• Title/Summary/Keyword: Security Area

Search Result 1,697, Processing Time 0.032 seconds

Modeling and Simulation of the Photocatalytic Treatment of Wastewater using Natural Bauxite and TiO2 doped by Quantum Dots

  • Becheikh, Nidhal;Eladeb, Aboulbaba;Ghazouani, Nejib
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.91-96
    • /
    • 2022
  • The photocatalytic degradation of salicylic acid takes place in several stages involving coupled phenomena, such as the transport of molecules and the chemical reaction. The systems of transport equations and the photocatalytic reaction are numerically solved using COMSOL Mutiphysics (CM) simulation software. CM will make it possible to couple the phenomena of flow, the transport of pollutants (salicylic acid) by convection and diffusion, and the chemical reaction to the catalytic area (bauxite or TiO2 doped by nanoparticles). The simulation of the conversion rate allows to correctly fit the experimental results. The temporal simulation shows that the reaction reaches equilibrium after a transitional stage lasting over one minute. The outcomes of the study highlight the importance of diffusion in the boundary layer and the usefulness of injecting micro-agitation into the microchannel flow. Under such conditions, salicylic acid degrades completely.

Examination of Required Functions in the PBNM Scheme for Multiple Domains as Cyber Physical System that Utilizes Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.31-38
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, required functions in the PBNM Scheme for multiple domains as cyber physical system that utilizes data science and AI is examined.

A Quantitative Approach for Data Visualization in Human Resource Management

  • Bandar Abdullah AlMobark
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.133-139
    • /
    • 2023
  • As the old saying goes "a picture is worth a thousand words" data visualization is essential in almost every industry. Companies make Data-driven decisions and gain insights from visual data. However, there is a need to investigate the role of data visualization in human resource management. This review aims to highlight the power of data visualization in the field of human resources. In addition, visualize the latest trends in the research area of human resource and data visualization by conducting a quantitative method for analysis. The study adopted a literature review on recent publications from 2017 to 2022 to address research questions.

Technology Trends in Biometric Cryptosystem Based on Electrocardiogram Signals (심전도(Electrocardiogram) 신호를 이용한 생체암호시스템 기술 동향)

  • B.H. Chung;H.C. Kwon;J.G. Park
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.5
    • /
    • pp.61-70
    • /
    • 2023
  • We investigated technological trends in an electrocardiogram (ECG)-based biometric cryptosystem that uses physiological features of ECG signals to provide personally identifiable cryptographic key generation and authentication services. The following technical details of the cryptosystem were investigated and analyzed: preprocessing of ECG signals, extraction of personally identifiable features, generation of quantified encryption keys from ECG signals, reproduction of ECG encryption keys under time-varying noise, and new security applications based on ECG signals. The cryptosystem can be used as a security technology to protect users from hacking, information leakage, and malfunctioning attacks in wearable/implantable medical devices, wireless body area networks, and mobile healthcare services.

FinTech in Saudi Arabia: A User Experience Aanalysis of FinTech Platforms

  • Abdulhadi M. Eidaroos
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.177-185
    • /
    • 2023
  • The global FinTech industry has experienced significant growth, with key projects developing the financial sector. In Saudi Arabia, startups have used technology to offer FinTech services. In this area, it is important to investigate the usability of platforms that offer FinTech services. This research aims to examine the usability of samples of Saudi FinTech websites and identify design issues impacting user experience. Usability testing was conducted on the websites of two FinTech firms identified design issues, including navigation problems on the homepage and a lack of transparency in displaying investment details, negatively impacting end users. Employing usability methods can assist in enhancing the development of FinTech platforms and addressing these issues. This study contributes to a deeper understanding of FinTech usability problems and the user experience, enabling advancements in the industry.

