• Title/Summary/Keyword: Security Evaluation System

Search Result 672, Processing Time 0.029 seconds

Efficiency of Financing High-Tech Industries: The Case of Kazakhstan

  • SADYKHANOVA, Gulnara;EREZHEPOVA, Aiman;NURMANOVA, Biken;AITBEMBETOVA, Aida;BIMENDIYEVA, Laila
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.4
    • /
    • pp.287-295
    • /
    • 2019
  • The study aims to build a model for evaluating the effectiveness of activities and the effectiveness of financial investments in high-tech industries in Kazakhstan. The development of high-tech industries plays an important role in the economic growth of a country. In this regard, it is relevant to study the effectiveness of financing the most important industry in Kazakhstan. The development of the high-tech sector ensures the efficient functioning of the national innovation system. High-tech enterprises are one of the competitive sectors that allow us to develop and implement leading-edge innovations with the goal of their subsequent commercialization domestically and abroad. The author defines the multicriteria of efficiency in a knowledge-based economy associated with achieving an economic effect with multivariate correlation of results with costs. A multivariate dynamic model, an integral indicator of performance, an integral indicator of cost-effectiveness is proposed. The assessment of the effectiveness of financial costs and performance indicators in all regions of Kazakhstan have the positive dynamics of indicators, as well as a high economic effect. The results of the study can be applied in regional management to adequately assess the effectiveness of high-tech organizations and the effectiveness of financial investments, contribution to ensuring the economic security of the region.

High Performance Pattern Matching algorithm with Suffix Tree Structure for Network Security (네트워크 보안을 위한 서픽스 트리 기반 고속 패턴 매칭 알고리즘)

  • Oh, Doohwan;Ro, Won Woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.6
    • /
    • pp.110-116
    • /
    • 2014
  • Pattern matching algorithms are widely used in computer security systems such as computer networks, ubiquitous networks, sensor networks, and so on. However, the advances in information technology causes grow on the amount of data and increase on the computation complexity of pattern matching processes. Therefore, there is a strong demand for a novel high performance pattern matching algorithms. In light of this fact, this paper newly proposes a suffix tree based pattern matching algorithm. The suffix tree is constructed based on the suffix values of all patterns. Then, the shift nodes which informs how many characters can be skipped without matching operations are added to the suffix tree in order to boost matching performance. The proposed algorithm reduces memory usage on the suffix tree and the amount of matching operations by the shift nodes. From the performance evaluation, our algorithm achieved 24% performance gain compared with the traditional algorithm named as Wu-Manber.

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

Design and Implementation of Multimedia CAI Program for Learning about Electricity in the Mechanics Curriculum (기술과 전기 학습을 위한 멀티미디어 CAI 프로그램 설계 및 구현)

  • Lee, Hyae-Joung;Shin, Hyun-Cheul;Joung, Suck-Tae
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.9-16
    • /
    • 2007
  • In today's society, the paradigm is converted to information where both this and knowledge become the source of value added. In order to answer societies' needs school education is subject to a large change, that is 'from supplier-centered learners to demand-centered learners'. This study is the design and implementation of multimedia CAI program for learning about electricity in the meddle school the mechanics curriculum with a focus in generating electricity. Based on multimedia, software, educational utilization of the multimedia, CAI, learning theory and form, both technology and multimedia elements related to curriculum are analyzed. This title is composed of object, contents, evaluation and related sites every chapter for students to study. Also, it is designed for students to take interest and participate in the learning process actively by combining lots of media such as characters, sound, images and animation. Specially it is composed in a way of repetition according to the student's level.

  • PDF

Using Genetic Algorithms for Routing Metric in Wireless Mesh Network (무선 메쉬 네트워크에서 유전 알고리즘을 이용한 라우팅 메트릭 기법)

  • Yoon, Chang-Pyo;Shin, Hyo-Young;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.11-18
    • /
    • 2011
  • Wireless mesh network technology with transmission speeds similar to wired and wireless technology means to build, compared with wired networks, building a more efficient network to provide convenience and flexibility. The wireless mesh network router nodes in the energy impact of the mobility is less constrained and has fewer features entail. However, the characteristics of various kinds due to network configuration settings and the choice of multiple paths that can occur when the system overhead and there are many details that must be considered. Therefore, according to the characteristics of these network routing technology that is reflected in the design and optimization of the network is worth noting. In this paper, a multi-path setting can be raised in order to respond effectively to the problem of the router node data loss and bandwidth according to traffic conditions and links to elements of the hop count evaluation by using a genetic algorithm as a workaround for dynamic routing the routing metric for wireless mesh network scheme is proposed.

