• Title/Summary/Keyword: Network Security Management

Search Result 1,378, Processing Time 0.027 seconds

Structural Components Of The Digital Competence Of The Master Of Production Training Of The Agricultural Profile

  • Kovalchuk, Vasyl;Zaika, Artem;Hriadushcha, Vira;Kucherak, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.259-267
    • /
    • 2022
  • With the rapid development and introduction of digital technologies, both everyday human life and technological processes of any production are changing, which stimulates the transformation of the economy and education. Digital technologies are not only a tool, but also a living environment of modern human, which opens up new opportunities: learning at any convenient time, continuing education, the ability to form individual educational learning trajectories and more. However, the digital environment requires teachers to take a modern approach to the organization of the educational process, the formation of new skills and abilities to work in the digital educational environment. As a result of the study, it was found that the system of vocational education should provide training for masters of industrial training who have a high level of digital competence. The purpose of the article is to single out, theoretically substantiate and determine the level of formation of structural components of digital competence of future masters of agricultural training. The structure of digital competence of agricultural master was analyzed on the basis of domestic and foreign scientists researches. Systematized research results indicate that digital competence consists of four components: motivational-value (combination of internal and external motives for the use of digital technologies in future professional activities), cognitive (a set of theoretical knowledge, skills and abilities of future master of industrial training to effectively build educational process with the use of digital technologies), activity-professional (expansion and deepening of knowledge, skills, necessary skills for effective implementation of digital technologies in the educational process) and evaluative-reflexive (ability to analyze and self-analyze own activities and its results taking into account professional characteristics, self-realization in professional activities through the use of digital technologies). These components are comparable with the indicators that describe the knowledge, skills and abilities needed by the future master of industrial training to organize the modern educational process. A questionnaire was conducted to determine the levels of this competence formation, which allows us to conclude that it is necessary to increase the level of formation of all components of digital competence of future masters of industrial training in agriculture. The results of the study can be used as a basis for the development of disciplines that form the special competencies of masters of industrial training in agriculture and programs of advanced training of teachers.

The Role of Fundamentalization of Education in Improving the Future Specialists Professional Training with Usage of Multimedia Technologies

  • Palshkov, Kostiantyn;Kochubei, Olena;Tsokur, Olga;Tiahur, Vasyl;Tiahur, Liubomyra;Filimonova, Tetiana;Kuzminskyi, Anatolii
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.95-102
    • /
    • 2022
  • The article considers the fundamentalization of education in improving the future specialists professional training with usage of multimedia technologies by various scientists. Various points of view and approaches to defining the concepts of fundamentalization of education and multimedia technologies are identified. The concept of fundamentalization of professional training of a future specialist is based on the goals and functions of fundamentalization and - on the ways and means of achieving it, etc. Most authors agree only in their views that the fundamentalization of education is aimed at improving the quality of education and the education of the individual. Others involve the formation of a culture and worldview, increasing the creative and intellectual potential, forming the professional competence of a specialist and the potential for further education, and so on. The term multimedia refers to interactive systems that provide processing of moving and still video images, animated graphics, high-quality audio and speech. It is found out that professional training of a specialist by means of multimedia technologies includes not only the activities of the teacher and student, which form the learning process, but also the independent activity of the subject, self-development, assimilation of experience by the subject through analysis, comprehension and transformation of the field of activity in which he is included. It is revealed through the implementation of which approaches to the fundamentalization of higher professional education, it becomes possible to fully present theoretical training courses and effectively pass practical training by students, which contributes to improving the quality of training of future specialists in higher education institutions. Theoretical analysis of scientific views indicates a fairly serious attention of scientists to the problem of professional readiness of specialists and the possibility of higher educational institutions in preparing for it. At the same time, professional readiness is considered from different positions: as an active state of a person, which manifests itself in activity; as a result of activity; as goals of activity; as a quality that characterizes the attitude to solving professional problems and social situations; as a prerequisite for purposeful activity; as a form of activity of the subject; as an integral formation of personality; as a component of socio-professional culture; as a complex professionally significant neoplasm of the individual.

