• Title/Summary/Keyword: Comprehensive Security

Search Result 441, Processing Time 0.02 seconds

Modeling in System Engineering: Conceptual Time Representation

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.153-164
    • /
    • 2021
  • The increasing importance of such fields as embedded systems, pervasive computing, and hybrid systems control is increasing attention to the time-dependent aspects of system modeling. In this paper, we focus on modeling conceptual time. Conceptual time is time represented in conceptual modeling, where the notion of time does not always play a major role. Time modeling in computing is far from exhibiting a unified and comprehensive framework, and is often handled in an ad hoc manner. This paper contributes to the establishment of a broader understanding of time in conceptual modeling based on a software and system engineering model denoted thinging machine (TM). TM modeling is founded on a one-category ontology called a thimac (thing/machine) that is used to elaborate the design and analysis of ontological presumptions. The issue under study is a sample of abstract modeling domains as exemplified by time. The goal is to provide better understanding of the TM model by supplementing it with a conceptualization of time aspects. The results reveal new characteristics of time and related notions such as space, events, and system behavior.

Comprehensive review on Clustering Techniques and its application on High Dimensional Data

  • Alam, Afroj;Muqeem, Mohd;Ahmad, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.237-244
    • /
    • 2021
  • Clustering is a most powerful un-supervised machine learning techniques for division of instances into homogenous group, which is called cluster. This Clustering is mainly used for generating a good quality of cluster through which we can discover hidden patterns and knowledge from the large datasets. It has huge application in different field like in medicine field, healthcare, gene-expression, image processing, agriculture, fraud detection, profitability analysis etc. The goal of this paper is to explore both hierarchical as well as partitioning clustering and understanding their problem with various approaches for their solution. Among different clustering K-means is better than other clustering due to its linear time complexity. Further this paper also focused on data mining that dealing with high-dimensional datasets with their problems and their existing approaches for their relevancy

Towards a Taxonomy of Business Process and Its Anomalies

  • Suchenia, Anna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.230-240
    • /
    • 2021
  • This paper presents the definition of a business process and a taxonomy of anomalies in BPMN. Graphical modeling is very popular nowadays and is easily understood by various specialists from different fields. Modeling is a graphical representation of processes in an organization using available rules and resources. Therefore, it is important to use a universal and comprehensive standard to describe models of processes, decisions and software. Such a standard is the BPMN notation, which is a precise notation, but unfortunately it is only a descriptive and graphical form that may contain inaccuracies. The aim of this paper is to collect and analyze available literature describing current state of knowledge about BPMN notation and to present problems and shortcomings related to this topic. The paper includes a taxonomy of problems, their definitions and examples of occurrence in real cases.

Comprehensive Analysis and Evaluation of Mobile S-MAC Protocol in Wireless Sensor Network

  • Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.358-366
    • /
    • 2022
  • Wireless sensor networks (WSN) are becoming widely used in collecting and sensing information in different fields such as in the medical area, smart phone industry and military environment. The main concern here is reducing the power consumption because it effects in the lifetime of wireless sensor during commutation because it may be work in some environment like sensor in the battlefields where is not easy to change the battery for a node and that may decrease the efficiency of that node and that may affect the network traffic may be interrupted because one or more nodes stop working. In this paper we implement, simulate, and investigate S-MAC protocol with mobility support and show the sequence of events the sender and receiver go through. We tested some parameters and their impacts of on the performance including System throughput, number of packets successfully delivered per second, packet delay, average packet delay before successful transmission.

The Ship in the New Saudi Commercial Maritime Law

  • BOUZIR, Saoussen
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.175-182
    • /
    • 2022
  • The new commercial maritime law in the Kingdom came comprehensive and detailed for all topics related to commercial maritime navigation, thus responding to most of the problems that arise in the field, specifically regarding the ship as the focus of the rules of maritime law. This system defines the ship in law, regulates its civil status, determines how to name it, determine its domicile, and the conditions for acquiring Saudi nationality. It also contained a regulation of the rights granted to ships by ownership, as well as their lease and mortgage, the mechanism of attachment to them to settle debts and the rights in kind dependent on them and controlling the rights of third parties on ships and the procedures for forcibly selling them from precautionary seizure and executive seizure and then forced sale in public auction. Until this research was an effort to present a clear picture about the legal system of the ship in the new Saudi commercial maritime system and confirming the extent of the success of the Saudi legislator with the ship system in highlighting the legal frameworks for this facility prepared for maritime navigation.

