked from 2022, after COVID-19, the number of foreign patients visiting Korea for two years was 24.8 million, an increase of 70.1% from 2020. It was confirmed that it has achieved a 50% level compared to 2019 (Statistics Office, 2023). Therefore, to create a development plan by linking medical tourism and wellness tourism, the purpose of this study is to find the link between medical tourism and wellness tourism as big data and present a development plan. In this research method, medical tourism, and wellness tourism for two years from 2022 to 2023 from the post-COVID period as big data are set as central keywords to compare text data to find common points. When analyzing wellness tourism and medical tourism, it was confirmed that most wellness tourism had a greater frequency than medical tourism. This confirmed that wellness tourism occupies a larger pie than medical tourism. As a result, when checking the word frequency, it was confirmed that wellness tourism and medical tourism share a lot as complex tourism products, and when checking 2-gram, to attract many medical tourists, it is necessary to combine medical tourism clusters and wellness tourism according to each other's characteristics among local governments.

Text Analysis on the Research Trends of Nature Restoration in Korea (텍스트 분석을 활용한 국내 자연환경복원 연구동향 분석)

  • Lee, Gil-sang;Jung, Yee-rim;Song, Young-keun;Lee, Sang-hyuk;Son, Seung-Woo
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.27 no.2
    • /
    • pp.29-42
    • /
    • 2024
  • As a global response to climate and biodiversity challenges, there is an emphasis on the conservation and restoration of ecosystems that can simultaneously reduce carbon emissions and enhance biodiversity. This study comprised a text analysis and keyword extraction of 1,100 research papers addressing nature restoration in Korea, aiming to provide a quantative and systematic evaluation of domestic research trends in this field. To discern the major research topics of these papers, topic modeling was applied and correlations were established through network analysis. Research on nature restoration exhibited a mainly upward trend in 2002-2022 but with a slight recent decline. The most common keywords were "species," "forest," and "water". Research topics were broadly classified into (1) predictions of habitat size and species distribution, (2) the conservation and utilization of natural resources in urban areas, (3) ecosystems and landscape managements in protected areas, (4) the planting and growth of vegetation, and (5) habitat formation methods. The number of studies on nature restoration are increasing across various domains in Korea, with each domain experiencing professional development.

The study for the differentiation of transmission and vertical integration of Internet Service Provider over the issue of network neutrality (망 중립성 이슈에서 ISP 사업자의 전송 차등화와 수직계열화에 대한 연구)

  • Lee, Jae-Ho;Byun, Dong-Sik;Kim, Hee-Kyung
    • Korean journal of communication and information
    • /
    • v.62
    • /
    • pp.200-222
    • /
    • 2013
  • A recent argument of network neutrality is converted by the differentiation of transmission and cost adjustment. However, It is raised that this phenomenon caused strategy for vertical integration operator to exclude a competitive operator. This study analyzed a number of instances about differentiation of transmission of ISP and problems of ISP that vertical integration in IX markets. The result of research, differentiation of transmission increased service differentiation about application programs used a best effort network like OTT or Smart TV. But this study was analyzed that a related law was vague for solving this issue. Besides, ISPs that is vertical integrated and commercial operated in an IX market discriminated competitive services, and this phenomenon can be proceeded plainly and orginated in an issue of a related law.

  • PDF

A Neural Metwork's FPGA Realization using Gate Level Structure (게이트레벨 연산구조를 사용한 신경합의 FPGA구현)

  • Lee, Yun-Koo;Jeong, Hong
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.3
    • /
    • pp.257-269
    • /
    • 2001
  • Because of increasing number of integrated circuit, there is many tries of making chip of neural network and some chip is exit. but this is not prefer because YLSI technology can't support so large hardware. So imitation of whole system of neural network is more prefer. There is common procedure in signal processing as in the neural network and pattern recognition. That is multiplication of large amount of signal and reading LUT. This is identical with some operation of MLP, and need iterative and large amount of calculation, so if we make this part with hardware, overall system's velocity will be improved. So in this paper, we design neutral network, not neuron which can be used to many other fields. We realize this part by following separated bits addition method, and it can be appled in the real time parallel process processing.

  • PDF