Ensuring the Quality of Higher Education in Ukraine

  • Olha Oseredchuk;Mykola Mykhailichenko;Nataliia Rokosovyk;Olha Komar;Valentyna Bielikova;Oleh Plakhotnik;Oleksandr Kuchai
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.142-148
    • /
    • 2023
  • The National Agency for Quality Assurance in Higher Education plays a crucial role in education in Ukraine, as an independent entity creates and ensures quality standards of higher education, which allow to properly implement the educational policy of the state, develop the economy and society as a whole.The purpose of the article: to reveal the crucial role of the National Agency for Quality Assurance in Higher Education to create quality management of higher education institutions, to show its mechanism as an independent entity that creates and ensures quality standards of higher education. and society as a whole. The mission of the National Agency for Quality Assurance in Higher Education is to become a catalyst for positive changes in higher education and the formation of a culture of its quality. The strategic goals of the National Agency are implemented in three main areas: the quality of educational services, recognition of the quality of scientific results, ensuring the systemic impact of the National Agency. The National Agency for Quality Assurance in Higher Education exercises various powers, which can be divided into: regulatory, analytical, accreditation, control, communication.The effectiveness of the work of the National Agency for Quality Assurance in Higher Education for 2020 has been proved. The results of a survey conducted by 183 higher education institutions of Ukraine conducted by the National Agency for Quality Assurance in Higher Education are shown. Emphasis was placed on the development of "Recommendations of the National Agency for Quality Assurance in Higher Education regarding the introduction of an internal quality assurance system." The international activity and international recognition of the National Agency for Quality Assurance in Higher Education are shown.

Decision Making of Seismic Performance Management for the Aged Road Facilities Based on Road-Network and Fragility Curve (취약도곡선을 이용한 도로망기반 노후도로시설물 내진성능관리 의사결정)

  • Kim, Dong-Joo;Choi, Ji-Hae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.5
    • /
    • pp.94-101
    • /
    • 2021
  • According to the Facility Management System (FMS) operated by the Korea Authority of Land & Infrastructure Safety, it is expected that the number of aging facilities that have been in use for more than 30 years will increase rapidly to 13.9% in 2019 and 34.5% in 2929, and end up with a social problem. In addition, with the revision of "Common Application of Seismic Design Criteria" by the Ministry of Public Administration and Security in 2017, it is mandatory to re-evaluate all existing road facilities and if necessary seismic reinforcement should be done to minimize the magnitude of earthquake damage and perform normal road functions. The seismic performance management-decision support technology currently used in seismic performance management practice in Korea only determines the earthquake-resistance reinforcement priority based on the qualitative index value for the seismic performance of individual facilities. However with this practice, normal traffic functions cannot be guaranteed. A new seismic performance management decision support technology that can provide various judgment data required for decision making is needed to overcome these shortcomings and better perform seismic performance management from a road network perspective.

Study on the Effect of Self-Disclosure Factor on Exposure Behavior of Social Network Service (자기노출 요인이 소셜 네트워크 서비스의 노출행동에 미치는 영향에 관한 연구)

