• Title/Summary/Keyword: Security Benefit

Search Result 264, Processing Time 0.019 seconds

Cybercrime in the Economic Space: Psychological Motivation and Semantic-Terminological Specifics

  • Matveev, Vitaliy;Eduardivna, Nykytchenko Olena;Stefanova, Nataliia;Khrypko, Svitlana;Ishchuk, Alla;Ishchuk, Olena;Bondar, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.135-142
    • /
    • 2021
  • The article reveals the essence of cybercrime, approaches to understanding this concept, classification of cybercrime, and other illegal acts in this area. The concept of cybercrime has multi-discourse nature and a certain legal uncertainty. Cybercrimes, their forms and types are analyzed in the economic context. The research vocabulary of the economic industry is defined. The scope and content of concepts denoted by the terms of the sphere covered by cybercrime are studied, and its types and forms are analyzed. The article studies problems, achievements, and prospects of resisting and combating cybercrime during the development of the civil information society and Ukraine's entry into the global information space. The study focuses on the economic motivation of most cybercrimes since some material benefit from the fact of cyber offenses is assumed directly or indirectly.

An Empirical Investigation of Vendor Readiness to Assess Offshore Software Maintenance Outsourcing Project

  • Ikram, Atif;Jalil, Masita Abdul;Ngah, Amir Bin;Khan, Ahmad Salman;Mahmood, Yasir
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.229-235
    • /
    • 2022
  • The process of correcting, upgrading, and improving software products after they have been handed over to the consumer is known as software maintenance. Offshore software maintenance outsourcing (OSMO) clients benefit from cost savings, time savings, and improved quality software through OSMO. In most circumstances, the OSMO vendor makes a lot of money but not in all the cases. Especially, when the OSMO project offer is not properly assessed. An efficient outsourcing contract might yield successful outcomes for outsourced projects. But before sending a detailed proposal to bid on the OSMO project the vendor must have to assess the client's project (business offer) requirements. The purpose of this study is to find out common trends within the assessment of a OSMO project. A case study approach along with semi-structured interviews from eight companies concluded ten common practices and several roles. Among these practices, four (code structure, requirements, communication barriers and required infrastructure) were consistent amongst the responses .The findings, limitations and future work are discussed.

DetGas: A Carbon Monoxide Gas Leakage Detector Mobile Application

  • Kamaruddin, Farhan Fikri Mohd;Hadiana, Ana;Lokman, Anitawati Mohd
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.59-66
    • /
    • 2021
  • Many incidents of Carbon Monoxide (CO) poisoning have occurred because of people being unaware of its presence. There are currently available systems on the market, but they are limited to measuring CO in a certain area and lack vital functions. Additionally, little to no evidence-based information on their quality was available. Thus, a mobile application for detecting CO gas leakage in a vehicle and critical features to assist victims was developed. A usability and functionality test were conducted to determine the product's quality utilizing nine usability and six functionality task scenarios (n=5). Then, a System Usability Scale test was performed to obtain system satisfaction, usability, and learnability (n=50). The usability and functionality test shows that all the tasks given for both tests were 100% successful. The overall score obtained for SUS was 71.4, which indicates good acceptance and usability. Around 20% of respondents claimed that they would need the support of a technical person to be able to use the application and that they needed to learn a lot of things before they could use the application, which indicates the overall high learnability of the application. The result provides empirical evidence that the CO gas leakage detection mobile application is successful and receives good usability, functionality, acceptability, learnability, and satisfaction assessments. DetGas could benefit automobile owners and other stakeholders by mitigating the risk and harm associated with gas leaking that exceeds the safe limit.

