• Title/Summary/Keyword: Multi-level Security

Search Result 218, Processing Time 0.023 seconds

Technology Of Application Of Multifrequency Signals To Create An Electromagnetic Field

  • Strembitska, Oksana;Tymoshenko, Roman;Mozhaiev, Mykhailo;Buslov, Pavlo;Kashyna, Ganna;Baranenko, Roman V.;Makiievskyi, Oleksii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.40-43
    • /
    • 2021
  • In the article of instability on the peak power level, duration and repetition period of a multifrequency space-time signal, we calculated the maximum values of the errors of the parameters of the laws of spatial-phase-frequency control. Requirements for the accuracy of the location of the phase centers of the emitters in a cylindrical phased array antenna with pyramidal horns; it is advisable to calculate the radiation field using single-stage and multi-stage distribution laws. The phase centers of individual radiation sources of a cylindrical phased array antenna have been studied; they have almost no effect on the duration and period of recurrence.

Adaptive data hiding scheme based on magic matrix of flexible dimension

  • Wu, Hua;Horng, Ji-Hwei;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3348-3364
    • /
    • 2021
  • Magic matrix-based data hiding schemes are applied to transmit secret information through open communication channels safely. With the development of various magic matrices, some higher dimensional magic matrices are proposed for improving the security level. However, with the limitation of computing resource and the requirement of real time processing, these higher dimensional magic matrix-based methods are not advantageous. Hence, a kind of data hiding scheme based on a single or a group of multi-dimensional flexible magic matrices is proposed in this paper, whose magic matrix can be expanded to higher dimensional ones with less computing resource. Furthermore, an adaptive mechanism is proposed to reduce the embedding distortion. Adapting to the secret data, the magic matrix with least distortion is chosen to embed the data and a marker bit is exploited to record the choice. Experimental results confirm that the proposed scheme hides data with high security and a better visual quality.

The Use of Innovative Distance Learning Technologies in the Training of Biology Students

  • Biletska, Halyna;Mironova, Nataliia;Kazanishena, Natalia;Skrypnyk, Serhii;Mashtakova, Nataliia;Mordovtseva, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.115-120
    • /
    • 2022
  • The main purpose of the study is to identify the key aspects of the use of innovative distance learning technologies in the training of biology students. Currently, there is a modernization, the evolution of the education system from a classical university to a virtual one, from lecture material teaching to computer educational programs, from a book library to a computer one, from multi-volume paper encyclopedias to modern search databases. During studies in higher education, distance learning ensures the delivery of information in an interactive mode through the use of information and communication technologies. The main disadvantage of distance learning is the emotional interaction of the teacher with students. It is necessary to increase the level of methodological developments for independent studies of students. The methodology includes a number of theoretical methods. Based on the results of the study, the main elements of the use of innovative distance learning technologies in the training of biology students were identified.

Efficiency of Graph for the Remodularization of Multi-Level Software Architectures

  • Lala Madiha HAKIK
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.33-39
    • /
    • 2024
  • In a previous study we proceeded to the remodularization architecture based on classes and packages using the Formal Concept Analysis (FCA)[13] [14] [30]. we then got two possible remodularized architectures and we explored the issue of redistributing classes of a package to other packages, we used an approach based on Oriented Graph to determine the packages that receive the redistributed classes and we evaluated the quality of a remodularized software architecture by metrics [31] [28] [29]. In this paper, we will address the issue of the efficiency of the Oriented Graph in the remodularization of software architectures compared to the Formal Concept Analysis FCA method. The formal method of FCA concept is not popularized among scientists as opposed to the use of the labeled directed graph. It is for this reason that our directed graph approach is more effective in its simplicity and popularity.

