• Title/Summary/Keyword: Computer Science Activities

Search Result 617, Processing Time 0.022 seconds

Security Analysis of the Whirlpool Hash Function in the Cloud of Things

  • Li, Wei;Gao, Zhiyong;Gu, Dawu;Ge, Chenyu;Liao, Linfeng;Zhou, Zhihong;Liu, Ya;Liu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.536-551
    • /
    • 2017
  • With the advancement and deployment of leading-edge telecommunication technologies for sensing and collecting, computing related information, Cloud of Things (CoTs) has emerged as a typical application platform that is envisioned to revolutionize the daily activities of human society, such as intelligent transportation, modern logistics, food safety, environmental monitoring, etc. To avoid any possible malicious attack and resource abuse, employing hash functions is widely recognized as one of the most effective approaches for CoTs to achieve message integrity and data authentication. The Whirlpool hash function has served as part of the joint ISO/IEC 10118-3 International Standard by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). In this paper, we propose an effective differential fault analysis on Whirlpool in the byte-oriented random fault model. The mathematical analysis and experimental results show that 8 random faults on average are required to obtain the current 512-bit message input of whirlpool and the secret key of HMAC-Whirlpool. Our work demonstrates that Whirlpool and HMAC-Whirlpool are both vulnerable to the single byte differential fault analysis. It provides a new reference for the security analysis of the same structure of the hash functions in the CoTs.

Energy-Efficient Cooperative Medium Access Control (MAC) Protocol for Wireless Sensor Networks

  • Ahmed, Mohammad Helal Uddin;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.267-268
    • /
    • 2011
  • Recent research activities in cooperative communication focus on achieving energy efficiency and reliability. Relay selection strategy for cooperative communication improves the performance significantly. However, due to imbalance consumption of power, network might die earlier and more than 90% energy remains unused. In this paper, we provide a framework of an energy-efficient medium access control protocol that minimizes these problems and improves energy efficiency.

Sentiment Analysis to Classify Scams in Crowdfunding

  • shafqat, Wafa;byun, Yung-cheol
    • Soft Computing and Machine Intelligence
    • /
    • v.1 no.1
    • /
    • pp.24-30
    • /
    • 2021
  • The accelerated growth of the internet and the enormous amount of data availability has become the primary reason for machine learning applications for data analysis and, more specifically, pattern recognition and decision making. In this paper, we focused on the crowdfunding site Kickstarter and collected the comments in order to apply neural networks to classify the projects based on the sentiments of backers. The power of customer reviews and sentiment analysis has motivated us to apply this technique in crowdfunding to find timely indications and identify suspicious activities and mitigate the risk of money loss.

The Study on the Development of the Binary System Teaching Contents for the Characters (문자의 이진체계 교육 콘텐츠 개발에 관한 연구)

  • Go, Hyungchul;Kim, Chongwoo
    • Journal of The Korean Association of Information Education
    • /
    • v.20 no.1
    • /
    • pp.39-46
    • /
    • 2016
  • Unplugged has been widely used as an instrument for teaching the basic principles of Computer Science. We'll present 'the binary system teaching contents for the characters' developed for the elementary. And they will successfully guide the student to understand the characters using in computer system. The activity-based learning is provided for describing characters with coding and decoding rules, and the using will be found out in everyday life. To check the adequacy of these materials they were tested to the elementary classroom, and the results showed effectively at Knowledge, Attitude, Generalization levels.

Analysis of Game Immersion using EEG signal for Computer Smart Interface (스마트 인터페이스를 위한 뇌파의 게임몰입 분석)

  • Ga, Yunhan;Choi, Taejin;Yoon, Gilwon
    • Journal of Sensor Science and Technology
    • /
    • v.24 no.6
    • /
    • pp.392-397
    • /
    • 2015
  • Recently computer games have been widely spread. For the purpose of studying brain activities, EEG was measured during the computer game and analyzed in terms of channels and frequency bands. EEG data were obtained during the resting state and game immersion. Then the power spectra of alpha, beta and theta bands were computed. During game immersion, the ratio between theta / alpha could effectively differentiate between rest and game immersion. Changes in brain activity (26~53%) were observed in the parietal and occipital lobes. Interestingly, immersion shows different features compared to concentration. The state of game immersion could be detected. Therefore, it is possible to utilize the state of immersion as one of the game parameters or to generate a control signal that may be used to provide a warning message or abort the game when the situation of the excessive indulgence in the game reaches. EEG can be applied as smart interface for computer game.

An Unplugged Activity to Understand the PageRank Algorithm (PageRank 알고리즘을 이해하기 위한 언플러그드 활동)

  • Park, Youngki
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.4
    • /
    • pp.409-417
    • /
    • 2018
  • There are unplugged computer science activities for elementary school students to learn the concept of the Internet. However, these activities are not enough to teach the concept of the Web because they focus on teaching how the Internet works. Since the Web is the core technology of the Third Industrial Revolution, it needs to be understood as a basic common sense. In this paper, we developed an unplugged activity to understand the PageRank algorithm which is closely related to the web. The experimental results show that our unplugged activities behave similarly to the PageRank algorithm.