Integrating ICT in the Sudanese Kindergartens by Means of Developing a Computerized Application for The Pre-School Education, In Order to Improve Cognitive Development:

  • MOHAMMED, AMGAD ATTA ABDELMAGEED;DRAR, SUHANDA SAFALDEEN MOHAMMED;HILAL, ANWER MUSTAFA;CHRISTENSEN, LARS RUNE
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.597-603
    • /
    • 2021
  • The current Sudanese preschool system depends on limited methods of education, children's education needs to be equipped to keep pace with technological development, also, the large gap that exists between the families and the Kindergartens, where many parents have no idea on how their child progresses in the KG context. The aim of this research is to integrate ICT in the preschool education to enhance and improve the preschool education, by building an Integrated Educational Application (Computerized Application for Preschool Education CAPE) which will help to improve the learning outcomes. The researchers used the Experimental Research Methodology, the characteristic of CAPE application is; suitable for children's age, the application style is more attractive to the children and contains a different way to help children get learning. Alawaeel and the Smart Child Kindergartens in Republic of Sudan were selected as a sample of the study, with sample size specifically, 50 children's. Also, the Central Bank of Sudan Kindergarten was selected as one of the institutional Kindergartens for easy communication with parents of children with a sample size 21 children. The study found that; using CAPE application in KG enables children to increase general learning effects and developing child's cognitive skills. Also, the children who were allowed to use CAPE by their parents are performed better in the overall evaluation of KG lessons. Also, using the CAPE in the Pre-School education helps the parents following their children's progress better and more reliable. The researcher recommends that to apply the computerized application and includes the second level. Also, converting the computerized program into an application to be used by children by their self, without the intervention of parents.

Study of Facial Expression Recognition using Variable-sized Block (가변 크기 블록(Variable-sized Block)을 이용한 얼굴 표정 인식에 관한 연구)

  • Cho, Youngtak;Ryu, Byungyong;Chae, Oksam
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.67-78
    • /
    • 2019
  • Most existing facial expression recognition methods use a uniform grid method that divides the entire facial image into uniform blocks when describing facial features. The problem of this method may include non-face backgrounds, which interferes with discrimination of facial expressions, and the feature of a face included in each block may vary depending on the position, size, and orientation of the face in the input image. In this paper, we propose a variable-size block method which determines the size and position of a block that best represents meaningful facial expression change. As a part of the effort, we propose the way to determine the optimal number, position and size of each block based on the facial feature points. For the evaluation of the proposed method, we generate the facial feature vectors using LDTP and construct a facial expression recognition system based on SVM. Experimental results show that the proposed method is superior to conventional uniform grid based method. Especially, it shows that the proposed method can adapt to the change of the input environment more effectively by showing relatively better performance than exiting methods in the images with large shape and orientation changes.

Development of Minutiae-level Compensation Algorithms for Interoperable Fingerprint Recognition (이기종 센서의 호환을 위한 지문 특징점 보정 알고리즘 개발)

  • Jang, Ji-Hyeon;Kim, Hak-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.39-53
    • /
    • 2007
  • The purpose of this paper is the development of a compensation algorithm by which the interoperability of fingerprint recognition can be improved among various different fingerprint sensor. In order to compensate for the different characteristics of fingerprint sensor, an initial evaluation of the sensors using both the ink-stamped method and the flat artificial finger pattern method was undertaken. This paper proposes Common resolution method and Relative resolution method for compensating different resolution of fingerprint images captured by disparate sensors. Both methods can be applied to image-level and minutia-level. In order to compensate the direction of minutiae in minutia-level, Unit vector method is proposed. The EER of the proposed method was improved by average 64.8% better than before compensation. This paper will make a significant contribution to interoperability in the system integration using different sensors.

A Study on Scalable Federated ID Interoperability Method in Mobile Network Environments (모바일 환경으로 확장 가능한 federated ID 연동 방안에 관한 연구)

  • Kim, Bae-Hyun;Ryoo, In-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.27-35
    • /
    • 2005
  • While the current world wide network offers an incredibly rich base of information, it causes network management problem because users should have many independent IDs and passwords for accessing different sewers located in many places. In order to solve this problem users have employed single circle of trust(COT) ID management system, but it is still not sufficient for clearing the problem because the coming ubiquitous network computing environment will be integrated and complex networks combined with wired and wireless network devices. The purpose of this paper is to describe the employment and evaluation of federated ID interoperability method for solving the problem. The use of the proposed model can be a solution for solving network management problem in the age of mobile computing environment as well as wired network computing environment.