• Title/Summary/Keyword: Cyber-world

Search Result 376, Processing Time 0.022 seconds

Study On Masked Face Detection And Recognition using transfer learning

  • Kwak, NaeJoung;Kim, DongJu
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.294-301
    • /
    • 2022
  • COVID-19 is a crisis with numerous casualties. The World Health Organization (WHO) has declared the use of masks as an essential safety measure during the COVID-19 pandemic. Therefore, whether or not to wear a mask is an important issue when entering and exiting public places and institutions. However, this makes face recognition a very difficult task because certain parts of the face are hidden. As a result, face identification and identity verification in the access system became difficult. In this paper, we propose a system that can detect masked face using transfer learning of Yolov5s and recognize the user using transfer learning of Facenet. Transfer learning preforms by changing the learning rate, epoch, and batch size, their results are evaluated, and the best model is selected as representative model. It has been confirmed that the proposed model is good at detecting masked face and masked face recognition.

State Management of the Development of National Cybersecurity Systems

  • Kryshtanovych, Myroslav;Storozhev, Roman;Malyshev, Kostiantyn;Munko, Anna;Khokhba, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.11-16
    • /
    • 2022
  • The main purpose of the study is to determine the main elements of the state management of the development of national cybersecurity. Cybersecurity ensures the protection of the properties of information resources and the operability of technical and software users and is directed against relevant cyber incidents. Therefore, today it is impossible to ignore the importance of public administration of the processes taking place in it. The methodological support of our study is determined by its goals and objectives and is based on the use of a combination of general scientific and special methods of scientific knowledge, which ensured the completeness and reliability of the results obtained. The article has limitations and concerns the lack of practical implementation of the research results. The study is purely theoretical to reflect the main aspects of the modern system of state management of the development of national cybersecurity. Further research requires an analysis of the world experience of state management of the development of national cybersecurity.

Securing SCADA Systems: A Comprehensive Machine Learning Approach for Detecting Reconnaissance Attacks

  • Ezaz Aldahasi;Talal Alkharobi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.1-12
    • /
    • 2023
  • Ensuring the security of Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) is paramount to safeguarding the reliability and safety of critical infrastructure. This paper addresses the significant threat posed by reconnaissance attacks on SCADA/ICS networks and presents an innovative methodology for enhancing their protection. The proposed approach strategically employs imbalance dataset handling techniques, ensemble methods, and feature engineering to enhance the resilience of SCADA/ICS systems. Experimentation and analysis demonstrate the compelling efficacy of our strategy, as evidenced by excellent model performance characterized by good precision, recall, and a commendably low false negative (FN). The practical utility of our approach is underscored through the evaluation of real-world SCADA/ICS datasets, showcasing superior performance compared to existing methods in a comparative analysis. Moreover, the integration of feature augmentation is revealed to significantly enhance detection capabilities. This research contributes to advancing the security posture of SCADA/ICS environments, addressing a critical imperative in the face of evolving cyber threats.

Fish Schooling Behavior Modeler (Fish 군중행동 모델러)

  • Kim, Jong-Chan;Ban, Kyeong-Jin;Kim, Eung-Kon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.517-520
    • /
    • 2006
  • Crowd behavioral scenes in virtual underwater world are presented in many entertainments such as films and games. According to the increase of digital films and animations caused by the development of computer graphics, it is easy for us to meet with the cyber characters in those scenes. Characters which appear in computer animation put life into virtual world. The more characters we have in this virtual space, the deeper we are immersed in the space. There were many researches which processed the crowd scene and implemented the crowd behavior system in Korea. They were related to developing VR contents which were available to feel actually in the construction of the virtual environment. But they are far from reaching the step to put to practical use in developing the crowd behavior modeler. Therefore, we suggestion the fish schooling behavior modeler that provides interaction and action behavior in 3D object to present vividly and effectively in underwater world.

