• Title/Summary/Keyword: Network Security Level

Search Result 721, Processing Time 0.032 seconds

A Study of TCP LINK based Real-Time Secure Communication Research in the Ocean (해상에서 실시간 TCP 링크관절 보안통신 연구)

  • Yoo, Jaewon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.250-253
    • /
    • 2014
  • Due to limited resource, marine communication is severely limited when compared to communications in land. Radio relay facilities, etc. based on a wired network through a long distance communication is possible. In addition, the aircraft is in the air, the ground-based network service based on long-range straight-line distance and elevation (LOS: Line of Sight) communications. On the other hand, the distance in a straight line to the sea, the sea level because communication is limited or through satellite, underwater communications relay equipment installed in the communication scheme has been investigated.. In this paper, using TCP-based real-time joint maritime security communication links were studied. Harsh marine environment, real-time communication that can provide secure communications and propose a LINK joint. In this study, more secure, and convenient communications at sea, a plan was presented to you.

  • PDF

IoT botnet attack detection using deep autoencoder and artificial neural networks

  • Deris Stiawan;Susanto ;Abdi Bimantara;Mohd Yazid Idris;Rahmat Budiarto
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1310-1338
    • /
    • 2023
  • As Internet of Things (IoT) applications and devices rapidly grow, cyber-attacks on IoT networks/systems also have an increasing trend, thus increasing the threat to security and privacy. Botnet is one of the threats that dominate the attacks as it can easily compromise devices attached to an IoT networks/systems. The compromised devices will behave like the normal ones, thus it is difficult to recognize them. Several intelligent approaches have been introduced to improve the detection accuracy of this type of cyber-attack, including deep learning and machine learning techniques. Moreover, dimensionality reduction methods are implemented during the preprocessing stage. This research work proposes deep Autoencoder dimensionality reduction method combined with Artificial Neural Network (ANN) classifier as botnet detection system for IoT networks/systems. Experiments were carried out using 3- layer, 4-layer and 5-layer pre-processing data from the MedBIoT dataset. Experimental results show that using a 5-layer Autoencoder has better results, with details of accuracy value of 99.72%, Precision of 99.82%, Sensitivity of 99.82%, Specificity of 99.31%, and F1-score value of 99.82%. On the other hand, the 5-layer Autoencoder model succeeded in reducing the dataset size from 152 MB to 12.6 MB (equivalent to a reduction of 91.2%). Besides that, experiments on the N_BaIoT dataset also have a very high level of accuracy, up to 99.99%.

A Study on the Applicability of IoT for Container Terminal (컨테이너 터미널의 사물인터넷(IoT) 적용가능성에 관한 연구)

  • Jeon, Sang-Hyeon;Kang, Dal-Won;Min, Se-Hong;Kim, Si-Hyun
    • Journal of Korea Port Economic Association
    • /
    • v.36 no.2
    • /
    • pp.1-18
    • /
    • 2020
  • The Internet of things (IoT) has been applied to a variety of industrial uses such as public service sectors, medical industries, automotive industries, and so on. Led by smart cities, this is typical. However, from a logistics perspective, the level of application is insufficient. This study examines the applicability of IoT-related technology in a container terminal, an object of the present invention, to derive an applicable plan. Analytic network process (ANP) analysis reveals the following results for IoT applications in container terminals: operating systems (26.7%), safety/environmental/security systems (26.4%), equipment maintenance systems (25.3%), and facility maintenance systems (21.6 %). The second ANP analysis reveals the following results: Economy (40.2%), productivity (21.1%), service level (19.5%), and utilizing technology level (19.2%). The application or standard of evaluation is important when applying IoT technology to container terminals; however, it is not concentrated in a certain area. It is desirable to build each container system with linkage and efficiency from a macroscopic view.

Optimization of Agri-Food Supply Chain in a Sustainable Way Using Simulation Modeling