Blockchain-based e-Agro Intelligent System

  • Srinivas, V. Sesha;Pompapathi, M.;Rao, G. Srinivasa;Chaitanya, Smt. M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.347-351
    • /
    • 2022
  • Farmers E-Market is a website that allows agricultural workers to direct market their products to buyers without the use of a middleman. That theory is blockchain system will be used by authors to accomplish this. The system, which is built on a public blockchain system, supports sustainability, shippers, and consumers. Farmers can keep track of their farming activities. Customers can review the product's history and track its journey through carriers to delivery after making a purchase. Farmers are encouraged to get information about their interests promptly in a blockchain-enabled system like this. This functionality is being used by small-scale farmers to form groups based on their location to attract large-scale customers, renegotiate farming techniques or volumes, and enter into contracts with buyers. The analysis shows the use of blockchain technology with a farmer's portal that keeps the video of trading data of crops, taking into account the qualities of blockchain such as values and create or transaction data. The proposal merges python as a programming language with a blockchain system to benefit farmers, vendors, and individuals by preserving transactions.

Potential of Digital Solutions in the Manufacturing Sector of the Russian Economy

  • Baurina, Svetlana;Pashkovskaya, Margarita;Nazarova, Elena;Vershinina, Anna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.333-339
    • /
    • 2022
  • The purpose of the article is to identify priority trends of technological innovations and strategic opportunities for using the smart potential to the benefit of the Russian industrial production development in the context of digital transformation. The article substantiates the demand for technological process automation at industrial enterprises in Russia and considers the possibilities of using artificial intelligence and the implementation of smart manufacturing in the industry. The article reveals the priorities of the leading Russian industrial companies in the field of digitalization, namely, an expansion of the use of cloud technologies, predictive analysis, IaaS services (virtual data storage and processing centers), supervisory control, and data acquisition (SCADA), etc. The authors give the characteristics of the monitoring of the smart manufacturing systems development indicators in the Russian Federation, conducted by Rosstat since 2020; presents projected data on the assessment of the required resources in relation to the instruments of state support for the development of smart manufacturing technologies for the period until 2024. The article determines targets for the development of smart technologies within the framework of the Federal Project "Digital Technologies".

Application of Deep Learning: A Review for Firefighting

  • Shaikh, Muhammad Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.73-78
    • /
    • 2022
  • The aim of this paper is to investigate the prevalence of Deep Learning in the literature on Fire & Rescue Service. It is found that deep learning techniques are only beginning to benefit the firefighters. The popular areas where deep learning techniques are making an impact are situational awareness, decision making, mental stress, injuries, well-being of the firefighter such as his sudden fall, inability to move and breathlessness, path planning by the firefighters while getting to an fire scene, wayfinding, tracking firefighters, firefighter physical fitness, employment, prediction of firefighter intervention, firefighter operations such as object recognition in smoky areas, firefighter efficacy, smart firefighting using edge computing, firefighting in teams, and firefighter clothing and safety. The techniques that were found applied in firefighting were Deep learning, Traditional K-Means clustering with engineered time and frequency domain features, Convolutional autoencoders, Long Short-Term Memory (LSTM), Deep Neural Networks, Simulation, VR, ANN, Deep Q Learning, Deep learning based on conditional generative adversarial networks, Decision Trees, Kalman Filters, Computational models, Partial Least Squares, Logistic Regression, Random Forest, Edge computing, C5 Decision Tree, Restricted Boltzmann Machine, Reinforcement Learning, and Recurrent LSTM. The literature review is centered on Firefighters/firemen not involved in wildland fires. The focus was also not on the fire itself. It must also be noted that several deep learning techniques such as CNN were mostly used in fire behavior, fire imaging and identification as well. Those papers that deal with fire behavior were also not part of this literature review.

Bankruptcy Protection Law in US With Focus on The Bankruptcy Abuse Prevention And Consumer Act Of 2005

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.215-219
    • /
    • 2022
  • Bankruptcy is one of the major areas that have attracted the interest of many researchers in the American system, particularly in terms of the laws that oversee it. It provides a plan of reorganization that enables the debtor or the proprietor to discharge liabilities to the creditors through dividing the assets to settle debts. This activity is carried out under supervision to fairly protect the interests of the creditors. Bankruptcy protection systems are dynamic and complex in nature, in line with the economic sector, ensuring the protection of affected individuals from falling into huge losses. Some bankruptcy procedures give the debtor the opportunity to stay in operation or business activity and benefit from revenues until the debt is settled. This law allows some debtors to be relived from any financial burden after the distribution of assets, even if the debt is not paid in full. In light of the above information, this research paper seeks to explore the nature of the complexity of bankruptcy protection laws, their characteristics, and the justice system that regulate them. It also sheds more light on the decision-making powers on bankruptcy cases. There are specialized courts that cover bankruptcy cases located in district courts in every state.

