• Title/Summary/Keyword: Computer science

Search Result 31,062, Processing Time 0.055 seconds

Security Risk Assessment in Conducting Online Exam

  • Danah AlDossary;Danah AlQuaamiz;Fai AlSadlan;Dana AlSharari;Lujain AlOthman;Raghad AlThukair;Ezaz Aldahasi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.77-83
    • /
    • 2023
  • This research is conducted to minimize the potential security risks of conducting online exams to an acceptable level as vulnerabilities and threats to this type of exam are presented. This paper provides a general structure for the risk management process and some recommendations for increasing the level of security.

The Elementary Students' Understanding of Computer Science Through The Computer Science Show Program (컴퓨터과학 쇼를 통한 초등학생의 정보교육에 대한 인식변화)

  • Han, Byoungrae
    • Journal of The Korean Association of Information Education
    • /
    • v.21 no.2
    • /
    • pp.209-217
    • /
    • 2017
  • Recently SW education has been emphasized in Korea, but many students do not have many opportunities to learn computer science. In this paper, I organized a computer science show to enhance interest and understanding of computer science. The computer science show consisted of understanding binary systems, send a text message, parity bit magic, finding a number card, and collecting colors (orange games). I applied the computer science show to elementary school students and looked at the results. Most of the students who participated in computer science shows did not have an "participation experience of computer science shows". As result of surveys, many students answered "I am interesting about computer science shows," "I am interested in computer science," and "I would recommend it to my friends nearby." Through research, I learned that computer science shows are a way for elementary students to draw interest in computer science and to create curiosity and interest in computer science. I found from research that computer science shows are a way to reduce students' learning burdens and to increase interest in computer science.

Applications of 5G and 6G in Smart Health Services

  • Al-Jawad, Fatimah;Alessa, Raghad;Alhammad, Sukainah;Ali, Batoola;Al-Qanbar, Majd;Rahman, Atta-ur
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.173-182
    • /
    • 2022
  • Healthcare organizations are overwhelmingly embracing smart value-based care strategies, which focuses on providing superior treatment at a significantly lower cost and quality of service (QoS). For these purposes, fifth generation (5G) of mobile service provides an innumerable improvement that clearly outperforms previous generations e.g., 3G and 4G. However, as with most advancements, 5G is projected to introduce new challenges, prompting the community to think about what comes next. This research was conducted to examine the most recent smart 5G technology applications and the solutions they provide to the healthcare industry. Finally, the paper discusses how the upcoming 6G technology has the potential to transform the future of healthcare sector even beyond the current 5G systems.

Analysis of Successful Adaptation Factors of Computer Science Freshmen Students (컴퓨터 전공 신입생의 성공적 적응 요인 분석)

  • Park, Uchang
    • Journal of Engineering Education Research
    • /
    • v.17 no.4
    • /
    • pp.95-101
    • /
    • 2014
  • As other major, students have difficulties to be successfully adapted to computer science major without some interest and skill to computer programming. In this paper, we try to find successful factors for computer science major freshmen students to computer programming. The factors we focused are programming experience before college entrance, taking liberal arts/natural science courses at high school, application motivations to computer major, existence of mentors, satisfaction to his/her computer department, student's holland job aptitude code. After analysis, taking liberal arts/natural science courses at high school, satisfaction to computer department, some holland job aptitude code are significant to their successful adaptation to computer major. Also, we found the holland job apptitude code is closely related to student's satisfaction to their major for engineering students including computer science students. Our analysis results will be a suggestion for designing computer science education program with students who enters college without some aptitude or preparation to his major.

SYN Flood DoS Detection System Using Time Dependent Finite Automata

  • Noura AlDossary;Sarah AlQahtani;Reem Alzaher;Atta-ur-Rahman
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.147-154
    • /
    • 2023
  • Network intrusion refers to any unauthorized penetration or activity on a computer network. This upsets the confidentiality, integrity, and availability of the network system. One of the major threats to any system's availability is a Denial-of-Service (DoS) attack, which is intended to deny a legitimate user access to resources. Therefore, due to the complexity of DoS attacks, it is increasingly important to abstract and describe these attacks in a way that will be effectively detected. The automaton theory is used in this paper to implement a SYN Flood detection system based on Time-Dependent Finite Automata (TDFA).