Consumer Protection in E-commerce: Synthesis Review of Related Articles and Websites.

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.380-384
    • /
    • 2022
  • To have a complete and comprehensive understanding of the research subject and to form an integrated legal framework for it, I have sought comprehensively to cover the major written literature on the issue under consideration. I also benefitted from a wide range of research and academic studies pertaining to the same topic, although that literature did not specifically address the issue of consumer rights in electronic contracting in the Saudi e-commerce system. Rather, it addressed only the civil and criminal protection of the consumer in e-commerce. I have divided the reviewed literature into two sections according to the sources.

Modeling of Regional Management of Innovation Activity: Personnel Policy, Financial and Credit and Foreign Economic Activity

  • Prylipko, Sergii;Vasylieva, Nataliia;Kovalova, Olena;Kulayets, Mariia;Bilous, Yana;Hnatenko, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.43-48
    • /
    • 2021
  • The article proposes a method of modeling a comprehensive indicator for evaluating the effectiveness of regional management of innovation activity. This will make it possible to assess the effectiveness of personnel, financial and credit and foreign economic activity of the regions from the standpoint of an integrated approach. The modeling technique is proposed to be carried out using the tools of taxonomic analysis and the calculation of a complex indicator of the effectiveness of the innovation activity management.

Task Scheduling in Fog Computing - Classification, Review, Challenges and Future Directions

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.89-100
    • /
    • 2022
  • With the advancement in the Internet of things Technology (IoT) cloud computing, billions of physical devices have been interconnected for sharing and collecting data in different applications. Despite many advancements, some latency - specific application in the real world is not feasible due to existing constraints of IoT devices and distance between cloud and IoT devices. In order to address issues of latency sensitive applications, fog computing has been developed that involves the availability of computing and storage resources at the edge of the network near the IoT devices. However, fog computing suffers from many limitations such as heterogeneity, storage capabilities, processing capability, memory limitations etc. Therefore, it requires an adequate task scheduling method for utilizing computing resources optimally at the fog layer. This work presents a comprehensive review of different task scheduling methods in fog computing. It analyses different task scheduling methods developed for a fog computing environment in multiple dimensions and compares them to highlight the advantages and disadvantages of methods. Finally, it presents promising research directions for fellow researchers in the fog computing environment.

A Beeline Routing Protocol for Heterogeneous WSN for IoT-Based Environmental Monitoring

  • Sahitya, G.;Balaji, N.;Naidu, C.D.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.67-72
    • /
    • 2022
  • A wireless sensor network (WSN), with its constrained sensor node energy supply, needs an energy-efficient routing technique that maximises overall system performance. When rumours are routed using a random-walk routing algorithm, which is not highly scalable, spiral pathways may appear. Because humans think a straight line is the quickest route between two sites and two straight lines in a plane are likely to intersect, straight-line routing (SLR) constructs a straight path without the aid of geographic information. This protocol was developed for WSNs. As a result, sensor nodes in WSNs use less energy when using SLR. Using comprehensive simulation data, we show that our upgraded SLR systems outperform rumour routing in terms of performance and energy conservation.

A Study of Web Hacking Response Procedures Model based on Diagnosis Studies for Cross-Site Scripting (XSS)Process (Cross-Site Scripting(XSS) 프로세스 진단을 기반으로 한 웹 해킹 대응절차 모델 연구)

  • Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.83-89
    • /
    • 2013
  • When applying web hacking techniques and methods it needs to configure the integrated step-by-step and run an information security. Web hackings rely upon only one way to respond to any security holes that can cause a lot. In this study the diagnostic process of cross-site scripting attacks and web hacking response procedures are designed. Response system is a framework for configuring and running a step-by-step information security. Step response model of the structure of the system design phase, measures, operational step, the steps in the method used. It is designed to secure efficiency of design phase of the system development life cycle, and combines the way in secure coding. In the use user's step, the security implementation tasks to organize the details. The methodology to be applied to the practice field if necessary, a comprehensive approach in the field can be used as a model methodology.