• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.023 seconds

Civil legal relations in the context of adaptation of civil legislation to the legislation of the EU countries in the digital age

  • Kizlova, Olena;Safonchyk, Oksana;Hlyniana, Kateryna;Mazurenko, Svetlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.521-525
    • /
    • 2021
  • An essential area is the creation of a single digital market between the EU and Ukraine through information technology. Purpose: to investigate and analyze civil law relations in the field of adaptation of Ukrainian civil law to civil law regulations of the EU. The object of research: Ukrainian civil law and civil law of the EU. The subject of the study is civil law in the context of adaptation of civil law to the legislation of the EU. The following methods of scientific cognition were used during the research: semantic, historical, comparison, analysis and synthesis, generalization. The results of the study show that the harmonization of the legal system of Ukraine with EU law is caused by several goals: successful integration of Ukraine into the EU, legal reforms based on the positive example of EU countries, promoting access of Ukrainian enterprises to the EU market; attracting foreign investment, increasing the welfare of Ukrainian citizens. The adaptation includes three stages, the final of which is the preparation of an expanded program of harmonization of Ukrainian legislation with EU legislation. In the process of adaptation, it is important to take into account the legal history, tradition, features and mentality of Ukraine and before borrowing legal structures to analyze the feasibility of their application in the Ukrainian legal field.

The Study of Selecting a Test Area for Validating the Proposal Specification of InSAS(Interferometric Synthetic Aperture Sonar) (간섭계측 합성개구소나 성능 평가를 위한 해상 시험장 선정에 관한 연구)

  • Park, Yosup;Kim, Seong Hyeon;Koh, Jieun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.329-338
    • /
    • 2022
  • This paper provides a case study of development testing and evaluation of design goal of Interferometric SAS (Synthetic Aperture Sonar) system that is developing supported by Civil-Military Technology Cooperation Center in offshore fields. For Deep water operating capabilities evaluation, We have surveyed candidate field, bathymetric mapping and target identification over 200 m depth, East Sea. In testing phase, We have provided environmental information of testing field include water column, seabed and weather condition in real time. And to compare excellency of developing InSAS, we have gather commercial imaging sonar system data with same target. This case study will support the Test Readiness Review of future underwater surveillance system developing via investigate marine testing field environment, testing facilities and planning.

Impact of Artificial Intelligence on the Development of Art Projects: Opportunities and Limitations

  • Zheng, Xiang;Xiong, Jinghao;Cao, Xiaoming;Nazarov, Y.V.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.343-347
    • /
    • 2022
  • To date, the use of artificial intelligence has already brought certain results in such areas of art as poetry, painting, and music. The development of AI and its application in the creative process opens up new perspectives, expanding the capabilities of authors and attracting a new audience. The purpose of the article is to analyze the essential, artistic, and technological limitations of AI art. The article discusses the methods of attracting AI to artistic practices, carried out a comparative analysis of the methods of using AI in visual art and in the process of writing music, identified typical features in the creative interaction of the author of a work of art with AI. The basic principles of working with AI have been determined based on the analysis of ways of using AI in visual art and music. The importance of neurobiology mechanisms in the course of working with AI has been determined. The authors conclude that art remains an area in which AI still cannot replace humans, but AI contributes to the further formation of methods for modifying and rethinking the data obtained into innovative art projects.

Secure Device to Device Communications using Lightweight Cryptographic Protocol

  • Ajith Kumar, V;Reddy, K Satyanarayan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.354-362
    • /
    • 2021
  • The device to device (D2D) communication is an important and emerging area for future cellular networks. It is concerned about all aspect of secure data transmission between end devices along with originality of the data. In this paradigm, the major concerns are about how keys are delivered between the devices when the devices require the cryptographic keys. Another major concern is how effectively the receiver device verifies the data sent by the sender device which means that the receiver checks the originality of the data. In order to fulfill these requirements, the proposed system able to derive a cryptographic key using a single secret key and these derived keys are securely transmitted to the intended receiver with procedure called mutual authentication. Initially, derived keys are computed by applying robust procedure so that any adversary feel difficulties for cracking the keys. The experimental results shows that both sender and receiver can identify themselves and receiver device will decrypt the data only after verifying the originality of the data. Only the devices which are mutually authenticated each other can interchange the data so that entry of the intruder node at any stage is not possible.