The analysis on Japan's New Maritime Strategy and the Development of its Naval Forces - focusing on Japan's countermeasure to China's pursuing of maritime hegemony - (일본의 신(新) 해양전략과 해상전력 발전 동향 분석 - 중국의 해양패권 추구에 대한 대응을 중심으로 -)

  • Bae, Joon-Hyung
    • Strategy21
    • /
    • s.40
    • /
    • pp.5-36
    • /
    • 2016
  • Recently, the Japanese government revised the three guidelines of its security policy, the National Security Strategy(NSS), the National Defense Program Outline and Midterm Defense Buildup Plan, exceptionally at one time. This means Japan has been seeking the new strategy and strengthening military power considering changing regional security environment. Moreover, Japan revised the security laws for the right to collective self-defense, which authorized the use of force even when Japan is not under attack. Also, Japan renewed the Guidelines for Japan-U.S. Defense Cooperation in twenty years, and has expanded JSDF's scope of activity to a worldwide level. These changes imply Japan would constantly seek to build military forces focusing on naval forces. Because Japan's naval forces, the JMSDF is the means that allow Japan to use its force at anywhere overseas and expand its roles and missions in international society by the basis of the right to collective self-defense. This research will analyze Japan's new maritime strategy and trend of force development and eventually look for the implication on our maritime security These days, Japan has perceived Chinese rapid increase of naval power and pursuing of maritime hegemony as a grave threat. In response to this, Japan is designing new maritime strategy, which are "remote islands defense and recapture" and proactively develop a new type of naval forces to accomplish this new strategy. The Japan's "remote island defense and recapture strategy" is to harden its defensive posture in Nansei islands which correspond to China's 1st island chain for chinese A2/AD strategy and directly encounter with China and to protect its own dominium and maritime interest while supporting US national strategy in East Asia. Japan continues to build compact, multi-functional ship to accomplish "remote island defense and recapture strategy" and keep strengthening its maritime power projection capability to include build of new amphibious ship, and large, multi-functional ship which can provide effective C2. These changes imply that Japan is shifting its strategy from passive and defensive to proactive and aggressive way and continues to pursue naval buildup.The implication of Japan's new maritime strategy and naval buildup needs to be observed carefully and we need to keep developing naval power required to protect our maritime sovereignty and interest.

Advanced Mandatory Authentication Architecture Designed for Internet Bank (인터넷은행을 위한 개선된 본인확인 구조)

  • Hong, Ki-seok;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1503-1514
    • /
    • 2015
  • Non-face-to-face real name verification policy that financial authorities announced, in order to secure a face-to-face or more of accuracy, are in principle of multi check. The business model and legal entities of Internet banks is different from existing Internet banking. Relpacing real name verification from face-to-facd to non-face-to-face while maintaining the structure of identification can not only cause inconvenience to a first time member, but also can be more vulnerable to verious security risks. In this study, to evaluate a service level of a bank of the Internet, and provide an improved identification of the structure such that the registration and use of differentiated services is performed in accordance with the evaluation. In addition, the security that may occur with respect to Bank of the Internet to establish a vulnerability and attack model, the results of the analysis of the safety of the step-by-step security attributes and services of the authentication medium of each attack model, existing the safer than Internet banking, confirmed the usefulness in user registration guide.

Securitization and the Merger of Great Power Management and Global Governance: The Ebola Crisis

  • Cui, Shunji;Buzan, Barry
    • Analyses & Alternatives
    • /
    • v.3 no.1
    • /
    • pp.29-61
    • /
    • 2019
  • Within the discipline of International Relations (IR), the literatures on global governance (GG) and great power management (GPM) at best ignore each other, and at worst treat the other as a rival or enemy. On the one hand, the GPM literature, like both realism in all its forms, and neoliberalism, takes for granted the ongoing, disproportionate influence of the great powers in the management of the international system/society, and does not look much beyond that. On the other hand, the GG literature emphasizes the roles of smaller states, non-state actors and intergovernmental organizations (IGOs), and tends to see great powers more as part of the problem than as part of the solution. This paper argues that the rise to prominence of a non-traditional security agenda, and particularly of human security, has triggered a de facto merger of GPM and GG that the IR literature usually treated as separate and often opposed theories. We use the Ebola crisis of 2014-15 to show how an issue framed as human security brought about a multi-actor response that combined the key elements of GPM and GG. The security framing overrode many of the usual inhibitions between great powers and non-state actors in humanitarian crises, including even the involvement of great power military forces. Through examining broadly the way in which the Ebola crisis is tackled, we argue that in an age of growing human security challenges, GPM and GG are necessarily and fruitfully merging. The role of great powers in this new human security environment is moving away from the simple means and ends of traditional GPM. Now, great powers require the ability to cooperate and coordinate with multiple-level actors to make the GG/GPM nexus more effective and sustainable. In doing so they can both provide crucial resources quickly, and earn respect and status as responsible great powers. IGOs provide legitimation and coordination to the GPM/GG package, and non-state actors (NSAs) provide information, specialist knowledge and personnel, and links into public engagement. In this way, the unique features of the Ebola crisis provide a model for how the merger of GPM and GG might be taken forward on other shared-fate threats facing global international society.

