• Title/Summary/Keyword: Network Security Modeling

Search Result 190, Processing Time 0.018 seconds

A network traffic prediction model of smart substation based on IGSA-WNN

  • Xia, Xin;Liu, Xiaofeng;Lou, Jichao
    • ETRI Journal
    • /
    • v.42 no.3
    • /
    • pp.366-375
    • /
    • 2020
  • The network traffic prediction of a smart substation is key in strengthening its system security protection. To improve the performance of its traffic prediction, in this paper, we propose an improved gravitational search algorithm (IGSA), then introduce the IGSA into a wavelet neural network (WNN), iteratively optimize the initial connection weighting, scalability factor, and shift factor, and establish a smart substation network traffic prediction model based on the IGSA-WNN. A comparative analysis of the experimental results shows that the performance of the IGSA-WNN-based prediction model further improves the convergence velocity and prediction accuracy, and that the proposed model solves the deficiency issues of the original WNN, such as slow convergence velocity and ease of falling into a locally optimal solution; thus, it is a better smart substation network traffic prediction model.

Modeling and simulation of CNP-applied network security models with application of fuzzy rule-based system (퍼지를 적용한 계약망 프로토콜 기반의 네트워크 보안 모델의 설계 및 시뮬레이션)

  • Lee Jin-ah;Cho Tae-ho
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.1
    • /
    • pp.9-18
    • /
    • 2005
  • Attempts to attack hosts in the network have become diverse, due to crackers developments of new creative attacking methods. Under these circumstances the role of intrusion detection system as a security system component gets considerably importance. Therefore, in this paper, we have suggested multiple intrusion detection system based on the contract net protocol which provides the communication among multiple agents. In this architecture, fuzzy rule based system has been applied for agent selection among agents competing for being activated. The simulation models are designed and implemented based on DEVS formalism which is theoretically well grounded means of expressing discrete event simulation models.

  • PDF

Modeling of a Software Vulnerability Identification Method

  • Diako, Doffou jerome;N'Guessan, Behou Gerard;ACHIEPO, Odilon Yapo M
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.354-357
    • /
    • 2021
  • Software vulnerabilities are becoming more and more increasing, their role is to harm the computer systems of companies, governmental organizations and agencies. The main objective of this paper is to propose a method that will cluster future software vulnerabilities that may spread. This method is developed by combining the Multiple Correspondence Analysis (MCA), the Elbow procedure and the Kmeans Algorithm. A simulation was done on a dataset of 15713 observations. This simulation allowed us to identify families of future vulnerabilities. This model was evaluated using the silhouette index.

Theoretical And Technological Aspects Of Intelligent Systems: Problems Of Artificial Intelligence

  • Frolov, Denys;Radziewicz, Wojciech;Saienko, Volodymyr;Kuchuk, Nina;Mozhaiev, Mykhailo;Gnusov, Yurii;Onishchenko, Yurii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.35-38
    • /
    • 2021
  • The article discusses approaches to the definition and understanding of artificial intelligence, research directions in the field of artificial intelligence; artificial intelligence in the anthropological dimension; the importance of the systems approach as a methodological basis for the design of intelligent systems; structural and functional components of intelligent systems; intelligent systems in the technological aspect; problems and prospects of relations in the system "man - intellectual system".

Towards a Deep Analysis of High School Students' Outcomes

  • Barila, Adina;Danubianu, Mirela;Paraschiv, Andrei Marcel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.71-76
    • /
    • 2021
  • Education is one of the pillars of sustainable development. For this reason, the discovery of useful information in its process of adaptation to new challenges is treated with care. This paper aims to present the initiation of a process of exploring the data collected from the results obtained by Romanian students at the BBaccalaureate (the Romanian high school graduation) exam, through data mining methods, in order to try an in-depth analysis to find and remedy some of the causes that lead to unsatisfactory results. Specifically, a set of public data was collected from the website of the Ministry of Education, on which several classification methods were tested in order to find the most efficient modeling algorithm. It is the first time that this type of data is subjected to such interests.

