• Title/Summary/Keyword: Network Security Systems

Search Result 1,615, Processing Time 0.035 seconds

Use of Digital Educational Resources in the Training of Future Specialists in the EU Countries

  • Plakhotnik, Olga;Zlatnikov, Valentyn;Matviienko, Olena;Bezliudnyi, Oleksandr;Havrylenko, Anna;Yashchuk, Olena;Andrusyk, Pavlo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • The article proves that the main goal of informatization of higher education institutions in the EU countries is to improve the quality of education of future specialists by introducing digital educational resources into the education process. The main tasks of informatization of education are defined. Digital educational resources are interpreted as a set of data in digital form that is applicable for use in the learning process; it is an information source containing graphic, text, digital, speech, music, video, photo and other information aimed at implementing the goals and objectives of modern education; educational resources on the Internet, electronic textbooks, educational programs, electronic libraries, etc. The creation of digital educational resources is defined as one of the main directions of informatization of all forms and levels of Education. Types of digital educational resources by educational functions are considered. The factors that determine the effectiveness of using digital educational resources in the educational process are identified. The use of digital educational resources in the training of future specialists in the EU countries is considered in detail. European countries note that digital educational resources in professional use allow you to implement a fundamentally new approach to teaching and education, which is based on broad communication, free exchange of opinions, ideas, information of participants in a joint project, on a completely natural desire to learn new things, expand their horizons; is based on real research methods (scientific or creative laboratories), allowing you to learn the laws of nature, the basics of techniques, technology, social phenomena in their dynamics, in the process of solving vital problems, features of various types of creativity in the process of joint activities of a group of participants; promotes the acquisition by teachers of various related skills that can be very useful in their professional activities, including the skills of using computer equipment and various digital technologies.

Formation of a Person's Value Attitude to the Worldview Using Information Technologies

  • Yakymenko, Svitlana;Drobin, Andrii;Fatych, Mariia;Dira, Nadiia;Terenko, Olena;Zakharevych, Mykola;Chychuk, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.183-190
    • /
    • 2022
  • The article analyzes the features of the formation of a person's value attitude to the worldview by means of information technologies. The present considers it necessary to form a person's value attitude to the perception of the world by means of information technologies. The explosive development of information and telecommunications technologies has become a determining factor in the development of modern society, which is called the information or Global Information Society. It is not yet fully formed, and we are all participants in the development of the Global Information Society. The article considers the basics of a harmonious worldview of a person, which is the basis for the formation of outlook ideas, views, knowledge, beliefs about the surrounding world, which determine the place and role and motivate actions in relation to the surrounding reality through the prism of value orientations. Worldview is considered as an integrity of relatively stable schemes, behaviors, feelings, thinking, vision of the surrounding world, inherent in an individual child, ethno-cultural and socio-cultural groups. The concept of "worldview" as a component of the multi-level structure of the individual's outlook is defined. The features that characterize a person's perception of the world are revealed. The main educational value of information technologies in the formation of a person's value attitude to the perception of the world is highlighted, which consists in the fact that they allow you to create an immeasurable brighter multi-sensory interactive learning environment with almost unlimited potential opportunities that fall at the disposal of both the teacher and the student. The trend of forming a person's value attitude to the perception of the world is clearly developing in the direction of mixed learning as a process that creates a comfortable information educational environment, communication systems that provide all the necessary educational information. The approach to student development by means of the educational environment and the formation, while in the person of a value attitude to the perception of the world by means of Information Technologies, has many pedagogical advantages, which is considered in the article.