Breast Cancer Detection with Thermal Images and using Deep Learning

  • Amit Sarode;Vibha Bora
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.91-94
    • /
    • 2023
  • According to most experts and health workers, a living creature's body heat is little understood and crucial in the identification of disorders. Doctors in ancient medicine used wet mud or slurry clay to heal patients. When either of these progressed throughout the body, the area that dried up first was called the infected part. Today, thermal cameras that generate images with electromagnetic frequencies can be used to accomplish this. Thermography can detect swelling and clot areas that predict cancer without the need for harmful radiation and irritational touch. It has a significant benefit in medical testing because it can be utilized before any observable symptoms appear. In this work, machine learning (ML) is defined as statistical approaches that enable software systems to learn from data without having to be explicitly coded. By taking note of these heat scans of breasts and pinpointing suspected places where a doctor needs to conduct additional investigation, ML can assist in this endeavor. Thermal imaging is a more cost-effective alternative to other approaches that require specialized equipment, allowing machines to deliver a more convenient and effective approach to doctors.

Impact on Requirement Elicitation Process when Transforming Software from Product Model to a Service Model

  • Sameen Fatima;Amna Anwer;Adil Tareen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.199-203
    • /
    • 2023
  • Influential trend that widely reflected the software engineering industry is service oriented architecture. Vendors are migrating towards cloud environment to benefit their organization. Companies usually offer products and services with a goal to solve problems at customer end. Because customers are more interested in solution of their problem rather than focusing on products or services. In software industry the approach in which customers' problems are solved by providing services is known as software as a service. However, software development life cycle encounters enormous changes when migrating software from product model to service model. Enough research has been done on the overall development process but a limited work has been done on the factors that influence requirements elicitation process. This paper focuses on those changes that influence requirement elicitation process and proposes a systematic methodology for transformation of software from product to service model in a successful manner. The paper then elaborates the benefits that inherently come along with elicitation process in cloud environment. The paper also describes the problems during transformation. The paper concludes that requirement engineering process turn out to be more profitable after transformation of traditional software from product to service model.

Wearable and Implantable Sensors for Cardiovascular Monitoring: A Review

  • Jazba Asad;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.171-185
    • /
    • 2023
  • The cardiovascular syndrome is the dominant reason for death and the number of deaths due to this syndrome has greatly increased recently. Regular cardiac monitoring is crucial in controlling heart parameters, particularly for initial examination and precautions. The quantity of cardiac patients is rising each day and it would increase the load of work for doctors/nurses in handling the patients' situation. Hence, it needed a solution that might benefit doctors/nurses in monitoring the improvement of the health condition of patients in real-time and likewise assure decreasing medical treatment expenses. Regular heart monitoring via wireless body area networks (WBANs) including implantable and wearable medical devices is contemplated as a life-changing technique for medical assistance. This article focuses on the latest development in wearable and implantable devices for cardiovascular monitoring. First, we go through the wearable devices for the electrocardiogram (ECG) monitoring. Then, we reviewed the implantable devices for Blood Pressure (BP) monitoring. Subsequently, the evaluation of leading wearable and implantable sensors for heart monitoring mentioned over the previous six years, the current article provides uncertain direction concerning the description of diagnostic effectiveness, thus intending on making discussion in the technical communal to permit aimed at the formation of well-designed techniques. The article is concluded by debating several technical issues in wearable and implantable technology and their possible potential solutions for conquering these challenges.