Classification for Imbalanced Breast Cancer Dataset Using Resampling Methods

  • Hana Babiker, Nassar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.89-95
    • /
    • 2023
  • Analyzing breast cancer patient files is becoming an exciting area of medical information analysis, especially with the increasing number of patient files. In this paper, breast cancer data is collected from Khartoum state hospital, and the dataset is classified into recurrence and no recurrence. The data is imbalanced, meaning that one of the two classes have more sample than the other. Many pre-processing techniques are applied to classify this imbalanced data, resampling, attribute selection, and handling missing values, and then different classifiers models are built. In the first experiment, five classifiers (ANN, REP TREE, SVM, and J48) are used, and in the second experiment, meta-learning algorithms (Bagging, Boosting, and Random subspace). Finally, the ensemble model is used. The best result was obtained from the ensemble model (Boosting with J48) with the highest accuracy 95.2797% among all the algorithms, followed by Bagging with J48(90.559%) and random subspace with J48(84.2657%). The breast cancer imbalanced dataset was classified into recurrence, and no recurrence with different classified algorithms and the best result was obtained from the ensemble model.

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

Data Visualization and Visual Data Analytics in ITSM

  • Donia Y. Badawood
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.68-76
    • /
    • 2023
  • Nowadays, the power of data analytics in general and visual data analytics, in particular, have been proven to be an important area that would help development in any domain. Many well-known IT services best practices have touched on the importance of data analytics and visualization and what it can offer to information technology service management. Yet, little research exists that summarises what is already there and what can be done to utilise further the power of data analytics and visualization in this domain. This paper is divided into two main parts. First, a number of IT service management tools have been summarised with a focus on the data analytics and visualization features in each of them. Second, interviews with five senior IT managers have been conducted to further understand the usage of these features in their organisations and the barriers to fully benefit from them. It was found that the main barriers include a lack of good understanding of some visualization design principles, poor data quality, and limited application of the technology and shortage in data analytics and visualization expertise.

Architecture for Integrated Processing and Managing Smart Factory IT and OT Area Data (스마트팩토리 IT 및 OT 영역 내 보안위협 관련 데이터 통합 처리 및 관리 아키텍처)

  • In-Su Jung;Deuk-Hun Kim;Jin Kwak
    • Annual Conference of KIPS
    • /
    • 2023.11a
    • /
    • pp.158-161
    • /
    • 2023
  • 스마트팩토리는 기존 제조산업과 ICT(Information & Communication Technology)가 융합된 지능형 공장이다. 이는 직접적인 제조공정 과정이 수행되는 OT(Operational Technology) 영역(0~3계층)과 전사업무 관리를 수행하는 IT(Information Technology) 영역(4~5계층)으로 구분되며, 각 영역과 계층이 연결되어 제조·물류·유통 과정의 자동화 및 지능화를 제공한다. 그러나 각 영역과 계층이 연결됨에 따라 보안위협 벡터가 증가하고 있으며, 다영역·다계층 환경인 스마트팩토리에 적합한 대응체계 연구를 위해 영역별 보안위협 관련 데이터를 통합하여 처리 및 관리하는 아키텍처 연구가 필요한 실정이다. 이에 따라 본 논문에서는 스마트팩토리 환경 내 IT 및 OT 영역 장치를 식별하고 보안위협 관련 데이터 통합 처리 및 관리를 위한 아키텍처를 제안한다.

Design and Optimization of Four Element Triangular Dielectric Resonator Antenna using PSO Algorithm for Wireless Applications

  • Dasi swathi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.67-72
    • /
    • 2023
  • This paper portrays the design and optimization of a wideband four element triangular dielectric resonator antenna (TDRA) using PSO. The proposed antenna's radiation characteristics were extracted using Ansoft HFSS software. At a resonant frequency of 5-7 GHz, the four element antenna provides nearly 21 percent bandwidth and the optimized gives 5.82 dBi peak gain. The radiation patterns symmetry and uniformity are maintained throughout the operating bandwidth. for WLAN (IEEE 802.16) and WiMAX applications, the proposed antenna exhibits a consistent symmetric monopole type radiation pattern with low cross polarisation. The proposed antenna's performance was compared to that of other dielectric resonator antenna (DRA) shapes, and it was discovered that the TDRA uses a lot less radiation area to provide better performance than other DRA shapes and PSO optimized antenna increases the gain of the antenna