• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.022 seconds

Use of Visual Digital Media to Develop Creativity: The Example of Video Games

  • V., Zabolotnyuk;S., Khrypko;I., Ostashchuk;D., Chornomordenko;A., Timchenko;T., Motruk;K., Pasko;O., Lobanchuk
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.13-18
    • /
    • 2022
  • In the post-information era, most of technologies have a visual part, or at least some functions related to visualization. It is also one of the popular means of presenting materials in education area. However, despite its popularity, the impact of visualization on the effectiveness of learning still remains controversial. Even more controversial is its usefulness in developing creativity, which is one of the most important skills for today's employee. The authors considered the use of visualization as a tool for the development of children's creativity on the example of learning video games, in particular, ClassCraft to distinguish features that, from the point of view of psychology, may lead to developing creativity even being not useful for educational purposes. It is concluded that video games useful for learning may have features, that are inappropriate in formal educational context, but important to develop creative thinking.

Rediscovery of the Arctic: A New Arena of Competition for Natural Resources in the 21st Century? (북극의 재발견: 국제 자원경쟁의 새로운 각축장?)

  • Lee, Seo-Hang
    • Strategy21
    • /
    • s.30
    • /
    • pp.200-235
    • /
    • 2012
  • Over the past few years, due to the climate change of the earth, the Arctic's sea ice cover is undergoing a historic transformation - thinning, extent reduction in all seasons, and mitigation in the area of multi-year ice in the central Arctic Ocean. These changes allow for increases in maritime access throughout the Arctic Ocean and for potential longer seasons of navigation and possibly transarctic voyage in the summer. These changes also allow more exploration for oil, gas, and other minerals. The Arctic is now an archetype of the complex, multi-dimensional global problems of the twenty-first century. Military security, environmental security, and economic security interact. The potentially enormous economic stakes, sufficient to change the strategic balance among the states of the region, set off competitive pressures for national advantage. Korea, which is heavily dependent upon the sea lane in terms of transportation of its exports and imports, is very much interested in the Arctic sea routes. Korea believes that the Artic sea route, particularly the Northern Sea Route (NSR), could serve as a new useful sea lane, which will enable shorter times between East Asia and Europe, thus resulting in substantial cost saving for ship operators. In addition to shipping, Korea is interested in other Arctic-related maritime industries. Korea, as a leading shipbuilder in the global market, is interested in building ice breakers, drill ships, and other vessels which can contribute to safe operation in Arctic resource development and exploration. Korea, as one of the future stakeholders in Arctic maritime activities, should be ready to foster international cooperation in the region.

  • PDF

Adversarial Attacks and Defense Strategy in Deep Learning

  • Sarala D.V;Thippeswamy Gangappa
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.127-132
    • /
    • 2024
  • With the rapid evolution of the Internet, the application of artificial intelligence fields is more and more extensive, and the era of AI has come. At the same time, adversarial attacks in the AI field are also frequent. Therefore, the research into adversarial attack security is extremely urgent. An increasing number of researchers are working in this field. We provide a comprehensive review of the theories and methods that enable researchers to enter the field of adversarial attack. This article is according to the "Why? → What? → How?" research line for elaboration. Firstly, we explain the significance of adversarial attack. Then, we introduce the concepts, types, and hazards of adversarial attack. Finally, we review the typical attack algorithms and defense techniques in each application area. Facing the increasingly complex neural network model, this paper focuses on the fields of image, text, and malicious code and focuses on the adversarial attack classifications and methods of these three data types, so that researchers can quickly find their own type of study. At the end of this review, we also raised some discussions and open issues and compared them with other similar reviews.

Cyber Threat and Vulnerability Analysis-based Risk Assessment for Smart Ship

  • Jeoungkyu Lim;Yunja Yoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.3
    • /
    • pp.263-274
    • /
    • 2024
  • The digitization of ship environments has increased the risk of cyberattacks on ships. The smartization and automation of ships are also likely to result in cyber threats. The International Maritime Organization (IMO) has discussed the establishment of regulations at the autonomous level and has revised existing agreements by dividing autonomous ships into four stages, where stages 1 and 2 are for sailors who are boarding ships while stages 3 and 4 are for those not boarding ships. In this study, the level of a smart ship was classified into LEVELs (LVs) 1 to 3 based on the autonomous levels specified by the IMO. Furthermore, a risk assessment for smart ships at various LVs in different risk scenarios was conducted The cyber threats and vulnerabilities of smart ships were analyzed by dividing them into administrative, physical, and technical security; and mitigation measures for each security area were derived. A total of 22 cyber threats were identified for the cyber asset (target system). We inferred that the higher the level of a smart ship, the greater the hyper connectivity and the remote access to operational technology systems; consequently, the greater the attack surface. Therefore, it is necessary to apply mitigation measures using technical security controls in environments with high-level smart ships.

