• Title/Summary/Keyword: KSA

Search Result 143, Processing Time 0.033 seconds

SPCBC: A Secure Parallel Cipher Block Chaining Mode of Operation based on logistic Chaotic Map

  • El-Semary, Aly M.;Azim, Mohamed Mostafa A.;Diab, Hossam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3608-3628
    • /
    • 2017
  • Several block cipher modes of operation have been proposed in the literature to protect sensitive information. However, different security analysis models have been presented for attacking them. The analysis indicated that most of the current modes of operation are vulnerable to several attacks such as known plaintext and chosen plaintext/cipher-text attacks. Therefore, this paper proposes a secure block cipher mode of operation to thwart such attacks. In general, the proposed mode combines one-time chain keys with each plaintext before its encryption. The challenge of the proposed mode is the generation of the chain keys. The proposed mode employs the logistic map together with a nonce to dynamically generate a unique set of chain keys for every plaintext. Utilizing the logistic map assures the dynamic behavior while employing the nonce guarantees the uniqueness of the chain keys even if the same message is encrypted again. In this way, the proposed mode called SPCBC can resist the most powerful attacks including the known plaintext and chosen plaintext/cipher-text attacks. In addition, the SPCBC mode improves encryption time performance through supporting parallelized implementation. Finally, the security analysis and experimental results demonstrate that the proposed mode is robust compared to the current modes of operation.

Improvement of Information & Communication Engineering National Competency Standards (NCS) (정보통신 소프트웨어분야 국가직무능력(NCS) 개선 방안)

  • Kwon, Oh-young;Im, Tami;Myeong, Jae-hui
    • Journal of Practical Engineering Education
    • /
    • v.9 no.1
    • /
    • pp.77-83
    • /
    • 2017
  • The purpose of this paper is to compare SWECOM and Information & Communication Engineering NCS to explore how to improve current NCS. First, it would be helpful to use NCS competency unit and competency unit element as categorization criteria and then to provide levels and roles into performance criteria and KSA. Second, developing common lower level competency unit would decrease the redundancy of KSA and make it clear for users. Third, providing other kinds of skills along with technical skills such as management skill would be useful for users.

A new hybrid HSDT for bending, free vibration, and buckling analysis of FGM plates (2D & quasi-3D)

  • Belkhodja, Y.;Ouinas, D.;Fekirini, H.;Olay, J.A. Vina;Achour, B.;Touahmia, M.;Boukendakdji, M.
    • Smart Structures and Systems
    • /
    • v.29 no.3
    • /
    • pp.395-420
    • /
    • 2022
  • A new hybrid quasi-3D and 2D high-order shear deformation theory is studied in this mathematical formulation, for an investigation of the bending, free vibrations and buckling influences on a functionally graded material plate. The theoretical formulation has been begun by a displacement field of five unknowns, governing the transverse displacement across the thickness of the plate by bending, shearing and stretching. The transverse shear deformation effect has been taken into consideration, satisfying the stress-free boundary conditions, especially on plate free surfaces as parabolic variation through its thickness. Thus, the mechanical properties of the functionally graded plate vary across the plate thickness, following three distributions forms: the power law, exponential form and the Mori-Tanaka scheme. The mechanical properties are used to develop the equations of motion, obtained from the Hamilton principle, and solved by applying the Navier-type solution for simply supported boundary conditions. The results obtained are compared with other solutions of 2D, 3D and quasi-3D plate theories have been found in the literature.

What IF Analysis Impacting CRM in Medical Sector

  • Arshi Naim;Kholood Alqahtani;Mohammad Faiz Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.101-108
    • /
    • 2023
  • Decision Support Systems (DSS) is an Information Systems (IS) application that aids in decision-making processes for many business concepts and Customer Relationship Management (CRM) is one of them and it depends on the firm's tasks for developing and retaining customers while achieving their satisfaction and enhancing the sense of belongingness for their products and services. Profit maximization, the process of customer value, and building strategic values for the firm are the three empirical benefits of CRM that are achieved through analytical, operational, and direction (AOD) capabilities respectively. This research focuses on the application of DSS models of what-if analysis (WIA) for CRM at (AOD) and also shows the dependence on the Information Success model (ISM). Hypothetical data are analyzed for (AOD) by three types of (WIA) to attain CRM and profit maximization and this analytical method can be used by any customer-oriented firm as a general model and for the purpose of the study we have compared the CRM between patients and hospital management.

Security Awareness among Students in Campus Environment: Case Study

  • Najihah Osman;Haniza N;Zulkiflee M.
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.188-198
    • /
    • 2023
  • In this era of globalization without limitation, many security issues occur, especially in a public network. Internet users significantly increased every single day. However, only some users are aware of security issues when they use Internet services. For the campus network environment, both staffs and students are susceptible to security threats such as data theft, unauthorized access and more due to different levels of awareness towards security threats. This paper is to study the level of awareness among students on security issues based on KSA model. As a case study, the survey was distributed among students in the UTeM campus network. A quantitative study was conducted, and a structured questionnaire has been designed and distributed among students. The variables were focused on three (3) aspects, which are Knowledge, Skill and Ability (KSA). The finding shows the relationship between KSA with the level of awareness among students has been revealed. From the result, Knowledge is the most significant aspect that contributes to high awareness. For the future, a study about increasing students' knowledge about security issues should be addressed.