An XML and Component-based IDE for Document Flow Application

  • Xiaoqin, Xie;Juanzi, Li;Lu, Ma;Kehong, Wang
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.299-310
    • /
    • 2004
  • Business process in e-government mostly embody as the flow of documents. Constructing a web-based document flow system becomes an critical task for today s digital government. But few of them use an off-the-shelf workflow product. Why? One of the reasons is that most of the workflow system are heavyweight, monolithic, and package a comprehensive set of features in an all-or-nothing manner. Another reason is that workflow technology lacks the constructs and modeling capability as programming language. It is incumbent on government IT organizations to transform their solution development to component-based computing model. Component technology isolates the computation and communication parts, but how to compose different software components is still a hard nut. An integrated development environment is necessary for CBSD. In this paper we propose a XML and component-based document flow-oriented integrated development environment (DFoIDE) for software developers. By writing some xml configure file, and operate on DFoIDE, developer can construct a workflow application quickly. This method divides system to several components and the activities in process are implemented as business component. Different components are discribed detailedly in this paper, especially one of the core component. Component Integrating Tool. Different perspectives in workflow application are seperated and depicted as different XML files. Correspondly, A component composition method for developing workflow application instead of workflow itself is proposed.

  • PDF

New Detection Cheating Method of Online-Exams during COVID-19 Pandemic

  • Jadi, Amr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.123-130
    • /
    • 2021
  • A novel approach for the detection of cheating during e-Exams is presented here using convolutional neural networks (CNN) based systems. This system will help the proctors to identify any kind of uncertain event at the time of online exams, for which most of the government's across the globe are recommending due to the Covid-19 pandemic. Most of the institutions and students across the globe are badly affected by their academic programs and it is a challenging task for universities to conduct examinations using the traditional methods. Therefore, the students are attending most of their classes using different types of third party applications that are available online. However, to conduct online exams the universities cannot rely on these service providers for a long time. Therefore, in this work, a complete setup of the software tools is provided for the students, which can be used by students at their respective laptops/personal computers with strict guidelines from the university. The proposed approach helps most of the universities in Saudi Arabia to maintain their database of different events/activities of students at the time of E-Exams. This method proved to be more accurate and CNN based detection proved to be more sensitive with an accuracy of 97% to detect any kind of uncertain activity of the students at the time of e-Exam.

Designing Interactive Walkways of Smart Cities in Saudi Arabia

  • Jadi, Amr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.121-128
    • /
    • 2021
  • In this work, a noble walkway approach suitable for Saudi Arabia (SA) towards its aim to develop a wide range of smart cities is considered scientifically. This work intends to minimize the errors at each level by testing the events that take place in the walkway environment. similarly, the minimum requirements to develop a walkway to the additional features to be considered while designing a walkway are discussed in this paper with sensitive areas such as environmental factors, healthcare issues, patients visiting the walkways, etc. The applications of different monitoring devices such as CCTV's, global positioning systems (GPS), etc. are carefully addressed to help the proposed method for improving the monitoring activities of a variety of events that possibly cause problems to a common man. The ultimate goal of this work to ensure a safe and satisfied journey of pedestrians while they come for a walk with all suitable safety measures. The safety measures included in this work are for pollution, noise, temperature, humidity and traffic jams on the roads. To improve the accuracy and to test the proposed approach some polices are defined and will be tested for the consistency of the proposed system. The obtained accuracy of the proposed system is proved to be far better with an accuracy of 93% improvement in the results.

Design of Computer Science and Engineering Courses based on Flipped Learning through Integrating Lectures and Team Activities (강의와 팀 활동을 조합한 컴퓨터학 과목의 플립러닝 기반 설계)

  • Sihyung Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.117-125
    • /
    • 2023
  • Flipped learning is an instructional approach that reverses the traditional order of in-class and after-class activities. It entails students studying course materials before attending class, and then utilizing class time for completing homework tasks. Due to collaborative support available from teachers and peers, flipped learning has gained extensive adoption in computer science and engineering courses, enabling students to effectively engage in homework assignments. Nevertheless, students are responsible for studying class materials independently, which can limit their understanding of advanced topics. We propose an approach that combines both flipped learning and the traditional method, allowing them to mutually enhance each other. In the proposed approach, students acquire foundational concepts prior to attending class, and subsequently delve into advanced topics during classroom sessions through lectures and guidance provided by the teacher. Afterward, students collaborate with their peers to solve problems that involve the application of the concepts they have learned, and exchange a variety of solutions and perspectives. We implemented the proposed approach in four computer science and engineering classes, spanning one to four semesters and observed an enhancement in students' comprehension and satisfaction levels. We anticipate implementation of the proposed approach across various computer science and engineering courses, while enhancing their overall quality.