  • PDF

A Study on the Cyber Museum Organization System for Intangible Cultural Properties II Focused on the Information system and classification code anger - Focusing on the Exhibition Space, Exhibition Method and Expression Specialty - (무형문화재를 위한 사이버뮤지엄 구성체계에 관한 연구 II - 전시방법 및 표현특성을 중심으로 -)

  • 한영호;장중식;정용섭
    • Korean Institute of Interior Design Journal
    • /
    • no.40
    • /
    • pp.165-171
    • /
    • 2003
  • The findings of this study indicate that intangible cultural properties are worth preservation and transmission and should be considered as very important as tangible cultural properties. If the studies of intangible cultural properties are continued focusing on their characteristics and formational system, they can be expressed more properly by adding new interactive elements to database and expressive requisites. New techniques introduced in this study are believed to provide people with most reasonable and developmental motives for expression of the existing intangible cultural properties. Concerning Korea's cultural properties centered on intangible cultural properties, information construction should be made with a new idea of information based on database from the previous studies. The result will be able to set an important factor to give wide publicity to our cultural identity, which is currently shown in the process of background communication, and serve as a foothold to deliver exact information to our descendants. The intangible cultural properties are our people's mental cultural heritage resources. If museums or initiator groups, which are organized to spread cultural heritages, can use them as the subjects of exhibition through information construction and visualization, it will function to maximize the educational effect of transmitting our national mental world. The development of digital environment will provide the optimum conditions and tools making it possible to visualize intangible forms and ideas in a virtual cyber space. Given these viewpoints, steady studies and efforts for the improvement of Korea's cultural image should be made in the way of intangible cultural properties as well as tangible ones. They start from the country's accurate appreciation of cultural properties and are embodied in systematic adjustment and relationship between interdependent elements.

A Study on the Cyber Museum Organization System for Intangible Cultural Properties III - Focused on the Chungnam Province - (무형문화재를 위한 사이버뮤지엄 구성체계에 관한 연구 III - 충남지역을 중심으로 -)

  • 한영호;장중식;정용섭
    • Korean Institute of Interior Design Journal
    • /
    • v.13 no.3
    • /
    • pp.179-186
    • /
    • 2004
  • The findings of this study indicate that intangible cultural properties are worth preservation and transmission and should be considered as very important as tangible cultural properties. If the studies of intangible cultural properties are continued focusing on their characteristics and formational system, they can be expressed more properly by adding new interactive elements to database and expressive requisites. New techniques introduced in this study are believed to provide people with most reasonable and developmental motives for expression of the existing intangible cultural properties. Concerning Korea's cultural properties centered on intangible cultural properties, information construction should be made with a new idea of information based on database from the previous studies. The result will be able to set an important factor to give wide publicity to our cultural identity, which is currently shown in the process of background communication, and serve as a foothold to deliver exact information to our descendants. The intangible cultural properties are our people's mental cultural heritage resources. If museums or initiator groups, which are organized to spread cultural heritages, can use them as the subjects of exhibition through information construction and visualization, it will function to maximize the educational effect of transmitting our national mental world. The development of digital environment will provide the optimum conditions and tools making it possible to visualize intangible forms and ideas in a virtual cyber space. Given these viewpoints, steady studies and efforts for the improvement of Korea's cultural image should be made in the way of intangible cultural properties as well as tangible ones. They start from the country's accurate appreciation of cultural properties and are embodied in systematic adjustment and relationship between interdependent elements.

