• Title/Summary/Keyword: Network Security Management

Search Result 1,378, Processing Time 0.033 seconds

Application of Art Therapy with Usage of Distance Education in the Process of Specialists Professional Training

  • Klepar, Maria;Khomyak, Hryhoriy;Kurkina, Snizhana;Ishchenko, Liudmyla;Bai, Ihor;Lashkul, Valerii;Bida, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.251-257
    • /
    • 2022
  • Nowadays, the issues of comprehensive formation of a person capable of self-education, self-development and creative self-realization in the conditions of distance education are relevant. There is a need to solve this problem, which is due to social, cultural, and pedagogical factors. This makes it necessary to find effective means of personality formation. In this matter, great importance is attached to the modern method of forming a creative personality - art therapy. Various approaches to the definition of art therapy have been clarified. They consider various forms of art therapy when working with children, adolescents and adults in the context of distance education. The most relevant are the two main forms of work - individual and group art therapy. Art therapy develops the individual's creativity. Therefore, during art therapy, attention is focused on the inner world, experiences, and feelings. Therefore, we believe that in the context of distance education, art therapy has everything for the powerful potential of personality formation. Scientists consider this therapy as therapy by means of art, which is based on experiences, conflicts that can be expressed in the visual arts and music. Art therapy helps to get rid of conflicts and experiences. This happens in the context of distance education through the development of attention to feelings, strengthening one's own personal value and increasing artistic competence. The article describes the signs that characterize art therapy. Art-therapeutic technologies in the context of distance education, which are now actively used by psychologists, teachers and art therapists themselves, are highlighted. The advantages of distance learning are considered. The characteristic features of distance learning and features of the use of art therapy by means of distance education in the process of professional training of specialists are determined.

Formation of the Digital Generation in a Distance Learning Environment

  • Nataliіa, Levchenko;Nataliia, Sukhostavets;Lesia, Zelman;Alla, Kulichenko;Kseniia, Balabanova
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.335-341
    • /
    • 2022
  • This article is devoted to the study of the process of formation of the digital generation in a distance learning environment. With the introduction of quarantine due to the spread of COVID-19, opponents of digital technologies were forced to turn to relevant resources, while supporters identified new opportunities for the development of didactics and education in general. The irreversibility of the former educational reality became apparent and only the scale of the vision of potential change by interested and disinterested groups differed. Using a comprehensive approach, the authors consider the issues related to the direct and indirect impact of distance learning on children and young people born after the beginning of the XXI century. The article reveals the prerequisites and implications of distance education for the interaction of participants in the educational process. IC technologies during the educational process in the primary grades, in addition to identifying the student's learning deficit, should provide the transmission of non-verbal signals, which are important for children of this age. At the same time in the secondary school IR-technologies are designed to replace frontal learning during the assimilation of knowledge and at the same time not to worsen the quality of the educational process. Formation of students in the HEI takes place in the political science format, constant discussion of problem situations, so the task of introducing IC technology in this process is the accurate transfer of the content of the discussions. Individualization and autonomization of the educational process, its dependence on the results of the choice of educational content, and the use of pedagogical management tools change the philosophy of education for children and youth. The authors conclude that the formation of a digital generation, characterized by an increased level of digital literacy of children and youth, the possession of a certain level of digital capacity requires the use of strategies aimed at optimizing the learning process in a digital educational environment.

Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment (U-Health환경에서 안전한 개인정보 관리를 위한 통합 인증스키마 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3865-3871
    • /
    • 2014
  • The U-health service provides medical services with patients anytime or anywhere and is defined as the service that combines information and communication technology with health and medical service. However, it causes some troubles, such as the disclosure of patients' medical information or data spills (personal information extrusion). Moreover, it has the weak point of the security threats associated with data based on existing wire-wireless systems because it conducts data transmission and reception through the network. Therefore, this paper suggests a safe personal information management system by designing integrated certification schema that will help compensate for the weaknesses of the U-health service. In the proposal, the protocols for user information, certification between medical institution and users, data communication encryption & decryption, and user information disuse were designed by applying the ID-Based Encryption, and analyzed such existing systems and PKI Based-based communication process, securely and safely.

A Systematic Literature Review on Smart Factory Research: Identifying Research Trends in Korean Academia (스마트공장에 관한 체계적 문헌 분석: 국내 학술 경향 연구)

  • Kim, Gibum;Lee, Jungwoo
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.59-71
    • /
    • 2020
  • The paper reports on a systematic literature review results concerning the smart factory research in Korea. 144 papers were identified from the articles published in Korean journals listed in the Korean citation index by keyword search related to smart factory. Bibliometric analyses were conducted by way of co-occurrence and network analysis using the VOSViewer. Automation, intelligence, and bigdata were identifed as three critical clusters of research while, operating systems, international policy and cases, concept analysis as other three clusters of research. Internet of Things turned out to be a key technology of smart factory linking all of these areas. Servitization studies were small in numbers but seemed to have a lot of potential. Security researches seemed to be lacking connections with other areas of studies. Results of this study can be used as a milestone for identifying future research issues in smart factories.