A Prediction Triage System for Emergency Department During Hajj Period using Machine Learning Models

  • Huda N. Alhazmi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.11-23
    • /
    • 2024
  • Triage is a practice of accurately prioritizing patients in emergency department (ED) based on their medical condition to provide them with proper treatment service. The variation in triage assessment among medical staff can cause mis-triage which affect the patients negatively. Developing ED triage system based on machine learning (ML) techniques can lead to accurate and efficient triage outcomes. This study aspires to develop a triage system using machine learning techniques to predict ED triage levels using patients' information. We conducted a retrospective study using Security Forces Hospital ED data, from 2021 through 2023 during Hajj period in Saudia Arabi. Using demographics, vital signs, and chief complaints as predictors, two machine learning models were investigated, naming gradient boosted decision tree (XGB) and deep neural network (DNN). The models were trained to predict ED triage levels and their predictive performance was evaluated using area under the receiver operating characteristic curve (AUC) and confusion matrix. A total of 11,584 ED visits were collected and used in this study. XGB and DNN models exhibit high abilities in the predicting performance with AUC-ROC scores 0.85 and 0.82, respectively. Compared to the traditional approach, our proposed system demonstrated better performance and can be implemented in real-world clinical settings. Utilizing ML applications can power the triage decision-making, clinical care, and resource utilization.

Experimental Research on the Optimal Surveillance Equipment Allocation Using Geo-spatial Information (지형공간 정보를 이용한 감시장비 배치 최적화 실험 연구)

  • Lee, Yong-Woong;Sung, Chang-Sup;Yang, Woo-Suk;Im, Seong-Bin;Eo, Yang-Dam
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.1 s.24
    • /
    • pp.72-79
    • /
    • 2006
  • This study was focused on analyzing mathematical model for optimal allocation of surveillance equipment which is operated on the natural geographical condition, such as DMZ fence area. Optimal allocation algorithm was studied for the equipment to develop the whole surveillance and watch model for the two area as testing. Also 3D visualization program was developed to display and analyze the detecting effect. The results show that our suggested model will be available for enhancing security condition on the watching area.

A Practical Authentication System for Wireless Body Area Networks(WBAN) (무선 인체 영역 네트워크(WBAN)를 위한 실용적인 인증 시스템)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4C
    • /
    • pp.290-296
    • /
    • 2012
  • In this paper, we propose a practical authentication system based on Wireless Body Area Networks(WBAN) for U-healthcare medical information environments. The proposed authentication system is based on symmetric cryptosystem such as AES and is designed to not only provide security such as data secrecy, data authentication, data integrity, but also prevent replay attack by adopting timestamp technique and perform secure authentication between sensor node, master node, base-station, and medical server.

A Study on the Prospect of Customs Free Zone in Korea (우리나라의 관세자유지역의 전망에 관한 연구)

  • 김용진
    • Journal of Korea Port Economic Association
    • /
    • v.19 no.2
    • /
    • pp.141-158
    • /
    • 2003
  • There are several Customs Free Zone in Korea. Those are Susan Port, Kwangyang Port, Inchun Port. and International Airport Inchun. And there are several zone which will be appointed soon, Busan Port area, Kwangyang Port area, Inchun Port and International Airport Inchun area. But there are many problems to operate CFZ in Korea. This paper aim at pointing out for the problems and drawing up the plan. The problems are an unreasonable incentive standard, security of the behind site related to CFZ, present customs law not to process and assemble, and several similar system related CFZ. Globalization and regionalization are major trends in the international economic system recently. So we have to make desperate efforts to win the severe competition among many countries in economic aspect and make a good plan to solve the problems related CFZ in future.

  • PDF

Detection of Skin Pigmentation using Independent Component Analysis

  • Yang, Liu;Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • This paper presents an approach for detecting and measuring human skin pigmentation. In the proposed scheme, we extract a skin area by a Gaussian skin color model that is estimated from the statistical analysis of training images and remove tiny noises through the morphology processing. A skin area is decomposed into two components of hemoglobin and melanin by an independent component analysis (ICA) algorithm. Then, we calculate the intensities of hemoglobin and melanin by using the location histogram and determine the existence of skin pigmentation according to the global and local distribution of two intensities. Furthermore, we measure the area and density of the detected skin pigmentation. Experimental results verified that our scheme can both detect the skin pigmentation and measure the quantity of that and also our scheme takes less time because of the location histogram.

TF-CPABE: An efficient and secure data communication with policy updating in wireless body area networks

  • Chandrasekaran, Balaji;Balakrishnan, Ramadoss;Nogami, Yasuyuki
    • ETRI Journal
    • /
    • v.41 no.4
    • /
    • pp.465-472
    • /
    • 2019
  • The major challenge in wireless body area networks (WBAN) is setting up a protected communication between data consumers and a body area network controller while meeting the security and privacy requirements. This paper proposes efficient and secure data communication in WBANs using a Twofish symmetric algorithm and ciphertext-policy attribute-based encryption with constant size ciphertext; in addition, the proposed scheme incorporates policy updating to update access policies. To the best of the author's knowledge, policy updating in WBAN has not been studied in earlier works. The proposed scheme is evaluated in terms of message size, energy consumption, and computation cost, and the results are compared with those of existing schemes. The result shows that the proposed method can achieve higher efficiency than conventional methods.