The Analysis of Internet Literacy Effect through Education of Producing and Using Multimedia UCC (동영상 UCC 제작 및 활용 교육을 통한 인터넷 리터러시 효과 분석)

  • Ju, Yong-Wan;Hwang, Yong-Suok;Kim, Yang-Eun;Cho, Yeong-Ki
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.4
    • /
    • pp.27-39
    • /
    • 2010
  • Internet is taking up as a new culture on the cyber-space beyond a simple hobby as its utilization ratio is rapidly being spread throughout the world. However most education for internet media has been focused on cyber ethics education and internet addiction. Therefore it arises to need to educate internet literacy for positive and desirable usage of internet media raises. Previous research on media eduction doesn't have been analyzed the outcome of media education. In this study, we show the result of internet media education which performed for fostering internet literacy. For the analysis of education result we observed emotional attitude about internet, internet media recognition, efficacy of using internet, and consciousness of internet ethics for middle school student. As a result, there are many changes for emotional attitude about internet, ability of using internet media, and consciousness of internet ethics.

  • PDF

Development of Quality Assurance Model and Guiding Principles for Effective Cyber Education (가상원격교육체제의 질 관리를 위한 평가모형의 개발)

  • Ahn, Mi-Lee;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.1
    • /
    • pp.1-10
    • /
    • 2001
  • Internet accelerates the speed of Information society causing changes the method and purpose of education. The word "life-long learning" is no longer a new tenn for many of the world citizens, and they ask for a system to fulfill their need to learn. Information communication technology enables and provides technical base for such needs. Web based cyber education, especially, is known to be an important and alternative instructional method to mediate learning at a distance. At the present, however, with the breakneck pace of growth and interests on Web-based distance education, there are no guidelines provided to assure the quality. In this study, we have identified guiding principles to design and develop quality assurance model for effective distance education. This is critical, especially in Korea, since 9 distance. education institutions have been accredited to offer degree programs starting 2001 spring semester. Using this model, distance education providers and consumers can develop or select effective on-line courses.

  • PDF

Role and Function of the Information Public Law

  • Kim, Il Hwan;Lee, KyungLyul;Kim, Jaehyoun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.596-610
    • /
    • 2017
  • As a 'network of networks,' the Internet globally connects a huge number of regional and individual networks and provides us with new hopes and possibilities. However, a nation-state as well as the legal order of the 'state'(constitution) has limitations that are all too clear in order to regulate this new world formed by the Internet. It will soon be impossible for a single state to control these global information networks, and they will not be consistently and vertically operated and managed by anyone. As a result, ideologies or jurisdictions that support the legal order of a nation-state are no longer sufficient to control information delivery beyond borders. Furthermore, the development of the Internet and emergence of cyber space in the information society has led to the idea of 'extinction' of nation-states. Nevertheless, the conclusion that the state will be extinct due to the development of the information society is still nothing more than a hasty assumption. In other words, the information society does not indicate the end of the state. Rather, we must now clearly perceive that the object of our research and discussions must be the role and function of the nation-state in the newly emerged information society in the global aspect and international aspect, as well as in relationships with individuals or organizations that now have unimaginably strong information power. It is clear at this point that nation-states will lose the function and authority they have enjoyed or exercised to a certain degree, but this certainly does not indicate that nation-states are, and will be, unnecessary or useless. Rather, it is necessary to focus on the list of tasks that must be accepted by nation-states in the changed information society, as well as responsibilities and means to perform those tasks.

A Study on Security Measure of Step-Wise Project (단계별 프로젝트 보안 방안에 대한 연구)

  • Shin, Seong-Yoon;Jang, Dai-Hyun;Kim, Hyeong-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2459-2464
    • /
    • 2012
  • Many companies has led to the damage case being leaked to personal information by taking cyber attack. Also, planned hacking cases continues to increase for the purpose of acquiring monetary gain or causing social disruption induction, etc. Approximately 75% of the Web site attacks exploit the vulnerability of the application. Major security issue is to strengthen the S/W development security according to the legal basis. The members of the project team is the fact that the lack of recognition of application development security. In addition, passive response and security validation/testing, etc. throughout the SDLC to the entire area is insufficient. Therefore, rework due to the belated discovery of a defect has occurs. In this paper, we examine the case of the project step-by-step security activities by performing IT services companies. And, through this, we present security measures that can be applied to the step-wise real-world projects.