  • Vostriakova, Viktorija;Kononova, Oleksandra;Kravchenko, Sergey;Ruzhytskyi, Andriy;Sereda, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.245-256
    • /
    • 2021
  • Poor logistical infrastructure and agri-food supply chain management leads to significant food waste in logistic system. The concept of the sustainable value added agri-food chains requires defined approach to the analysis of the existing situation, possible improving strategies and also assessment of these changes impact on further development. The purpose of research is to provide scientific substantiation of theoretical and methodological principles and develop practical recommendations for the improvement of the agri-food logistics distribution system. A case study methodology is used in this article. The research framework is based on 4 steps: Value Stream Mapping (VSM), Gap and Process Analysis, Validation and Improvement Areas Definition and Imitation Modelling. This paper presents the appropriateness of LEAN logistics tools using, in particular, Value Stream Mapping (VSM) for minimizing logistic losses and Simulation Modeling of possible logistics distribution system improvement results. The algorithm of VSM analysis of the agri-food supply chain, which involves its optimization by implementing the principles of sustainable development at each stage, is proposed. The methodical approach to the analysis of possible ways for optimizing the operation of the logistics system of the agri-food distribution is developed. It involves the application of Value Stream Mapping, i.e. designing of stream maps of the creation of the added value in the agri-food supply chain for the current and future state based on the minimization of logistic losses. Simulation modeling of the investment project on time optimization in the agri-food supply chain and economic effect of proposed improvements in logistics product distribution system functioning at the level of the investigated agricultural enterprise has been determined. Improvement of logistics planning and coordination of operations in the supply chain and the innovative pre-cooling system proposed to be introduced have a 3-year payback period and almost 75-80% probability. Based on the conducted VSM analysis of losses in the agri-food supply chain, there have been determined the main points, where it is advisable to conduct optimization changes for the achievement of positive results and the significant economic effect from the proposed measures has been confirmed. In further studies, it is recommended to focus on identifying the synergistic effect of the agri-food supply chain optimization on the basis of sustainable development.

Use of Multimedia Technologies in the Training of Physical Culture and Sports Specialists

  • Shevchenko, Olha;Bahinska, Olha;Markova, Olena;Broiakovskyi, Oleksandr;Bielkova, Tetyana;Honcharenko, Ivan;Bida, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.245-251
    • /
    • 2022
  • Educational reform in Ukraine encourages the use of multimedia technologies in the training of specialists in Physical Education and Sports, which is one of the promising directions of education development. Therefore, the article specifies the content of the terms "innovation" and "technology". For modern society, the introduction of multimedia technologies in education is not so much theoretical as pragmatic, since under condition of globalization it concerns its historical development and prospects associated with the so-called "high technologies".Our goal is to improve the training of Physical Education and Sports specialists by means of multimedia technologies. All of innovative technologies can be divided into four groups, depending on the appropriate form of educational activity for their use. The development of multimedia technologies in the training of specialists in Physical Education and Sport at the present stage of education development should be carried out in accordance with the criteria of manufacturability, which are presented in the article: scientism, to rely on the theoretical provisions of pedagogical science and methods of teaching the discipline, socially recognized educational goals, prospects for modernization of Education; consistency, which provides for the interaction of parts and the whole in the organization of the study environment, as a result of which the physical development of the young generation is an integral entity; guarantee, that is, the error between the planned and obtained results should be minimal; manageability, that is, full management of the stages of work of the teacher and students, which make up the completed cycle of actions; mass participation, for the purpose of applying the technology does not depend on the physical training of students, the pedagogical skill of the teacher and the type of educational institutions. The article presents the theory and method of organizing sports events and circuses in the training of specialists in Physical Education and Sports by means of multimedia technologies. In order to increase the level of physical development of a person, physical fitness and the state of health of students, which has a clear trend to constant deterioration, it is necessary to instill love for sports, carry out high-quality training and organize sports events using multimedia technologies. In the process of sports activities, the participants' mental education is carried out. There are two types of communication here: direct and indirect, which are described in the article.In games and sports competitions, there are many opportunities for forming rules of collective behavior. The main issues of the organization of sports activities by means of multimedia technologies have been clarified. During sports competitions, the tasks presented in Physical Education and sports classes are improved, which ensure the improvement of physical and theoretical training of the individual. The pleasure of sports, bright, emotional spectacles, confirmed by multimedia technologies, arises from the participation of the viewer in them.

Ukrainian Students' Analysis of Abuse Treatment by Parents: Retrospective and Perspective in Virtual and Real Environments