Innovative Technologies in Higher School Practice

  • Popovych, Oksana;Makhynia, Nataliia;Pavlyuk, Bohdan;Vytrykhovska, Oksana;Miroshnichenko, Valentina;Veremijenko, Vadym;Horvat, Marianna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.248-254
    • /
    • 2022
  • Educational innovations are first created, improved or applied educational, didactic, educative, and managerial systems and their components that significantly improve the results of educational activities. The development of pedagogical technology in the global educational space is conventionally divided into three stages. The role of innovative technologies in Higher School practice is substantiated. Factors of effectiveness of the educational process are highlighted. Technology is defined as a phenomenon and its importance is emphasized, it is indicated that it is a component of human history, a form of expression of intelligence focused on solving important problems of being, a synthesis of the mind and human abilities. The most frequently used technologies in practice are classified. Among the priority educational innovations in higher education institutions, the following are highlighted. Introduction of modular training and a rating system for knowledge control (credit-modular system) into the educational process; distance learning system; computerization of libraries using electronic catalog programs and the creation of a fund of electronic educational and methodological materials; electronic system for managing the activities of an educational institution and the educational process. In the educational process, various innovative pedagogical methods are successfully used, the basis of which is interactivity and maximum proximity to the real professional activity of the future specialist. There are simulation technologies (game and discussion forms of organization); technology "case method" (maximum proximity to reality); video training methodology (maximum proximity to reality); computer modeling; interactive technologies; technologies of collective and group training; situational modeling technologies; technologies for working out discussion issues; project technology; Information Technologies; technologies of differentiated training; text-centric training technology and others.

Innovative Technology of Teaching Moodle in Higher Pedagogical Education: from Theory to Pactice

  • Iryna, Rodionova;Serhii, Petrenko;Nataliia, Hoha;Kushevska, Natalia;Tetiana, Siroshtan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.153-162
    • /
    • 2022
  • Relevance. Innovative activities in education should be aimed at ensuring the comprehensive development of the individual and professional development of students. The main idea of modular technology is that the student should learn by himself, and the teacher manages his learning activities. The advantage of modular technology is the ability of the teacher to design the study of the material in the most interesting and accessible forms for this part of the study group and at the same time achieve the best learning results. Innovative Moodle technology. it is gaining popularity every day, significantly expanding the space of teaching and learning, allowing students to study inter-faculty university programs in depth. The purpose of this study is to assess the quality of implementation of the e-learning system Moodle. The study was conducted at the South Ukrainian National Pedagogical University named after K. D. Ushinsky in order to identify barriers to the effective implementation of innovative distance learning technologies Moodle and introduce a new model that will have a positive impact on the development of e-learning. Methodology. The paper used a combination of theoretical and empirical research methods. These include: scientific analysis of sources on this issue, which allowed us to formulate the initial provisions of the study; analysis of the results of students 'educational activities; pedagogical experiment; questionnaires; monitoring of students' activities in practical classes. Results. This article evaluates the implementation of the principles of distance learning in the process of teaching and learning at the University in terms of quality. The experiment involved 1,250 students studying at the South Ukrainian National Pedagogical University named after K. D. Ushinsky. The survey helped to identify the main barriers to the effective implementation of modern distance learning technologies in the educational process of the University: the lack of readiness of teachers and parents, the lack of necessary skills in applying computer systems of online learning, the inability to interact with the teaching staff and teachers, the lack of a sufficient number of academic consultants online. In addition, internal problems are investigated: limited resources, unevenly distributed marketing advantages, inappropriate administrative structure, and lack of innovative physical capabilities. The article allows us to solve these problems by gradually implementing a distance learning model that is suitable for any university, regardless of its specialization. The Moodle-based e-learning system proposed in this paper was designed to eliminate the identified barriers. Models for implementing distance learning in the learning process were built according to the CAPDM methodology, which helps universities and other educational service providers develop and manage world-class online distance learning programs. Prospects for further research focus on evaluating students' knowledge and abilities over the next six months after the introduction of the proposed Moodle-based program.

