• Title/Summary/Keyword: Control Components of Information Security

Search Result 63, Processing Time 0.019 seconds

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

Innovative Technologies in Higher School Practice

  • Popovych, Oksana;Makhynia, Nataliia;Pavlyuk, Bohdan;Vytrykhovska, Oksana;Miroshnichenko, Valentina;Veremijenko, Vadym;Horvat, Marianna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.248-254
    • /
    • 2022
  • Educational innovations are first created, improved or applied educational, didactic, educative, and managerial systems and their components that significantly improve the results of educational activities. The development of pedagogical technology in the global educational space is conventionally divided into three stages. The role of innovative technologies in Higher School practice is substantiated. Factors of effectiveness of the educational process are highlighted. Technology is defined as a phenomenon and its importance is emphasized, it is indicated that it is a component of human history, a form of expression of intelligence focused on solving important problems of being, a synthesis of the mind and human abilities. The most frequently used technologies in practice are classified. Among the priority educational innovations in higher education institutions, the following are highlighted. Introduction of modular training and a rating system for knowledge control (credit-modular system) into the educational process; distance learning system; computerization of libraries using electronic catalog programs and the creation of a fund of electronic educational and methodological materials; electronic system for managing the activities of an educational institution and the educational process. In the educational process, various innovative pedagogical methods are successfully used, the basis of which is interactivity and maximum proximity to the real professional activity of the future specialist. There are simulation technologies (game and discussion forms of organization); technology "case method" (maximum proximity to reality); video training methodology (maximum proximity to reality); computer modeling; interactive technologies; technologies of collective and group training; situational modeling technologies; technologies for working out discussion issues; project technology; Information Technologies; technologies of differentiated training; text-centric training technology and others.

Design of Deep Learning-based Tourism Recommendation System Based on Perceived Value and Behavior in Intelligent Cloud Environment (지능형 클라우드 환경에서 지각된 가치 및 행동의도를 적용한 딥러닝 기반의 관광추천시스템 설계)

  • Moon, Seok-Jae;Yoo, Kyoung-Mi
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.3
    • /
    • pp.473-483
    • /
    • 2020
  • This paper proposes a tourism recommendation system in intelligent cloud environment using information of tourist behavior applied with perceived value. This proposed system applied tourist information and empirical analysis information that reflected the perceptual value of tourists in their behavior to the tourism recommendation system using wide and deep learning technology. This proposal system was applied to the tourism recommendation system by collecting and analyzing various tourist information that can be collected and analyzing the values that tourists were usually aware of and the intentions of people's behavior. It provides empirical information by analyzing and mapping the association of tourism information, perceived value and behavior to tourism platforms in various fields that have been used. In addition, the tourism recommendation system using wide and deep learning technology, which can achieve both memorization and generalization in one model by learning linear model components and neural only components together, and the method of pipeline operation was presented. As a result of applying wide and deep learning model, the recommendation system presented in this paper showed that the app subscription rate on the visiting page of the tourism-related app store increased by 3.9% compared to the control group, and the other 1% group applied a model using only the same variables and only the deep side of the neural network structure, resulting in a 1% increase in subscription rate compared to the model using only the deep side. In addition, by measuring the area (AUC) below the receiver operating characteristic curve for the dataset, offline AUC was also derived that the wide-and-deep learning model was somewhat higher, but more influential in online traffic.