• Title/Summary/Keyword: Computer Use

Search Result 10,274, Processing Time 0.034 seconds

Role of Machine Learning in Intrusion Detection System: A Systematic Review

  • Alhasani, Areej;Al omrani, Faten;Alzahrani, Taghreed;alFahhad, Rehab;Alotaibi, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.155-162
    • /
    • 2022
  • Over the last 10 years, there has been rapid growth in the use of Machine Learning (ML) techniques to automate the process of intrusion threat detection at a scale never imagined before. This has prompted researchers, software engineers, and network specialists to rethink the applications of machine ML techniques particularly in the area of cybersecurity. As a result there exists numerous research documentations on the use ML techniques to detect and block cyber-attacks. This article is a systematic review involving the identification of published scholarly articles as found on IEEE Explore and Scopus databases. The articles exclusively related to the use of machine learning in Intrusion Detection Systems (IDS). Methods, concepts, results, and conclusions as found in the texts are analyzed. A description on the process taken in the identification of the research articles included: First, an introduction to the topic which is followed by a methodology section. A table is used to list identified research articles in the form of title, authors, methodology, and key findings.

Malware Classification using Dynamic Analysis with Deep Learning

  • Asad Amin;Muhammad Nauman Durrani;Nadeem Kafi;Fahad Samad;Abdul Aziz
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.49-62
    • /
    • 2023
  • There has been a rapid increase in the creation and alteration of new malware samples which is a huge financial risk for many organizations. There is a huge demand for improvement in classification and detection mechanisms available today, as some of the old strategies like classification using mac learning algorithms were proved to be useful but cannot perform well in the scalable auto feature extraction scenario. To overcome this there must be a mechanism to automatically analyze malware based on the automatic feature extraction process. For this purpose, the dynamic analysis of real malware executable files has been done to extract useful features like API call sequence and opcode sequence. The use of different hashing techniques has been analyzed to further generate images and convert them into image representable form which will allow us to use more advanced classification approaches to classify huge amounts of images using deep learning approaches. The use of deep learning algorithms like convolutional neural networks enables the classification of malware by converting it into images. These images when fed into the CNN after being converted into the grayscale image will perform comparatively well in case of dynamic changes in malware code as image samples will be changed by few pixels when classified based on a greyscale image. In this work, we used VGG-16 architecture of CNN for experimentation.

Object Detection Using Deep Learning Algorithm CNN

  • S. Sumahasan;Udaya Kumar Addanki;Navya Irlapati;Amulya Jonnala
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.129-134
    • /
    • 2024
  • Object Detection is an emerging technology in the field of Computer Vision and Image Processing that deals with detecting objects of a particular class in digital images. It has considered being one of the complicated and challenging tasks in computer vision. Earlier several machine learning-based approaches like SIFT (Scale-invariant feature transform) and HOG (Histogram of oriented gradients) are widely used to classify objects in an image. These approaches use the Support vector machine for classification. The biggest challenges with these approaches are that they are computationally intensive for use in real-time applications, and these methods do not work well with massive datasets. To overcome these challenges, we implemented a Deep Learning based approach Convolutional Neural Network (CNN) in this paper. The Proposed approach provides accurate results in detecting objects in an image by the area of object highlighted in a Bounding Box along with its accuracy.