A Study on the Application of Block Chain Technology on EVMS (EVMS 업무의 블록체인 기술 적용 방안 연구)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.39 no.2
    • /
    • pp.39-60
    • /
    • 2020
  • Block chain technology is one of the core elements for realizing the 4th industrial revolution, and many efforts have been made by government and companies to provide services based on block chain technology. In this study we analyzed the benefits of block chain technology for EVMS and designed EVMS block chain platform with increased data security and work efficiency for project management data, which are important assets in monitoring progress, foreseeing future events, and managing post-completion. We did the case studies on the benefits of block chain technology and then conducted the survey study on security, reliability, and efficiency of block chain technology, targeting 18 block chain experts and project developers. And then, we interviewed EVMS system operator on the compatibility between block chain technology and EVM Systems. The result of the case studies showed that block chain technology can be applied to financial, logistic, medical, and public services to simplify the insurance claim process and to improve reliability by distributing transaction data storage and applying security·encryption features. Also, our research on the characteristics and necessity of block chain technology in EVMS revealed the improvability of security, reliability, and efficiency of management and distribution of EVMS data. Finally, we designed a network model, a block structure, and a consensus algorithm model and combined them to construct a conceptual block chain model for EVM system. This study has the following contribution. First, we reviewed that the block chain technology is suitable for application in the defense sector and proposed a conceptual model. Second, the effect that can be obtained by applying block chain technology to EVMS was derived, and the possibility of improving the existing business process was derived.

A Design of Group Authentication by using ECDH based Group Key on VANET (VANET에서 ECDH 기반 그룹키를 이용한 그룹간 인증 설계)

  • Lee, Byung Kwan;Jung, Yong Sik;Jeong, Eun Hee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.7
    • /
    • pp.51-57
    • /
    • 2012
  • This paper proposes a group key design based on ECDH(Elliptic Curve Diffie Hellman) which guarantees secure V2V and V2I communication. The group key based on ECDH generates the VGK(Vehicular Group key) which is a group key between vehicles, the GGK(Global Group Key) which is a group key between vehicle groups, and the VRGK(Vehicular and RSU Group key) which is a group key between vehicle and RSUs with ECDH algorithm without an AAA server being used. As the VRGK encrypted with RGK(RSU Group Key) is transferred from the current RSU to the next RSU through a secure channel, a perfect forward secret security is provided. In addition, a Sybil attack is detected by checking whether the vehicular that transferred a message is a member of the group with a group key. And the transmission time of messages and the overhead of a server can be reduced because an unnecessary network traffic doesn't happen by means of the secure communication between groups.

Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment (U-Health환경에서 안전한 개인정보 관리를 위한 통합 인증스키마 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3865-3871
    • /
    • 2014
  • The U-health service provides medical services with patients anytime or anywhere and is defined as the service that combines information and communication technology with health and medical service. However, it causes some troubles, such as the disclosure of patients' medical information or data spills (personal information extrusion). Moreover, it has the weak point of the security threats associated with data based on existing wire-wireless systems because it conducts data transmission and reception through the network. Therefore, this paper suggests a safe personal information management system by designing integrated certification schema that will help compensate for the weaknesses of the U-health service. In the proposal, the protocols for user information, certification between medical institution and users, data communication encryption & decryption, and user information disuse were designed by applying the ID-Based Encryption, and analyzed such existing systems and PKI Based-based communication process, securely and safely.

