• Title/Summary/Keyword: IBN

Search Result 242, Processing Time 0.022 seconds

Secure Cluster Selection in Autonomous Vehicular Networks

  • Mohammed, Alkhathami
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.11-16
    • /
    • 2023
  • Vehicular networks are part of the next generation wireless and smart Intelligent Transportation Systems (ITS). In the future, autonomous vehicles will be an integral part of ITS and will provide safe and reliable traveling features to the users. The reliability and security of data transmission in vehicular networks has been a challenging task. To manage data transmission in vehicular networks, road networks are divided into clusters and a cluster head is selected to handle the data. The selection of cluster heads is a challenge as vehicles are mobile and their connectivity is dynamically changing. In this paper, a novel secure cluster head selection algorithm is proposed for secure and reliable data sharing. The idea is to use the secrecy rate of each vehicle in the cluster and adaptively select the most secure vehicle as the cluster head. Simulation results show that the proposed scheme improves the reliability and security of the transmission significantly.

Indirect Edification through Trans-Eurasian Travelogues: Focus on the Episodes of Carpets in the Journeys of Different Religions

  • Jin Han JEONG
    • Acta Via Serica
    • /
    • v.8 no.1
    • /
    • pp.55-70
    • /
    • 2023
  • Carpets are a useful tool for highlighting the cultural uniqueness of a region because their characteristic usage often reveals distinctive natural features of the place or the unique cultural identity of a group. Investigating anecdotes and associated patterns found in three medieval trans-Eurasian travelogues, this paper focuses on observations made by the Chinese Buddhist monk, Faxian, the Sunni pilgrim and scholar, Ibn Battuta, and Marco Polo, the Venetian merchant examining their thoughts, observations, and perspectives on carpet-related customs in their experienced contexts. In particular, this manuscript touches on the controversies, impacts, and narratives associated with carpet practices observed in each travel writer's context respectively, concluding that each traveler shows several things in common rather than showing different patterns depending on the characteristics of their religion. Overall, they observed the uses of carpets according to their jobs and travel purposes and appropriately detailed related episodes if the intended purpose and context matched the uses.

NEIGHBORHOOD PROPERTIES FOR CERTAIN p-VALENT ANALYTIC FUNCTIONS ASSOCIATED WITH q - p-VALENT BERNARDI INTEGRAL OPERATOR OF COMPLEX ORDER

  • ALDAWISH, I.;AOUF, M.K.;SEOUDY, T.M.;FRASIN, B.A.
    • Journal of applied mathematics & informatics
    • /
    • v.40 no.3_4
    • /
    • pp.753-764
    • /
    • 2022
  • In this paper, we introduce and investigate two new subclasses of p-valent analytic functions of complex order defined by using q-p-valent Bernardi integral operator. Also we obtain coefficient estimates and consequent inclusion relationships involving the (q, m, 𝛿)-neighborhoods of these subclasses.

A Bibliometric Analysis Data Visualization in Human Resource Management

  • Bandar Abdullah AlMobark
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.162-168
    • /
    • 2023
  • As the old saying goes "a picture is worth a thousand words" data visualization is essential in almost every industry. Companies make Data-driven decisions and gain insights from visual data. However, there is a need to investigate the role of data visualization in human resource management. This review aims to highlight the power of data visualization in the field of human resources. In addition, visualize the latest trends in the research area of human resource and data visualization by conducting a bibliometric analysis. The study adopted a literature review on recent publications from 2017 to 2022 to address research questions.

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Waleed Alghaith
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.50-62
    • /
    • 2024
  • The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities' students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The study's findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Waleed Alghaith
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.105-118
    • /
    • 2024
  • The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The studys findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

A Study on tile Presumption of Chang Pogo's Maritime Routes (해상왕 장보고의 해상항로 추정에 관한 연구)