Integration of Blockchain and Cloud Computing in Telemedicine and Healthcare

  • Asma Albassam;Fatima Almutairi;Nouf Majoun;Reem Althukair;Zahra Alturaiki;Atta Rahman;Dania AlKhulaifi;Maqsood Mahmud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.17-26
    • /
    • 2023
  • Blockchain technology has emerged as one of the most crucial solutions in numerous industries, including healthcare. The combination of blockchain technology and cloud computing results in improving access to high-quality telemedicine and healthcare services. In addition to developments in healthcare, the operational strategy outlined in Vision 2030 is extremely essential to the improvement of the standard of healthcare in Saudi Arabia. The purpose of this survey is to give a thorough analysis of the current state of healthcare technologies that are based on blockchain and cloud computing. We highlight some of the unanswered research questions in this rapidly expanding area and provide some context for them. Furthermore, we demonstrate how blockchain technology can completely alter the medical field and keep health records private; how medical jobs can detect the most critical, dangerous errors with blockchain industries. As it contributes to develop concerns about data manipulation and allows for a new kind of secure data storage pattern to be implemented in healthcare especially in telemedicine fields is discussed diagrammatically.

Computer Science Education and Use of Learning Materials (비전공자 컴퓨터교육과 학습보조 자료의 활용)

  • Nah, Jeong Eun
    • Journal of Engineering Education Research
    • /
    • v.22 no.6
    • /
    • pp.21-27
    • /
    • 2019
  • In the last few years, interest in computer science education has increased significantly. The curriculum is being revised to introduce computer science. Although interest has focused on coding as the main subject, in fact the computer science includes much more than coding. It engages people in being creative with technology as well as understanding the fundamental principles of computer science. Therefore, it is important to consider the curriculum to provide a foundation by teaching and learning computer science. The curriculum is required the development of courses to teach computer science for non-majors in general education. To think like a computer scientist on the knowledge of computer science is computational thinking. In order to maximize the effectiveness of teaching and learning for computational thinking, various teaching methods and supplementary learning materials, and activities should be developed and provided.

Transfer Learning for Caladium bicolor Classification: Proof of Concept to Application Development

  • Porawat Visutsak;Xiabi Liu;Keun Ho Ryu;Naphat Bussabong;Nicha Sirikong;Preeyaphorn Intamong;Warakorn Sonnui;Siriwan Boonkerd;Jirawat Thongpiem;Maythar Poonpanit;Akarasate Homwiseswongsa;Kittipot Hirunwannapong;Chaimongkol Suksomsong;Rittikait Budrit
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.126-146
    • /
    • 2024
  • Caladium bicolor is one of the most popular plants in Thailand. The original species of Caladium bicolor was found a hundred years ago. Until now, there are more than 500 species through multiplication. The classification of Caladium bicolor can be done by using its color and shape. This study aims to develop a model to classify Caladium bicolor using a transfer learning technique. This work also presents a proof of concept, GUI design, and web application deployment using the user-design-center method. We also evaluated the performance of the following pre-trained models in this work, and the results are as follow: 87.29% for AlexNet, 90.68% for GoogleNet, 93.59% for XceptionNet, 93.22% for MobileNetV2, 89.83% for RestNet18, 88.98% for RestNet50, 97.46% for RestNet101, and 94.92% for InceptionResNetV2. This work was implemented using MATLAB R2023a.

Evaluating AI Techniques for Blind Students Using Voice-Activated Personal Assistants

  • Almurayziq, Tariq S;Alshammari, Gharbi Khamis;Alshammari, Abdullah;Alsaffar, Mohammad;Aljaloud, Saud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.61-68
    • /
    • 2022
  • The present study was based on developing an AI based model to facilitate the academic registration needs of blind students. The model was developed to enable blind students to submit academic service requests and tasks with ease. The findings from previous studies formed the basis of the study where functionality gaps from the literary research identified by blind students were utilized when the system was devised. Primary simulation data were composed based on several thousand cases. As such, the current study develops a model based on archival insight. Given that the model is theoretical, it was partially applied to help determine how efficient the associated AI tools are and determine how effective they are in real-world settings by incorporating them into the portal that institutions currently use. In this paper, we argue that voice-activated personal assistant (VAPA), text mining, bag of words, and case-based reasoning (CBR) perform better together, compared with other classifiers for analyzing and classifying the text in academic request submission through the VAPA.