두만강지역개발계획(RADP)에 관련된 동북아시아 지역 전력계통의 연계 및 안전성 강화방안

  • 윤갑구
    • Proceedings of the Korean Professional Engineer Association Conference
    • /
    • 1996.12a
    • /
    • pp.76-102
    • /
    • 1996
  • 북한은 전력부족난과 전기품질의 저하로 인하여 주요 생산기업에 지장을 주고 있으며, 노후 발전소의 성능저하도 함께 진행되고 있는 것으로 추정된다. 이에 대한 적절한 대책이 없는 한 그 상황은 더욱 악화될 전망이다. 한반도 에너지 개발기구(KEDO)가 추진하고 있는 경수로 원자력 발전기가 6~7년 후에 준공된다고 해도 이처럼 불안정한 전력계통에 병입되어 원활한 운전이 가능할런지 기대하기 곤란하다. 이러한 실정에서 \circled1 전력부족으로 주파수가 저하될 때 우선 순위가 낮은 부하를 제한하는 자동 부하제한 방식을 포함한 자동 주파수 제어 계통개선 \circled2 기존발전소 성능과 이용을 향상을 위한 재가동(Repowering) 등의 리 엔지니어링 \circled3 가스터빈 복합화력과 열병합발전(Co-generation) 등과 같이 건설기간이 짧고 비용이 적게 들며 송전 설비 건설도 불필요한 분산형 전원의 건설 \circled4 수력발전소와 조력발전소의 건설 \circled5 양수발전 등 전력에너지 저장설비의 개발 \circled6 송전전압격상과 배전방식개선 및 종합전력정보시스템 구축 \circled7 남ㆍ북한 전력계통 내지는 동북아시아 전력계통을 연계하는 평화망사업(Peace Network Project)등의 추진이 경수로 사업에 선행되어야 한다. 특히 러시아, 중국, 한국, 일본의 발전 에너지원 분포와 년간 부하곡선을 고려할 때 동북아시아 전력계통의 연계는 관련국 상호간에 에너지 환경과 경제적 측면에서 상당한 이득과 안정성을 강화해 줄 것이며, 기술발전과 평화공존에 크게 기여 할 것이다. 이를 위하여 관련국의 전력계통연계 전문가들이 참여하는 남\ulcorner북한전력 계통연계연합회(Co-Pia ; Co-rea Power Systems Interconnection Association)와 동북아지역전력 계통연합회(Near Pia=North-Eastern Asia Region Power Systems Interconnection Association)의 구성을 제안하는 바이다. 주요용어(Key Words): 자동주파수 제어(AFC), 리엔지니어링(Re-Engineering), 분산형 전원(Dispersed Generation System), 전력저장(Power Storage), 부하조절기(Load Conditioner), 수요관리(DSM) 연계(Interconnection), 인터시스템(Intersystem), 통합자원계획(IRP), 안전성 강화(Security Enhancement), 전력시장개방(Electricity Free Maket), 통일비용(Unification Expense, Unification Cost), 남ㆍ북한전력계통연계연합회(Co-Pia), 동북아지역전력 계통연계연합회(Nea,-Pia).

  • PDF

A study on Iris Recognition using Wavelet Transformation and Nonlinear Function

  • Hur, Jung-Youn;Truong, Le Xuan
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.553-559
    • /
    • 2004
  • In todays security industry, personal identification is also based on biometric. Biometric identification is performed basing on the measurement and comparison of physiological and behavioral characteristics, Biometric for recognition includes voice dynamics, signature dynamics, hand geometry, fingerprint, iris, etc. Iris can serve as a kind of living passport or living password. Iris recognition system is the one of the most reliable biometrics recognition system. This is applied to client/server system such as the electronic commerce and electronic banking from stand-alone system or networks, ATMs, etc. A new algorithm using nonlinear function in recognition process is proposed in this paper. An algorithm is proposed to determine the localized iris from the iris image received from iris input camera in client. For the first step, the algorithm determines the center of pupil. For the second step, the algorithm determines the outer boundary of the iris and the pupillary boundary. The localized iris area is transform into polar coordinates. After performing three times Wavelet transformation, normalization was done using sigmoid function. The converting binary process performs normalized value of pixel from 0 to 255 to be binary value, and then the converting binary process is compare pairs of two adjacent pixels. The binary code of the iris is transmitted to the by server. the network. In the server, the comparing process compares the binary value of presented iris to the reference value in the University database. Process of recognition or rejection is dependent on the value of Hamming Distance. After matching the binary value of presented iris with the database stored in the server, the result is transmitted to the client.

  • PDF

Intrusion Detection Learning Algorithm using Adaptive Anomaly Detector (적응형 변형 인식부를 이용한 침입 탐지 학습알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won;Kim, Young-Soo;Lee, Se-Yul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.451-456
    • /
    • 2004
  • Signature based intrusion detection system (IDS), having stored rules for detecting intrusions at the library, judges whether new inputs are intrusion or not by matching them with the new inputs. However their policy has two restrictions generally. First, when they couldn't make rules against new intrusions, false negative (FN) errors may are taken place. Second, when they made a lot of rules for maintaining diversification, the amount of resources grows larger proportional to their amount. In this paper, we propose the learning algorithm which can evolve the competent of anomaly detectors having the ability to detect anomalous attacks by genetic algorithm. The anomaly detectors are the population be composed of by following the negative selection procedure of the biological immune system. To show the effectiveness of proposed system, we apply the learning algorithm to the artificial network environment, which is a computer security system.