  • Stoliarchuk, Olesia;Kokhanova, Olena;Prorok, Nataliia;Khrypko, Svitlana;Shevtsova, Olena;Tkachyshyna, Oksana;Lobanchuk, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.197-207
    • /
    • 2022
  • Given the prevalence of violence in Ukrainian families, measures to prevent parental abusive treatment against children are urgent. It is important to study today's youth awareness about violence within families in order to enhance a culture of engagement with spouses and children in future. The aim of the study is to examine students' reflective experiences and their attitudes towards forms, frequency, causes and effects of parental abusive treatment. During the research the following methods were used step-by-step: theoretical analyses of scientific resources, anonymous questionnaire, quantitative and correlation analyses. According to result of survey 98 students who were interviewed, none of them fell victim of sexual abuse in their families. However, more than a half (51%) of the students surveyed experienced some forms of parental physical punishment. All the interviewed students encountered psychological cases of parental violence. The mostprevalent forms of parental abuse among the interviewees are criticism, negative comparison, emotional detachment, arrogance, intimidation, blackmail and humiliation. The most prevalent consequences of parental abuse among students are anxiety, low self-esteem, insecurity, impatience, suspiciousness, constraint in communication. Students agree that budget limitations, forced labor, criticism, spanking, emotional detachment, ignoring type of communication, reproach, blackmail are acceptable methods of punishment to use when raising their own children. These results clearly demonstrate the problem of the impact of parental abuse on children and its consequences in the future. A virtual dimension of the actualized problem is considered, namely: - virtualization of aggression and cruelty in the postmodern world. - the level of determining the factor of cruelty from the space of virtual culture. - the mirror image of everyday cruelty in the virtual environment; - the phenomenon of video games as a source and context of representation of the factor of cruelty in behavioral realities; - cybercrime as a virtualized result of cruelty in family and everyday realities. - futurological perspectives of virtualization of cruelty in communicative culture in general and in family relations in particular. The postmodern world is fundamentally different from the traditions and culture of the past, primarily due to the development of computer technologies and the virtualization of life in general. So, for example, virtual communities have become, in a certain way, another world, a second reality of life in general. And certain behavioral factors, in particular cruelty in the private environment, became a projection of such a phenomenon as cybercrime. Video games are a unique modern phenomenon, which multipolarly absorb all facets of human potential, communicative tendencies, behavioral and characterological factors, from the warmth of interpersonal relationships to the extreme degree of cruelty.

Formation of a Professional Communication Culture Among the Students Using Information Technologies

  • Vakulyk, Iryna;Koval, Valentyna;Lukiianchuk, Inna;Romanenko, Nataliia;Grygorenko, Tetyana;Balalaieva, Olena;Oros, Ildiko
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.75-82
    • /
    • 2022
  • Analyzing the psychological and pedagogical literature, we found the researchers' interest in the problem posed. The concept of "culture of professional communication» is considered, which is interpreted as the level of realization of creative abilities, exchange of messages, organization of mutual understanding, mutual knowledge in the process of professionally directed interaction between subjects, in which interpersonal relationships arise, manifest and form. The concept of "professional culture of communication of a teacher" is interpreted. The motives that are socially significant in the professional communication of the teacher are highlighted. The necessity of forming a culture of professional communication among students, in particular by means of information technologies in the present, is clarified. The interactive component of professional communication is considered. The types of interactions between people in everyday life (ritual and entertainment interaction, joint purposeful activity, no interaction, game and interpersonal interaction) are identified. Traditional and specific forms and methods of teaching are written out. All interactive technologies carried out by means of information technologies are conventionally divided into four groups, depending on the form of educational activity appropriate for their use (pair (work of the subject with the teacher or peers one on one by means of Information Technologies); frontal (the teacher simultaneously teaches a group of subjects by means of Information Technologies); group or cooperative (all subjects teach each other by means of Information Technologies); individual (independent work of the subject using Information Technologies)). In the higher education institution, future specialists should learn knowledge, acquire skills on the basic rules of the culture of professional communication and methods of interaction and their effective use, which is possible with the use of Information Technologies. Recommendations for optimal professional communication have been developed that help you express your thoughts easily and beautifully, and conduct a dialogue in a relaxed and harmonious way.

Some New Problems of International Aviation Security- Considerations Forcused on its Legal Aspects (최근국제항공보안대책(最近國際航空保安対策)의 제간제(諸間題) -특히 법적측면(法的測面)을 중심(中心)으로-)