Intelligent Automated Cognitive-Maturity Recognition System for Confidence Based E-Learning

  • Usman, Imran;Alhomoud, Adeeb M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.223-228
    • /
    • 2021
  • As a consequence of sudden outbreak of COVID-19 pandemic worldwide, educational institutes around the globe are forced to switch from traditional learning systems to e-learning systems. This has led to a variety of technology-driven pedagogies in e-teaching as well as e-learning. In order to take the best advantage, an appropriate understanding of the cognitive capability is of prime importance. This paper presents an intelligent cognitive maturity recognition system for confidence-based e-learning. We gather the data from actual test environment by involving a number of students and academicians to act as experts. Then a Genetic Programming based simulation and modeling is applied to generate a generalized classifier in the form of a mathematical expression. The simulation is derived towards an optimal space by carefully designed fitness function and assigning a range to each of the class labels. Experimental results validate that the proposed method yields comparative and superior results which makes it feasible to be used in real world scenarios.

Pedagogical Conditions And Technology Of Formation Of Management Competencies Of Future Specialists Of The System Of Higher Education Institutions

  • Rebryna, Anatolii;Kukin, Igor;Soltyk, Oleksandr;Tashmatov, Viacheslav;Bilanych, Halyna;Kramarenko, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.217-221
    • /
    • 2022
  • The article analyzes the main theoretical approaches to the formation of managerial competencies and establishes the degree of development of the problem. The content of the concept of "managerial competence" has been clarified, to determine the structure of managerial competencies of a future specialist in the education system and indicators of the formation of managerial competencies. The organizational and pedagogical conditions necessary for the effective process of forming the managerial competencies of future specialists are revealed. The following research methods were used in the work: theoretical (analysis of regulatory documents and scientific literature on the problem under study, comparison, generalization, modeling), empirical (diagnostics of the level of formation of managerial competencies of students of the system, questioning, observation, peer review, comparative qualitative and quantitative analysis of diagnostic results the level of formation of managerial competencies).

Evolutionary Theory Of Management In Education

  • Moskalenko-Vysotska, Olena;Melnyk, Emiliia;Tovstenko-Zabelin, Serhii;Lehka, Svitlana;Didenko, Maryna;Hrubych, Kostiantyn
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.312-318
    • /
    • 2022
  • The article notes that one of the reasons for the crisis in education was the sharp discrepancy between the emerging new forms and content and the model of macro-management that has developed over the decades. The level of management of the educational system did not emerge as a specific activity characterized by its own mechanisms and processes, just as qualified carriers of this activity - professionals - managers - did not appear. At the same time, there is practically no theoretical and methodological model of the macrolevel of education management, that is, management of the educational system as an integral structure.

Information Aspects of Changes in the Labor Market of the EU and Ukraine in the Context of Ensuring Safety Through COVID-19

  • Andriyiv, Nataliya;Zachepa, Andryi;Petrukha, Nina;Shevchuk, Inna;Berest, Ihor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.657-663
    • /
    • 2021
  • The main purpose of the study is to analyze the information aspects of the impact of COVID-19 on the labor market in the EU and Ukraine. In addition to studying the key parameters of changes in the labor market under the influence of COVID-19, i.e. the unemployment rate and the share of the employed population, a thorough study of gender equality, labor migration and the impact on youth made it possible to characterize the effectiveness of the policy of stabilization and restoration of the labor market in the EU and Ukraine. The results obtained form the necessary information basis for modeling labor market regulation in the event of possible subsequent disturbances, in particular under the influence of global pandemics.

Theoretical Analysis Of The Problem Of Leadership In Professional And Management Activities

  • Desiatnyk, Kateryna;Novakivska, Lyudmyla;Pryma, Viktoriia;Klochko, Larysa;Vdovina, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.192-198
    • /
    • 2022
  • The article is devoted to current problems of the concept leadership. The essence of the concept of "leadership" is considered and leadership theories. The authors of the article conducted a multifaceted analysis of leadership theories, analyzed the factors of their formation and identified their relationship. Also, the reasons for the difference and connection between leadership and leadership. Styles were presented leadership and their role in building effective leadership. To form the basis of effective leadership was compared to the main criteria inherent in this theories. The following research methods were used in the work: theoretical (analysis of regulatory documents and scientific literature on the problem under study, comparison, generalization, modeling), empirical (diagnostics of the level of formation of managerial competencies of students of the system, questioning, observation, peer review, comparative qualitative and quantitative analysis of diagnostic results the level of formation of managerial competencies).