  • Do Soon Kwon;Seong Jun Kim;Jung Eun Kim;Hye In Jeong;Ki Seok Lee
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.209-233
    • /
    • 2016
  • Internet companies that utilize social network have increased in number. The introduction of diverse social media services facilitated innovative changes in e-business. Social network service (SNS), which is a domain of social media, is a web-based service designed to strengthen human relations in the Internet and build new social relations. The remarkable growth of social network services and the profit generation and perception of this service are the new growth engines of this digital age. Given this development, many global IT companies views SNS as the most powerful form of social media. Thus, they invest efforts to develop business models using SNS.2) This study verifies the impact of privacy exposure in SNS as a result of privacy invasion. This study examines the purpose of using the SNS and user's awareness of the significance of personal information, which are key factors that affect self-disclosure of personal information. This study utilizes theory of reasoned action (TRA) to provide a theoretical platform that describes the specific behavior and emotional response of individuals. This study presents a research model that considers negative attitude (negatude). In this model, self-disclosure in SNS is considered a TRA. TRA is a subjective norm, a behavioral intention, and a key variable of exposure behavior. A survey was conducted on college students at Y university in Seoul to empirically verify the research model. The students have experiences in using SNS. A total of 198 samples were collected. Path analysis was applied to analyze the relations of factors. The results of path analysis show the statistically insignificant impact of privacy invasion on negatude, subjective norm, behavioral intention, and exposure behavior. The impact of unrecognized privacy invasion was also considered insignificant. The impacts of intention to use SNS on negatude, subjective norm, behavioral intention, and exposure behavior was significant. A significant impact was also found for the significance of personal information on subjective norm, behavioral intention, and exposure behavior, whereas the impact on negatude was insignificant. The impact of subjective norm on behavioral intention was significant. Lastly, the impact of behavioral intention on exposure behavior was insignificant. These findings are significant because the study examined the process of self-disclosure by integrating psychological and social factors based on theoretical discussion.

A Study on Implementation of Authentication System for Home Networking Service (홈 네트워크 서비스를 위한 인증시스템 구현에 관한 연구)

  • Lee, Ki-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1091-1098
    • /
    • 2009
  • In this paper, we designed the authentication system for home network service and applied it to actual sensor nodes. The pair-wise pre-distribution key skim is applied for prevention of authentication key from sniffing on the wireless sensor networks. The authentication key and data are encrypted by using the CBC mode RC5 algorithm based on the SPINS. The experimental environment consists of a base station (BS)and sensor nodes and each sensor node sends both sensing data and the encrypted authentication key to the BS. For simulations we set up some what-if scenarios of security menaces in home network service.Slightly modified the TOS_Msg data arrays of TinyOS is suggested to store 8-byte authentication key which can enable data encryption and authentication at the each sensor node. As a result, malfunction caused by communication between BS and nodes of other groups of added nodes having malicious purpose can be protected. Also, we confirmed that a critical data of home networking service like vital signal can be transmitted securely through this system by encryption technique.

Development of Operating Guidelines of a Multi-reservoir System Using an Artificial Neural Network Model (인공 신경망 모형을 활용한 저수지 군의 연계운영 기준 수립)

  • Na, Mi-Suk;Kim, Jae-Hee;Kim, Sheung-Kown
    • IE interfaces
    • /
    • v.23 no.4
    • /
    • pp.311-318
    • /
    • 2010
  • In the daily multi-reservoir operating problem, monthly storage targets can be used as principal operational guidelines. In this study, we tested the use of a simple back-propagation Artificial Neural Network (ANN) model to derive monthly storage guideline for daily Coordinated Multi-reservoir Operating Model (CoMOM) of the Han-River basin. This approach is based on the belief that the optimum solution of the daily CoMOM has a good performance, and the ANN model trained with the results of daily CoMOM would produce effective monthly operating guidelines. The optimum results of daily CoMOM is used as the training set for the back-propagation ANN model, which is designed to derive monthly reservoir storage targets in the basin. For the input patterns of the ANN model, we adopted the ratios of initial storage of each dam to the storage of Paldang dam, ratios of monthly expected inflow of each dam to the total inflow of the whole basin, ratios of monthly demand at each dam to the total demand of the whole basin, ratio of total storage of the whole basin to the active storage of Paldang dam, and the ratio of total inflow of the whole basin to the active storage of the whole basin. And the output pattern of ANN model is the optimal final storages that are generated by the daily CoMOM. Then, we analyzed the performance of the ANN model by using a real-time simulation procedure for the multi-reservoir system of the Han-river basin, assuming that historical inflows from October 1st, 2004 to June 30th, 2007 (except July, August, September) were occurred. The simulation results showed that by utilizing the monthly storage target provided by the ANN model, we could reduce the spillages, increase hydropower generation, and secure more water at the end of the planning horizon compared to the historical records.