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.5
    • /
    • pp.53-75
    • /
    • 1993
  • This article is concerned with the comment on "Some New Problems of International Aviation Security-Considerations Forcused on its Legal Aspects". Ever since 1970, in addition to the problem of failure to accept the Tokyo, Hague and Montreal Conventions, there has been also the problem of parties to them, failing to comply with their obligations under the respective treaties, in the form especially of nominal penalties or the lack of any effort to prosecute after blank refusals to extradite. There have also been cases of prolonged detention of aircraft, passengers and hostages. In this regard, all three conventions contain identical clauses which submit disputes between two or more contracting States concerning the interpretation or application of the respective conventions to arbitration or failing agreement on the organization of the arbitration, to the International Court of Justice. To the extent to which contracting States have not contracted out of this undertaking, as I fear they are expressly allowed to do, this promision can be used by contracting States to ensure compliance. But to date, this avenue does not appear to have been used. From this point of view, it may be worth mentioning that there appears to be an alarming trend towards the view that the defeat of terrorism is such an overriding imperative that all means of doing so become, in international law, automatically lawful. In addition, in as far as aviation security is concerned, as in fact it has long been suggested, what is required is the "application of the strictest security measures by all concerned."In this regard, mention should be made of Annex 17 to the Chicago Convention on Security-Safeguarding International Civil Aviation against Acts of Unlawful Intereference. ICAO has, moreover, compiled, for restricted distribution, a Security Manual for Safeguarding Civil Aviation Against Acts of Unlawful Interference, which is highly useful. In this regard, it may well be argued that, unless States members of ICAO notify the ICAO Council of their inability to comply with opecific standards in Annex 17 or any of the related Annexes in accordance with Article 38 of the 1944 Chicago Convention on International Civil Aviation, their failure to do so can involve State responsibility and, if damage were to insure, their liability. The same applies to breaches of any other treaty obligation. I hope to demonstrate that although modes of international violence may change, their underlying characteristics remain broadly similar, necessitating not simply the adoption of an adequate body of domestic legislation, firm in its content and fairly administered, but also an international network of communication, of cooperation and of coordination of policies. Afurther legal instrument is now being developed by the Legal Committee of ICAO with respect to unlawful acts at International airports. These instruments, however, are not very effective, because of the absence of universal acceptance and the deficiency I have already pointed out. Therefore, States, airports and international airlines have to concentrate on prevention. If the development of policies is important at the international level, it is equally important in the domestic setting. For example, the recent experiences of France have prompted many changes in the State's legislation and in its policies towards terrorism, with higher penalties for terrorist offences and incentives which encourage accused terrorists to pass informations to the authorities. And our government has to tighten furthermore security measures. Particularly, in the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescence to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. The general opinion is that the legal oystem could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the sovereign rights of states, and the human rights of the individuals. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co - ordinated measures.

  • PDF

Development of Nursing Home Quality Management Index & Application in the Field (노인간호요양시설의 QMI 개발과 현장 실태분석)

  • Cho, Hye-Sook
    • Journal of Home Health Care Nursing
    • /
    • v.12 no.1
    • /
    • pp.117-135
    • /
    • 2005
  • Purpose: Expecting a new system of nursing security for elderly in operation in 2007, a substantial expansion of nursing facilities for elderly and quality management of those facilities are imperative now. Therefore. specific quality management measures or schemes which could be used for the operation of small-scale nursing homes are in urgent need. The purpose of this study was to develop a Quality Management Index(QMI) to guide Nursing Home management. Method: This study developed a QMI for small-scale nursing homes, which focused on quality management in structural dimensions such as environment, staffs, local community network, atmosphere, and quality management in process dimensions such as nursing, communication, resident satisfaction. The QMI developed in this study is based on extensive review of literature and the actual experiences of nursing home operation. It consists of 7 dimensions, 39 components and 148 indexes, which have been verified by three times validity tests of experts group. Then the QMI was used to evaluate the quality management levels of nursing homes in Korea. Result: In sum, after analyzing all nursing homes in Korea operated by nurses, this study found that there were significant differences of quality management level among facilities in several dimensions such as environment, staffs, local community connections, communication. In dimensions such as nursing, atmosphere, resident satisfaction, however, little differences of quality management level among facilities were reported. It is considered that this result has to do with several factors like the size of facilities, operation expenses, operation forms, the disposition of professional human resources, and philosophy and management policy of the owners. As far as generalization is concerned, however, it needs to be noted here that the sample size for this study is not statistically big enough to generalize the results. Conclusion: Having Developed a QMI for small-scale nursing home with 7 dimensions, 39 components and 148 indexes, this study is expected to be used in developing more elaborated quality evaluation tools for nursing homes, and also function as a practical guide of quality management for those who are opening and managing nursing homes. I hope this quality index could lead to further development of a standardized quality management index, and eventually contribute to quality improvement of nursing homes.

  • PDF

Two-dimensional OCDMA Encoder/Decoder Composed of Double Ring Add/Drop Filters and All-pass Delay Filters (이중 링 Add/Drop 필터와 All-pass 지연 필터로 구성된 이차원 OCDMA 인코더/디코더)

  • Chung, Youngchul
    • Korean Journal of Optics and Photonics
    • /
    • v.33 no.3
    • /
    • pp.106-112
    • /
    • 2022
  • A two-dimensional optical code division multiple access (OCDMA) encoder/decoder, which is composed of add/drop filters and all-pass filters for delay operation, is proposed. An example design is presented, and its feasibility is illustrated through numerical simulations. The chip area of the proposed OCDMA encoder/decoder could be about one-third that of a previous OCDMA device employing delay waveguides. Its performance is numerically investigated using the transfer-matrix method combined with the fast Fourier transform. The autocorrelation peak level over the maximum cross-correlation level for incorrect wavelength hopping and spectral phase code combinations is greater than 3 at the center of the correctly decoded pulse, which assures a bit error rate lower than 10-3, corresponding to the forward error-correction limit.