• Title/Summary/Keyword: Security Event

Search Result 398, Processing Time 0.033 seconds

The Role of Data Technologies with Machine Learning Approaches in Makkah Religious Seasons

  • Waleed Al Shehri
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.26-32
    • /
    • 2023
  • Hajj is a fundamental pillar of Islam that all Muslims must perform at least once in their lives. However, Umrah can be performed several times yearly, depending on people's abilities. Every year, Muslims from all over the world travel to Saudi Arabia to perform Hajj. Hajj and Umrah pilgrims face multiple issues due to the large volume of people at the same time and place during the event. Therefore, a system is needed to facilitate the people's smooth execution of Hajj and Umrah procedures. Multiple devices are already installed in Makkah, but it would be better to suggest the data architectures with the help of machine learning approaches. The proposed system analyzes the services provided to the pilgrims regarding gender, location, and foreign pilgrims. The proposed system addressed the research problem of analyzing the Hajj pilgrim dataset most effectively. In addition, Visualizations of the proposed method showed the system's performance using data architectures. Machine learning algorithms classify whether male pilgrims are more significant than female pilgrims. Several algorithms were proposed to classify the data, including logistic regression, Naive Bayes, K-nearest neighbors, decision trees, random forests, and XGBoost. The decision tree accuracy value was 62.83%, whereas K-nearest Neighbors had 62.86%; other classifiers have lower accuracy than these. The open-source dataset was analyzed using different data architectures to store the data, and then machine learning approaches were used to classify the dataset.

A Proposed Conception of Technical Solutions to Address the Educational Loss in Mathematics in the Fifth Grade of Primary School

  • Ahmad Almassaad;Abdullah ALSHdaied
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.35-48
    • /
    • 2023
  • The study aimed to provide a proposed conception of technical solutions to address the educational loss in mathematics in the fifth grade of primary school, and the study adopted the descriptive approach. male and female teachers, and to achieve the study objective, the researcher built a tool for the study, a "questionnaire", in which he used the comprehensive inventory method, and the results of the study showed: identifying the learning outcomes that represent an educational loss, and identifying the learning outcomes that are considered essential in teaching and learning mathematics for the fifth grade of primary school. In the event that it is not achieved by students, it is considered an educational loss that may affect the future of students' education and learning. Because it is a basis for later experiences in mathematics in other classes, and the study also found the effectiveness of the proposed visualization of technical solutions provided to address the educational loss in mathematics for the fifth grade: (short electronic tests, YouTube channel, homework, educational platform, electronic worksheets, and communication channels).

A Study on the Estimation of Required Seaborne Trade Volume and Carrier Volume of Each Vessel Type in Case of Emergency (우리나라 비상사태시 소요물동량 및 선종별 소요선대 추정 연구)

  • Young-Gyun Ahn
    • Korea Trade Review
    • /
    • v.45 no.1
    • /
    • pp.1-11
    • /
    • 2020
  • The maritime industry is important for Korean international trade, as more than 99 percent of its imports and exports are moved by maritime transportation. However, if maritime transportation is stopped in the event of an emergency, such as war or natural disaster, there is a danger that imports and exports may cease abruptly. Coping with this risk is why the Ministry of Oceans and Fisheries, manages the 'National Necessary Shipping System.' This system requires that the government estimates the size of ships necessary in the case of an emergency, and the ships designated as National Necessary Vessels should transport goods in the case of actual emergencies. This study seeks to estimate the appropriate size of ships required in an emergency using the latest data and applying a quantitative methodology. This study provides useful reference materials for policy authorities. In particular, it is meaningful that this study estimates the required number of ships of each vessel type, reflecting the recent trend of large-scale ships and expanding global trade.