A Study on the Application of Blockchain to Accounts Receivable Insurance to Small and Mid-Size Businesses (중소기업 매출채권보험 활성화를 위한 블록체인 적용방안 연구)

  • Kwon, HyukJun;Kim, Hyeob
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.4
    • /
    • pp.135-149
    • /
    • 2019
  • Accounts receivable insurance is a system in which small and medium-sized enterprises insure the accounts receivables acquired by the purchasing company, and the insurance company pays when the purchaser fails to pay the debts. Accounts receivable insurance is a very effective means of eliminating the risk of loss due to the counterparty default, and it is economically effective to protect the domestic industry by preventing the bankruptcy of one company leading to a chain bankruptcy of other companies. In this study, we constructed a business model of the accounts receivable insurance, by building an infrastructure based on a private blockchain in activating the accounts receivable insurance accounts. The accounts receivable insurance platform using these blockchain technologies not only addressed the problem of document and reliability verification for insurance, but also sought ways to facilitate accounts receivable insurance by small businesses through rapid transaction rates, easy network expansion and access management based on private blockchain.

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.

Low-noise reconstruction method for coded-aperture gamma camera based on multi-layer perceptron

  • Zhang, Rui;Tang, Xiaobin;Gong, Pin;Wang, Peng;Zhou, Cheng;Zhu, Xiaoxiang;Liang, Dajian;Wang, Zeyu
    • Nuclear Engineering and Technology
    • /
    • v.52 no.10
    • /
    • pp.2250-2261
    • /
    • 2020
  • Accurate localization of radioactive materials is crucial in homeland security and radiological emergencies. Coded-aperture gamma camera is an interesting solution for such applications and can be developed into portable real-time imaging devices. However, traditional reconstruction methods cannot effectively deal with signal-independent noise, thereby hindering low-noise real-time imaging. In this study, a novel reconstruction method with excellent noise-suppression capability based on a multi-layer perceptron (MLP) is proposed. A coded-aperture gamma camera based on pixel detector and coded-aperture mask was constructed, and the process of radioactive source imaging was simulated. Results showed that the MLP method performs better in noise suppression than the traditional correlation analysis method. When the Co-57 source with an activity of 1 MBq was at 289 different positions within the field of view which correspond to 289 different pixels in the reconstructed image, the average contrast-to-noise ratio (CNR) obtained by the MLP method was 21.82, whereas that obtained by the correlation analysis method was 5.85. The variance in CNR of the MLP method is larger than that of correlation analysis, which means the MLP method has some instability in certain conditions.

WebCam : A Web-based Remote Recordable Surveillance System using Index Search Algorithm (웹캠 : 새로운 인데스검색 알고리듬을 이용한 웹기반 원격 녹화 보안 시스템)

  • Lee, Myeong-Ok;Lee, Eun-Mi
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.9-16
    • /
    • 2002
  • As existing analog video surveillance systems could save and retrieve data only in a limited space within short distance, it had many constraints in developing into various application systems. However, on the back of development of the Internet and computer technologies, digital video surveillance systems can be controlled from a remote location by web browser without space limits. Moreover, data compression and management technologies with Index Search algorithm make it possible to efficiently handling, storing, and retrieving a large amount of data and further motion detection algorithm enhances a recording speed and efficiency for a practical application, that is, a practical remote recordable video surveillance system using our efficient algorithms as mentioned, called WebCam. The WebCam server system can intelligently record and save video images digitized through efficient database management, monitor and control cameras in a remote place through user authentication, and search logs.

A Study on Acceptance of Public Recording for SNS Post (SNS 게시물에 대한 공공기록화 수용에 관한 연구)

  • Yun, Sung-Uk;Chang, Jun-Gab;Kim, Geon
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.1-12
    • /
    • 2019
  • This study explored the factors affecting the acceptance of public recording in SNS post. Using SPSS 21.0 program and AMOS 21.0 program, major results were derived through exploratory factor analysis, confirmatory factor analysis, correlation analysis, and path analysis. The results are as follows: First, the risk of personal information leakage on SNS posting has a significant negative impact on the attitude toward SNS posting. Second, the security of the SNS posting has a significant effect on the attitude toward the SNS posting. Third, the concern about privacy of SNS posting has a significant negative impact on the attitude toward SNS posting. Fourth, the attitude toward SNS posting has a significant effect on the intention to accept the SNS posting. The above results suggest that the SNS post recording should be able to collect opinions of SNS users from a long-term viewpoint.

Counter Measures of the Subway Terrorism through Case Analysis (사례분석을 통한 지하철 테러에 대한 대책)

  • Kwon, Jeong-Hoon;Kim, Tae-Hwan;Choi, Jong-Gyun
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.1-20
    • /
    • 2009
  • Nowadays most nations around the world including Korea have experienced absolute shortages of available urban space. To solve various problems of the city, each nation constantly tends to extend the underground space. However there is a serious problem in making use of the underground space. Especially new terrorism coming into existence after 9.11 terror turns into the so-called ‘soft target’ which has something to do with public transportation facilities available to most people. Good examples are like these: poisonous gas attacks in Tokyo subway in 1995, Daegu subway station fire in 2003, serial bomb blast of London subway in 2005. In spite of being a concern on incidents related to the underground space it is inevitable to utilize the underground space and the tendency is growing. But Korea lags badly behind in foreign countries in this field and so seeking measures is urgently needed. Therefore the aim of this study is to note visible damages stemmed from the domestic and foreign underground space and propose more effective and adequate measures. Safety measures of terrorism are associated to minimize damage out of terrorism and they are as follows. In the first place, preparing protective equipment for saving a life from fire attacks and poisonous gas is needed urgently. In the second place, counterpart management on the spot and systematic security training should be established in order to minimize injury. In the third place, fire escapes must be provided for a rapid evacuation of potential unspecified individuals. In the fourth place, building up a network of related institutions is required for a systematic omnidirectional counterpart. Finally the Korean government ought to take fast and appropriate actions for the injured and bereaved family of the terror incident.

  • PDF