  • 김형근
    • Journal of the Korean Institute of Navigation
    • /
    • v.25 no.1
    • /
    • pp.77-91
    • /
    • 2001
  • According to the many ancient literatures, it is said to be that Merchant Prince, Chang Pogo in unification Silla had traded with not only China, Japan but also Arab-Islam Countries, but unfortunately there is no definite records about this. Therefore in this study the writer would like to presume the sea routes of Merchant Prince, Chang Pogo in a unification Silla. For the purpose of this study the writer would like to study the reference books and materials regarding to the sea routes of prehistoric age and ancient three countries of Kingdoms and unification Silla. Especially the writer consider “The Work of Routes and Kingdoms” of Ibn Khurdarhbih regarding to the ancient sea routes of Korea, China, Arab-Islam Countries, and also the writer consider the ancient sea routes of Tang Dynasty in China and Ryukyu Kingdom in Japan. About this methodology of this study, the writer believe that the sea routes of today is the results of ancient sea routes, and this ancient sea routes could not be changed forever except special circumstance. According in this study the writer would like to persume the sea routes of Merchant Prince, Chang Pogo using like this methodologies. This presumption of the writer is originated on the basis of The Work of Routes and Kingdoms written by ancient Arabian Geographer, Ibn Khurdadhbih in the early years of 9th century. The Work of Routes and Kingdoms is geography, and the principal contents of this geography are the activities of Arab-Islam merchants and Chinese Merchants between Arab-Islam countries and China from 9th century to 11th century by ancient sea routes. But surprisingly in this geography, Silla was marked, and another ancient Arabian geogrpher, Al-Biruni marked Silla on his map, Qanun Al-mas'udi in the 9th century, and also another ancient Arabian geographer, Al-Idrisi marked Silla on his map in the 11th century. Especially Al-Biruni expressed the longitude and latitude of Silla on his map, he expressed Silla as following. “at the extreme end of China toward the East and few people travelled to it by sea”. Therefore the writer would like to presume that Arab-Islam merchants had traded with unification Silla in the 9th century, and also Merchant Prince, Chang Pogo had traded with not only China, Japan but also Arab-Islam Countries using above ancient sea routes in the 9th century.

  • PDF

A New Measure of Asset Pricing: Friction-Adjusted Three-Factor Model

  • NURHAYATI, Immas;ENDRI, Endri
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.605-613
    • /
    • 2020
  • In unfrictionless markets, one measure of asset pricing is its height of friction. This study develops a three-factor model by loosening the assumptions about stocks without friction, without risk, and perfectly liquid. Friction is used as an indicator of transaction costs to be included in the model as a variable that will reduce individual profits. This approach is used to estimate return, beta and other variable for firms listed on the Indonesian Stock Exchange (IDX). To test the efficacy of friction-adjusted three-factor model, we use intraday data from July 2016 to October 2018. The sample includes all listed firms; intraday data chosen purposively from regular market are sorted by capitalization, which represents each tick size from the biggest to smallest. We run 3,065,835 intraday data of asking price, bid price, and trading price to get proportional quoted half-spread and proportional effective half-spread. We find evidence of adjusted friction on the three-factor model. High/low trading friction will cause a significant/insignificant return difference before and after adjustment. The difference in average beta that reflects market risk is able to explain the existence of trading friction, while the difference between SMB and HML in all observation periods cannot explain returns and the existence of trading friction.

A Hybrid K-anonymity Data Relocation Technique for Privacy Preserved Data Mining in Cloud Computing

  • S.Aldeen, Yousra Abdul Alsahib;Salleh, Mazleena
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.51-58
    • /
    • 2016
  • The unprecedented power of cloud computing (CC) that enables free sharing of confidential data records for further analysis and mining has prompted various security threats. Thus, supreme cyberspace security and mitigation against adversaries attack during data mining became inevitable. So, privacy preserving data mining is emerged as a precise and efficient solution, where various algorithms are developed to anonymize the data to be mined. Despite the wide use of generalized K-anonymizing approach its protection and truthfulness potency remains limited to tiny output space with unacceptable utility loss. By combining L-diversity and (${\alpha}$,k)-anonymity, we proposed a hybrid K-anonymity data relocation algorithm to surmount such limitation. The data relocation being a tradeoff between trustfulness and utility acted as a control input parameter. The performance of each K-anonymity's iteration is measured for data relocation. Data rows are changed into small groups of indistinguishable tuples to create anonymizations of finer granularity with assured privacy standard. Experimental results demonstrated considerable utility enhancement for relatively small number of group relocations.

Computer based estimation of backbone curves for hysteretic Response of reinforced concrete columns under static cyclic lateral loads

  • Rizwan, M.;Chaudhary, M.T.A.;Ilyas, M.;Hussain, Raja Rizwan;Stacey, T.R.
    • Computers and Concrete
    • /
    • v.14 no.2
    • /
    • pp.193-209
    • /
    • 2014
  • Cyclic test of the columns is of practical relevance to the performance of compression members during an earthquake loading. The strength, ductility and energy absorption capabilities of reinforced concrete (RC) columns subjected to cyclic loading have been estimated by many researchers. These characteristics are not normally inherent in plain concrete but can be achieved by effectively confining columns through transverse reinforcement. An extensive experimental program, in which performance of four RC columns detailed according to provisions of ACI-318-08 was studied in contrast with that of four columns confined by a new proposed technique. This paper presents performance of columns reinforced by standard detailing and cast with 25 and 32 MPa concrete. The experimentally achieved load-displacement hysteresis and backbone curves of two columns are presented. The two approaches which work in conjunction with Response 2000 have been suggested to draw analytical back bone curves of RC columns. The experimental and analytical backbone curves are found in good agreement. This investigation gives a detail insight of the response of RC columns subjected to cyclic loads during their service life. The suggested analytical procedures will be available to the engineers involved in design to appraise the capacity of RC columns.