  • PDF

Protecting Privacy of User Data in Intelligent Transportation Systems

  • Yazed Alsaawy;Ahmad Alkhodre;Adnan Abi Sen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.163-171
    • /
    • 2023
  • The intelligent transportation system has made a huge leap in the level of human services, which has had a positive impact on the quality of life of users. On the other hand, these services are becoming a new source of risk due to the use of data collected from vehicles, on which intelligent systems rely to create automatic contextual adaptation. Most of the popular privacy protection methods, such as Dummy and obfuscation, cannot be used with many services because of their impact on the accuracy of the service provided itself, they depend on changing the number of vehicles or their physical locations. This research presents a new approach based on the shuffling Nicknames of vehicles. It fully maintains the quality of the service and prevents tracking users permanently, penetrating their privacy, revealing their whereabouts, or discovering additional details about the nature of their behavior and movements. Our approach is based on creating a central Nicknames Pool in the cloud as well as distributed subpools in fog nodes to avoid intelligent delays and overloading of the central architecture. Finally, we will prove by simulation and discussion by examples the superiority of the proposed approach and its ability to adapt to new services and provide an effective level of protection. In the comparison, we will rely on the wellknown privacy criteria: Entropy, Ubiquity, and Performance.

The Novel Configuration of Integrated Network for Building Energy System (빌딩 에너지시스템 통합네트워크 구축에 관한 연구)

  • Hong, Won-Pyo
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2008.10a
    • /
    • pp.229-234
    • /
    • 2008
  • The new millennium has started with several innovations driven by fast evolution of the technologies in energy sector. A strong impulse towards the diffusion of new economical efficient technologies regulatory incentives related to energy production from renewable source and a small scale building trigeneration and to promotion of more sustainable environmental-friendly generation solutions, the evolution of electricity markets, more and more binding local emission constraints, and the need for improving the security of supply to reduce the energy system vulnerability. The 24 percentage energy quantify of total energy consumption consumes in commercial buildings and residential houses and the 30% portion of total $CO_2$ emissions covers also in the commercial buildings and residential houses sector. To cope with efficiently this energy sinuation in building sector, Building microgrid or building tooling, heating & power(BCHP) system has been interested in recent day due to meeting thermal and electric energy requirements efficiently and with appropriate energy quality. A multi agent system is a collective of intelligent agents that communicate with each other and work cooperatively to achieve common goals. Also, it is to medicate and coordinate communication between Control Areas and Security Coordinators for teal-time control of the BCHP system and the power pid. In this new circumstance, it is very important to integrate the power and energy delivery system and the information system(communication, networks, and intelligent equipment) that controls it. Therefore, development of smart control modules with open communication protocol and seamlessly interchange the data and information between control network and data network including extranet and intranet give a great meanings. We designed and developed the TCP/IP-CAN IED agent modules and ModBus./LonTalk/(TCP/IP) IED agent ones to configure the multi-agent system based smart energy network of commercial buildings and also intelligent algorithms for inverter fault diagnostics which ran be operated in control level or agent level network.

  • PDF

Negative Selection Algorithm based Multi-Level Anomaly Intrusion Detection for False-Positive Reduction (과탐지 감소를 위한 NSA 기반의 다중 레벨 이상 침입 탐지)

  • Kim, Mi-Sun;Park, Kyung-Woo;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.111-121
    • /
    • 2006
  • As Internet lastly grows, network attack techniques are transformed and new attack types are appearing. The existing network-based intrusion detection systems detect well known attack, but the false-positive or false-negative against unknown attack is appearing high. In addition, The existing network-based intrusion detection systems is difficult to real time detection against a large network pack data in the network and to response and recognition against new attack type. Therefore, it requires method to heighten the detection rate about a various large dataset and to reduce the false-positive. In this paper, we propose method to reduce the false-positive using multi-level detection algorithm, that is combine the multidimensional Apriori algorithm and the modified Negative Selection algorithm. And we apply this algorithm in intrusion detection and, to be sure, it has a good performance.