Study on the State Leadership's Safety Measures Regarding the North Korean Threat of Weapons of Mass Destruction - Focuses on the Threat of North Korean Nuclear Weapons (북한 대량살상무기 위협에 대한 국가지도부 안전대책에 관한 연구 - 북한 핵무기 위협을 중심으로)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.325-354
    • /
    • 2013
  • The concept of national security and the fundamental system for crisis management have departed from traditional methods and the importance of a national critical infrastructure crisis management has been emphasized. A national critical infrastructure crisis means a situation where human resource, material and functional system that may have a material effect on the critical functions of the government, the vitality and integrity of society, national economy and the safety of the public becomes disabled due to causes such as terrorism or major disasters. Although North Korea had been subject to numerous rounds of negotiations and sanctions as it continually developed nuclear weapons since the 1960s, it has also showed off its nuclear armaments through successful nuclear testings and missile launches. As the development and threat of North Korea's weapons of mass destruction becomes more noticeable and the range of its risk expands, this study focuses on the potential for an absence of leadership for national crisis management where the country's leadership, which should serve the critical role and function of handling national crises, becomes completely destroyed by the unexpected initial attacks by North Korea. As a result, the purpose of this study is to propose safety measures for the country's leadership in preparation for North Korea's threat of nuclear weapons by examining the concept and degree of risk of weapons of mass destruction with a focus on nuclear weapons, analyzing the substance of the threat of North Korean nuclear weapons and evaluating such threat. In conclusion, first, to ensure the normal functioning of a national crisis management system in the event of a national crisis, we must seek safety measures that conform to the scope and succession order of the leadership of the national crisis management for an Enduring Constitutional Government (ECG) and the Continuity Of Operations (COOP). Second, in the event of a national ceremony, the gathering of the country's leadership all together in an open place should be avoided. In unavoidable circumstances, the next in rank that will act on behalf of the current leader should be designated and relevant safety measures should be taken. Third, during time of peace, in preparation for national crises, the scope of protection for the country's leadership should be prescribed and specific security and safety measures should be implemented. Fourth, the succession order for acting president in the case of the death of the president pursuant to Articles 71 and 26(1) of the National Government Organization Act should reconsidered to see whether it is a reasonable provision that takes into consideration a national crisis management that corresponds to the threat of North Korean nuclear weapons and weapons of mass destruction. Pursuant to the Basic Guidelines for National Crisis Management set out under Presidential Directive No. 229, the Korean government is currently operating a case-by-case "crisis management standard manual" and its sub-manuals and has also prepared the Presidential Security Service's security and safety measure regulations regarding the acting president. Therefore, the Korean government should actualize the above points in the case-by-case crisis management standard manual and security and safety measure regulations regarding the acting president to implement and legislate them.

  • PDF

A Study on the Psychological State of the Security Subjects of National Guard (공경호원의 경호대상자 심리상태 인지)

  • Kim, Haw-Su;Kang, Min-Wan;Jo, Sung-Gu
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.73-100
    • /
    • 2012
  • Republic of Korea for the last 2012 nuclear security summit in Seoul in three days from March 26, has held great success. This industry watchers at home and abroad through professional meetings and private organizations to promote global nuclear security was intended to draw, for the preparation of this event the most important one of the things that should be addressed at the meeting was over the top guard. The national guard of heads of state and nationally significant as the important issues should be dealt with. So who is responsible for national security summit national guard for a successful guard against participants should have a higher understanding, these stories ever to be dealt with important security subjects is the psychological state of cognition. This study is currently a source of honor to escort the psychological state of subjects, and whether the search as I looked at cognition. Qualitative research methods to conduct research in-depth interview technique was used for one of the transcribed data analysis program, a non-quantitative data were analyzed using NVivo 8. As a result of this study, analysis of the problem compared with the usual methods 39 (72.2%), fine-grained observation and 15 (27.7%), through the media how cognition 41 (73.2%), marginal help of 15 (26.7%) were. The usual comparison with how honored Issue sources to detect security of those words and actions and facial expressions, etc. Security of subjects over the state of mind cognition that he, detailed observation of the national guard to security subjects the psychological state of cognition which are pre-Thorough Information subjects that can have all the information about security and the state can be obtained by saying that. Media coverage through a cognitive approach national guard of the media coverage to understand the security subjects of the political situation to understand the prerequisite that were marginal for help through the cognitive approach of security subjects surrounding the execution of security workers, Secretary in charge of protocol and security, and be propagated through the selection techniques to be utilized was that.

  • PDF

A Study on the Feasibility of Developing a Nationwide Cyber Risk Management System utilizing Social-Science Analytic Theories (사회과학적 위기관리이론을 활용한 국가사이버안보 평가체계 구축 가능성 고찰)

  • 이상호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.259-265
    • /
    • 2004
  • Since the 2003.1.25 Internet Crisis, the government has been looking at a number of options to strengthen national cyber-security/crisis management capability to guard against ever increasing threat of cyber-war and terror. Thus, the focus of this study was to explorer new ways of developing a comprehensive cyber-security/crisis management system, in particular by combining modern social-science analytic theories. As a result, although there has to be more in-depth researches into incorporating advanced techniques to generate more detailed and object-specific indexes and protocols, the use of 'event data system,' which has been widely utilized in many recent social science researches to assess a wide-range of socio-political risks and crises, could be adopted as a basis for a comprehensive nationwide cyber-risk management system.