An improved LEACH-C routing protocol considering the distance between the cluster head and the base station (클러스터 헤드와 기지국간의 거리를 고려한 향상된 LEACH-C 라우팅 프로토콜)

  • Kim, TaeHyeon;Park, Sea Young;Kwon, Oh Seok;Lee, Jong-Yong;Jung, Kye-Dong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.373-377
    • /
    • 2022
  • Wireless sensor networks are being used in various fields. Wireless sensor networks are applied in many areas, such as security, military detection, environmental management, industrial control, and home automation. There is a problem about the limit of energy that the sensor network basically has. In this paper, we propose the LEACH-CCBD (Low Energy Adaptive Clustering hierarchy - Centrailized with Cluster and Basestation Distance) algorithm that uses energy efficiently by improving network transmission based on LEACH-C among the representative routing protocols. The LEACH-CCBD algorithm is a method of assigning a cluster head to a cluster head by comparing the sum of the distance from the member node to the cluster distance and the distance from the cluster node to the base station with respect to the membership of the member nodes in the cluster when configuring the cluster. The proposed LEACH-CCBD used Matlab simulation to confirm the performance results for each protocol. As a result of the experiment, as the lifetime of the network increased, it was shown to be superior to the LEACH and LEACH-C algorithms.

A Study on the Inference of Detailed Protocol Structure in Protocol Reverse Engineering (상세한 프로토콜 구조를 추론하는 프로토콜 리버스 엔지니어링 방법에 대한 연구)

  • Chae, Byeong-Min;Moon, Ho-Won;Goo, Young-Hoon;Shim, Kyu-Seok;Lee, Min-Seob;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.42-51
    • /
    • 2019
  • Recently, the amount of internet traffic is increasing due to the increase in speed and capacity of the network environment, and protocol data is increasing due to mobile, IoT, application, and malicious behavior. Most of these private protocols are unknown in structure. For efficient network management and security, analysis of the structure of private protocols must be performed. Many protocol reverse engineering methodologies have been proposed for this purpose, but there are disadvantages to applying them. In this paper, we propose a methodology for inferring a detailed protocol structure based on network trace analysis by hierarchically combining CSP (Contiguous Sequential Pattern) and SP (Sequential Pattern) Algorithm. The proposed methodology is designed and implemented in a way that improves the preceeding study, A2PRE, We describe performance index for comparing methodologies and demonstrate the superiority of the proposed methodology through the example of HTTP, DNS protocol.

Research on Security System for Safe Communication in Maritime Environment (해상환경에서 안전한 통신을 위한 보안체계 연구)

  • Seoung-Pyo Hong;Hoon-Jae Lee;Young-Sil Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • As a means of helping ships navigate safely, navigational aids in operation in the maritime envirionment require periodic management, and due to the nature of the environment, it is difficult to visually check the exact state. As a result, the smart navigation aid system, which improves route safety and operational efficiency, utillizes expertise including sensors, communications, and information technology, unlike general route markings. The communication environment of the smart navigation aid system, which aims to ensure the safety of the navigators operating the ship and the safety of the ship, uses a wireless communication network in accordance with the marine environment. The ship collects the information necessary for the maritime environment on the land and operates. In this process, there is a need to consider the wireless communication security guideline. Basically, based on IHO S-100 a standard for facilitating data exchange and SECOM, which provides an interface for safe communication. This paper research a security system for safe communication in a maritime environment. The security system for the basic interface based on the document was presented, and there were some vulnerabillties to data exchange due to the wireless communication characteristics of the maritime environment, and the user authetication part was added considering the vulnerability that unauthorized users can access the service.