Computer use experience of nurses working in hospital

  • Kim, Jung-ae;Cho, Eui-young
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.31-39
    • /
    • 2018
  • The purpose of this study was to examine the meaning and structure of nurses' computer using experience. To do this, we conducted a total of three interviews with 11 nurses working between the ages of 26 and 48. Interview data were interpreted using Giori method (1985) and Lincoln & Guba method (1985). As a result, 112 semantic units were derived, and then 18 sub-components were divided into 5 final components. As a result of the analysis, the computer experience that the nurses used in the hospital consisted of 'used for almost every task', 'usefulness', 'important', 'convenience', 'burden', 'anxiety', desire', simple work level', 'no problems', 'eye, muscle and movement discomfort', 'depends on task', 'more complex', 'accuracy', 'organize contents', 'simple', 'incomparable', and 'easy'. Based on the above conclusions, the nurses' experiences of using the computer in the hospital could be concluded as follows. Currently, almost all nursing jobs in hospitals are using computers. However, most of the tasks related to simple computer tasks related to the ability to use the computer was low, and because of this, the computer did not work properly, or when new programs were introduced to feel the burden and anxiety, want more systematic computer education Found. Especially, according to the career, the difference between computer and hand work was different, Nurses over 20 years said that computers can handle simple tasks that are a bit more complicated than manual tasks, whereas emotional tasks were handicapped, in the 10 to 20 years of experience, computer work was more accurate and appropriate to organize content, Nurses under 10 years were not only easy to work with computers but also have no experience in manual work, they could not compare the computer and the hand work. This study suggests that the use of computers in nurses' work is essential and that more systematic computer-based education should be provided. In addition, due to the nature of the nursing service, the professional opinions of the nurses should be reflected in the development of programs for the emotional nursing work.

The Effects of Elementary and Middle School Students' Computer Use and Information(Computer) Educational Experiences on their ICT Literacy Levels (초·중학생의 컴퓨터 활용 및 정보(컴퓨터) 교육 경험이 ICT 리터러시 수준에 미치는 영향)

  • Nam, Chang Woo;Ahn, Seonghun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.18-32
    • /
    • 2016
  • The purpose of this study was to analyze the differences of elementary and middle school students' ICT literacy by their computer use and information(computer) educational experiences. For this purpose, this study implemented ICT literacy test for students in 300 elementary (4th~6th)- and 300 middle(7th~9th) schools in 2015. The ICT literacy test was composed of two components of 'literacy ability elements' and 'literacy content elements.' The main results of this study are as follows. First, in both of elementary and middle schools, there are positive relationships between students' 'computer use at home' and 'computer outside school,' and their ICT literacy test scores, but their extreme computer use affected their ICT literacy test scores negatively. Second, in both of elementary and middle schools, there are positive relationships between students' information(computer) educational experiences and their ICT literacy test scores.

TMUML: A Singular TM Model with UML Use Cases and Classes

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.127-136
    • /
    • 2021
  • In the systems and software modeling field, a conceptual model involves modeling with concepts to support development and design. An example of a conceptual model is a description developed using the Unified Modeling Language (UML). UML uses a model multiplicity formulation approach, wherein a number of models are used to represent alternative views. By contrast, a model singularity approach uses only a single integrated model. Each of these styles of modeling has its strengths and weaknesses. This paper introduces a partial solution to the issue of multiplicity vs. singularity in modeling by adopting UML use cases and class models into the conceptual thinging machine (TM) model. To apply use cases, we adopt the observation that a use-case diagram is a description that shows the internal structure of the part of the system represented by the use case in addition to being useful to people outside of the system. Additionally, the UML class diagram is recast in TM representation. Accordingly, we develop a TMUML model that embraces the TM specification of the UML class diagram and the internal structure extracted from the UML use case. TMUML modeling introduces some of the advantages that have made UML a popular modeling language to TM modeling. At the same time, this approach supplies UML with partial model singularity. The paper details experimentation with TMUML using examples from the literature. Our results indicate that mixing UML with other models could be a viable approach.

A Study on the Development of Computer Aided Design Software for Interior Architectural Design-From CAD(Computer Aided Design) to Virtual Reality of Transforting (실내 건축 설계를 위한 CAD 소프트웨어 개발에 관한 연구-CAD로부터 가상현실 GRAPHIC PROGRAM으로의 전환을 통하여-)