An Enhanced Neural Network Approach for Numeral Recognition

  • Venugopal, Anita;Ali, Ashraf
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.61-66
    • /
    • 2022
  • Object classification is one of the main fields in neural networks and has attracted the interest of many researchers. Although there have been vast advancements in this area, still there are many challenges that are faced even in the current era due to its inefficiency in handling large data, linguistic and dimensional complexities. Powerful hardware and software approaches in Neural Networks such as Deep Neural Networks present efficient mechanisms and contribute a lot to the field of object recognition as well as to handle time series classification. Due to the high rate of accuracy in terms of prediction rate, a neural network is often preferred in applications that require identification, segmentation, and detection based on features. Neural networks self-learning ability has revolutionized computing power and has its application in numerous fields such as powering unmanned self-driving vehicles, speech recognition, etc. In this paper, the experiment is conducted to implement a neural approach to identify numbers in different formats without human intervention. Measures are taken to improve the efficiency of the machines to classify and identify numbers. Experimental results show the importance of having training sets to achieve better recognition accuracy.

A Systematic Mapping Study on Artificial Intelligence Tools Used in Video Editing

  • Bieda, Igor;Panchenko, Taras
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.312-318
    • /
    • 2022
  • From the past two eras, artificial intelligence has gained the attention of researchers of all research areas. Video editing is a task in the list that starts leveraging the blessing of Artificial Intelligence (AI). Since AI promises to make technology better use of human life although video editing technology is not new yet it is adopting new technologies like AI to become more powerful and sophisticated for video editors as well as users. Like other technologies, video editing will also be facilitated by the majestic power of AI in near future. There has been a lot of research that uses AI in video editing, yet there is no comprehensive literature review that systematically finds all of this work on one page so that new researchers can find research gaps in that area. In this research we conducted a statically approach called, systematic mapping study, to find answers to pre-proposed research questions. The aim and objective of this research are to find research gaps in our topic under discussion.

A Cost-Effective Land Surveying System for Engineering Applications

  • El-Ashmawy, Khalid L.A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.373-380
    • /
    • 2022
  • The field of land surveying is changing dramatically due to the way data is processed, analyzed and presented. Also, there is a growing demand for digital spatial information, coming primarily from the GIS (Geographical Information System) user community. Such a demand has created a strong development potential for a new land surveying software. An overview of the development and capabilities of a land surveying software platform based on the Windows system, SurveyingMap, is presented. Among its many features, SurveyingMap provides a lot of adaptability for networks adjustment, geodetic and plane coordinates transformation, contouring, sectioning, DTM (Digital Terrain Model) generation, and large scale mapping applications. The system output is compatible with well known computer aided drafting (CAD) /GIS packages to expand its scope of applications. SurveyingMap is also suitable for non-technical users due to the user-friendly graphic user interface. The system could be used in engineering, architecture, GIS, and academic teaching and research, among other fields. Two applications of SurveyingMap, extension of field control and large scale mapping, for the case study area are established. The results demonstrate that the system is adaptable and reasonably priced for use by college and university students.