  • PDF

A Fast Authentication Method using Hash Value for Realtime Communication in Mobile IPv6 network (모바일 IPv6에서 실시간 통신을 위해 해쉬 값을 적용한 빠른 인증 기법)

  • Kang Hyung-Mo;Mun Young-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.113-120
    • /
    • 2006
  • A node of mobile IPv6 moving foreign networks needs authentication process to support right services against from security threat. AAA is a trust infrastructure that authenticates, authorizes, and accounts nodes receiving a network service. And Mobile IPv6 Working Group recommends use of AAA infrastructure to authenticate mobile nodes. Event though AAA infrastructure provides strong authentication functions, it should exchange a lot of messages to authenticate mobile nodes every movement. The exchange of lots of messages causes latency and it is interfered with realization of real-time communication. This paper proposes an authentication method of improved speed using hash value of mobile node to reduce authentication latency. Directly after movement, a mobile node applying a Proposed method uses extended existing security authentication for a while and deletes the establishment latency of new security authentication. Performance evaluation of a proposed method verifies the efficiency through the analysis of cost comparison with other methods. The conclusion of performance evaluation is that the proposed method gets more 25% performance improvement than a general method when a mobile node moves another subnet.

Analyzing Effects on Firms' Market Value of Personal Information Security Breaches (개인정보 유출이 기업의 주가에 미치는 영향)

  • Kim, JeongYeon
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.1-12
    • /
    • 2013
  • With the increases of requirement for user identification in Internet services, we should let the service companies know my personal information. If the shared personal information with them are used in not-allowed area or delivered to un-authorized persons, we may have practical harms in several fields such as financial related operations. Korean Government has introduced new management method for personal information, but it is not hard to find the personal information management issues from Korean news papers. The proper measurement should be delivered to related companies to help them to decide investment for security. This paper review the indirect measurement method of demages by check the stock prices of related company for personal information management issue. We check the relationship between change of stock price and the information management issue. The result shows there are no changes in stock market. Korean government added strong regulations for personal information management though. To prevent further personal information issues, we should recognize the indirect damages properly and let the company pay higher reparations for any personal information abuse.

A Study on Implementation of Fraud Detection System (FDS) Applying BigData Platform (빅데이터 기술을 활용한 이상금융거래 탐지시스템 구축 연구)

  • Kang, Jae-Goo;Lee, Ji-Yean;You, Yen-Yoo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.4
    • /
    • pp.19-24
    • /
    • 2017
  • The growing number of electronic financial transactions (e-banking) has entailed the rapid increase in security threats such as extortion and falsification of financial transaction data. Against such background, rigid security and countermeasures to hedge against such problems have risen as urgent tasks. Thus, this study aims to implement an improved case model by applying the Fraud Detection System (hereinafter, FDS) in a financial corporation 'A' using big data technique (e.g. the function to collect/store various types of typical/atypical financial transaction event data in real time regarding the external intrusion, outflow of internal data, and fraud financial transactions). As a result, There was reduction effect in terms of previous scenario detection target by minimizing false alarm via advanced scenario analysis. And further suggest the future direction of the enhanced FDS.

Runtime-Guard Coverage Guided Fuzzer Avoiding Deoptimization for Optimized Javascript Functions (최적화 컴파일된 자바스크립트 함수에 대한 최적화 해제 회피를 이용하는 런타임 가드 커버리지 유도 퍼저)

  • Kim, Hong-Kyo;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.443-454
    • /
    • 2020
  • The JavaScript engine is a module that receives JavaScript code as input and processes it, among many functions that are loaded into web browsers and display web pages. Many fuzzing test studies have been conducted as vulnerabilities in JavaScript engines could threaten the system security of end-users running JavaScript through browsers. Some of them have increased fuzzing efficiency by guiding test coverage in JavaScript engines, but no coverage guided fuzzing of optimized, dynamically generated machine code was attempted. Optimized JavaScript codes are difficult to perform sufficient iterative testing through fuzzing due to the function of runtime guards to free the code in the event of exceptional control flow. To solve these problems, this paper proposes a method of performing fuzzing tests on optimized machine code by avoiding deoptimization. In addition, we propose a method to measure the coverage of runtime-guards by the dynamic binary instrumentation and to guide increment of runtime-guard coverage. In our experiment, our method has outperformed the existing method at two measures: runtime coverage and iteration by time.