  • 이남수
    • Korean Institute of Interior Design Journal
    • /
    • no.12
    • /
    • pp.40-49
    • /
    • 1997
  • What's the direction of INTERIOR ARCHITECTURAL DESIGN in 21 Century High Tech\ulcorner The purpose of this research is to show not only practical use of Computer Graphic(CG) as simple tool function, but offering conversation with computer and other ways of method. When we consider poor CG market, investment on the research of VR(Virtual Reality) is the most urgent. The investment on VR will solve various problems. Firstly. It will solve the problems drived from Interior design process by making spatial images like reality. Secondly, It will solve high wages and financial difficulties caused by raise cost funds. Thirdly, It prevents in a road from foreign company that will bring enormous program, caused by opening the domestic market. Also, It help interior designer check in advance the problems in constructure through showing him a supposed imagination including the system and location of equipments. But it is reality that even ordinary American can't offer VR(Virtual Reality) System. We should have noted that it is normal to spend 10 billion won for such presentation as Model House in the large corporation. We must acknowledge that it is such a waist of money nationally. Therefore, investment on CG & VR System is essential in order to save cost more effective presentation & interior design. We will see great result within a year. As we can see, there is huge area we have make develop. One of them is specific technical plan on VR System and study of flow chart. We close with simple methodological way to use VR System and will study Computer System. Which is fitting to CG that we have to solve the link of hardware and software on VR System\ulcorner We know from the cases in other countries that continuous research on this subject has great value for Interior Architectural Design and its effective use. When we try hard not only for methodological use but practical use, the purpose of CG and VR System will be a factor to contribute on this subject for better Interior design & presentation.

  • PDF

Be Aware -Application for Measuring Crowds Through Crowdsourcing Technique in Makkah Al-Mukarramh

  • Mirza, Olfat M.;Alharbi, Israa;Khayyat, Sereen;Aleidarous, Rawa;Albishri, Doaa;Alzhrani, Wejdan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.199-208
    • /
    • 2022
  • The world health organization classified the emerging coronavirus (known as Covid-19) as a pandemic after confirming the extent of spread and scale. As a matter of fact, outbreaks of similar scale or even worse have been witnessed throughout history. Thus, the development of prevention strategies exists to protect against such calamaties. One of the widely proven measures that controls the spread of any contagious diseases is social distancing. As a result, this paper will demonstrate the concept of an application "Be Aware" on enabling the implementation of this preventive measure. In particular "Be aware" evaluates the extent of congestion in public places using current time data. The proposed project will use Global Positioning System (GPS), and Application Programming Interface (API), to ensure information accuracy, and the API use Crowdsourcing to collect Real-Time Data (RTD) from the selected places. One line

A Newly Telesecurity of VoIP using SIP protocol in VPN

  • Lee, Sung-Ki;Hwang, Doh-Yeun;Yi, Seung-Ryong;Yu, Seung-Sun;Kwak, Hoon-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1391-1394
    • /
    • 2005
  • The VoIP (Voice over IP) is being used world-widely and already put to practical use in many fields. However, it is needed to ensure the security of VoIP call in special situations. It is relatively difficult to eavesdrop commonly used PSTN network in that a 1:1 circuit connects it. However, it is difficult to ensure the security of a call on Internet because many users are connected to the Internet concurrently. This paper suggests a new model for Internet telephony to prevent eavesdrops, using VoIP (using SIP protocol) with the use the VPN protocol and establish the feasibility of its practical use comparing it with the conventional Internet telephony.

  • PDF

The Use of the Computer in Written Language

  • Hong, Sung-Ryong
    • Journal of Digital Contents Society
    • /
    • v.8 no.4
    • /
    • pp.607-613
    • /
    • 2007
  • Current changes in the written language curriculum have lead to emphasis being placed on the process involved in writing rather than the product. Writing is being viewed as a means of exploration, with text being manipulated in revision until a clear message is conveyed. This study focuses on the use of the computer in written language, as a tool to facilitate learning, increase interaction and alter children's attitudes. Some children from a local primary school participated in a project which gave them access to a computer and guidance during the process of revision. Evaluation of this study showed a two-fold effect. Firstly the writing behaviors of the children developed with their increased involvement in the process. For example, the children began to read what they had written thereby independently evaluating the content. Secondly, arising from this, as a sense of control over their writing was gained the children's attitudes towards writing became more positive.

  • PDF