Binary Classification of Hypertensive Retinopathy Using Deep Dense CNN Learning

  • Mostafa E.A., Ibrahim;Qaisar, Abbas
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.98-106
    • /
    • 2022
  • A condition of the retina known as hypertensive retinopathy (HR) is connected to high blood pressure. The severity and persistence of hypertension are directly correlated with the incidence of HR. To avoid blindness, it is essential to recognize and assess HR as soon as possible. Few computer-aided systems are currently available that can diagnose HR issues. On the other hand, those systems focused on gathering characteristics from a variety of retinopathy-related HR lesions and categorizing them using conventional machine-learning algorithms. Consequently, for limited applications, significant and complicated image processing methods are necessary. As seen in recent similar systems, the preciseness of classification is likewise lacking. To address these issues, a new CAD HR-diagnosis system employing the advanced Deep Dense CNN Learning (DD-CNN) technology is being developed to early identify HR. The HR-diagnosis system utilized a convolutional neural network that was previously trained as a feature extractor. The statistical investigation of more than 1400 retinography images is undertaken to assess the accuracy of the implemented system using several performance metrics such as specificity (SP), sensitivity (SE), area under the receiver operating curve (AUC), and accuracy (ACC). On average, we achieved a SE of 97%, ACC of 98%, SP of 99%, and AUC of 0.98. These results indicate that the proposed DD-CNN classifier is used to diagnose hypertensive retinopathy.

Breast Cancer Detection with Thermal Images and using Deep Learning

  • Amit Sarode;Vibha Bora
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.91-94
    • /
    • 2023
  • According to most experts and health workers, a living creature's body heat is little understood and crucial in the identification of disorders. Doctors in ancient medicine used wet mud or slurry clay to heal patients. When either of these progressed throughout the body, the area that dried up first was called the infected part. Today, thermal cameras that generate images with electromagnetic frequencies can be used to accomplish this. Thermography can detect swelling and clot areas that predict cancer without the need for harmful radiation and irritational touch. It has a significant benefit in medical testing because it can be utilized before any observable symptoms appear. In this work, machine learning (ML) is defined as statistical approaches that enable software systems to learn from data without having to be explicitly coded. By taking note of these heat scans of breasts and pinpointing suspected places where a doctor needs to conduct additional investigation, ML can assist in this endeavor. Thermal imaging is a more cost-effective alternative to other approaches that require specialized equipment, allowing machines to deliver a more convenient and effective approach to doctors.

자동차 스마트키 시스템 보안 연구 동향

  • Kyungho Joo;Wonsuk Choi;Dong Hoon Lee
    • Review of KIISC
    • /
    • v.33 no.4
    • /
    • pp.13-22
    • /
    • 2023
  • Controller area network (CAN) 네트워크로 대표되는 자동차 내부네트워크와 비교하여 자동차 스마트키 시스템은 상대적으로 소수의 연구가 진행되어오고 있다. 하지만, 현실 세계에서는 스마트키 시스템의 취약점으로 인해 많은 피해사례가 발생하고 있다. 대표적으로, 2010년 NDSS 학회에 소개된 신호 중계 공격 (signal relay attack)은 현재까지도 수많은 자동차 절도 사건들에 악용되고 있다. 이와 같은 문제를 근본적으로 해결하기 위해 초광대역 통신(ultra-wideband communication, UWB)을 사용한 디지털 키 (Digital Key) 기술이 일부 최신 자동차들에 탑재되고 있다. 하지만, 2022년USENIX Security 학회에서 애플, 삼성과 같은 글로벌 기업이 채택한 high rate pulse repetition frequency (HRP) UWB 측위 시스템에 대한 거리 단축 공격 (distance reduction attack)이 가능함이 소개되었다. 이는 디지털 키 시스템 또한 신호중계 공격과 같은 보안 위협에 노출될 수 있다는 점을 시사한다. 본 논문에서는 자동차 스마트키 시스템을 대상으로 수행된 공격 연구 사례들을 살펴본다. 먼저, remote keyless entry (RKE) 시스템 및 passive keyless entry and start (PKES) 시스템으로 대표되는 기존 스마트키 시스템을 대상으로 하는 보안 위협에 대해 살펴본다. 다음으로 차세대 스마트키 시스템으로 주목받고 있는 디지털키 시스템을 구성하는 초광대역 통신기술의 동작 원리 및 이에 대한 보안위협 연구 동향을 살펴본다.