• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.025 seconds

Deep Learning based Human Recognition using Integration of GAN and Spatial Domain Techniques

  • Sharath, S;Rangaraju, HG
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.127-136
    • /
    • 2021
  • Real-time human recognition is a challenging task, as the images are captured in an unconstrained environment with different poses, makeups, and styles. This limitation is addressed by generating several facial images with poses, makeup, and styles with a single reference image of a person using Generative Adversarial Networks (GAN). In this paper, we propose deep learning-based human recognition using integration of GAN and Spatial Domain Techniques. A novel concept of human recognition based on face depiction approach by generating several dissimilar face images from single reference face image using Domain Transfer Generative Adversarial Networks (DT-GAN) combined with feature extraction techniques such as Local Binary Pattern (LBP) and Histogram is deliberated. The Euclidean Distance (ED) is used in the matching section for comparison of features to test the performance of the method. A database of millions of people with a single reference face image per person, instead of multiple reference face images, is created and saved on the centralized server, which helps to reduce memory load on the centralized server. It is noticed that the recognition accuracy is 100% for smaller size datasets and a little less accuracy for larger size datasets and also, results are compared with present methods to show the superiority of proposed method.

Web Hypermedia Resources Reuse and Integration for On-Demand M-Learning

  • Berri, Jawad;Benlamri, Rachid;Atif, Yacine;Khallouki, Hajar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.125-136
    • /
    • 2021
  • The development of systems that can generate automatically instructional material is a challenging goal for the e-learning community. These systems pave the way towards large scale e-learning deployment as they produce instruction on-demand for users requesting to learn about any topic, anywhere and anytime. However, realizing such systems is possible with the availability of vast repositories of web information in different formats that can be searched, reused and integrated into information-rich environments for interactive learning. This paradigm of learning relieves instructors from the tedious authoring task, making them focusing more on the design and quality of instruction. This paper presents a mobile learning system (Mole) that supports the generation of instructional material in M-Learning (Mobile Learning) contexts, by reusing and integrating heterogeneous hypermedia web resources. Mole uses open hypermedia repositories to build a Learning Web and to generate learning objects including various hypermedia resources that are adapted to the user context. Learning is delivered through a nice graphical user interface allowing the user to navigate conveniently while building their own learning path. A test case scenario illustrating Mole is presented along with a system evaluation which shows that in 90% of the cases Mole was able to generate learning objects that are related to the user query.

Civil legal relations in the context of adaptation of civil legislation to the legislation of the EU countries in the digital age

  • Kizlova, Olena;Safonchyk, Oksana;Hlyniana, Kateryna;Mazurenko, Svetlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.521-525
    • /
    • 2021
  • An essential area is the creation of a single digital market between the EU and Ukraine through information technology. Purpose: to investigate and analyze civil law relations in the field of adaptation of Ukrainian civil law to civil law regulations of the EU. The object of research: Ukrainian civil law and civil law of the EU. The subject of the study is civil law in the context of adaptation of civil law to the legislation of the EU. The following methods of scientific cognition were used during the research: semantic, historical, comparison, analysis and synthesis, generalization. The results of the study show that the harmonization of the legal system of Ukraine with EU law is caused by several goals: successful integration of Ukraine into the EU, legal reforms based on the positive example of EU countries, promoting access of Ukrainian enterprises to the EU market; attracting foreign investment, increasing the welfare of Ukrainian citizens. The adaptation includes three stages, the final of which is the preparation of an expanded program of harmonization of Ukrainian legislation with EU legislation. In the process of adaptation, it is important to take into account the legal history, tradition, features and mentality of Ukraine and before borrowing legal structures to analyze the feasibility of their application in the Ukrainian legal field.

Traditional Circular Economy vs Integrated Blockchain Technology in the Coffee Supply Chain: A Comparative Study (커피 공급망의 전통적 순환경제 vs 통합적 블록체인 기술 비교 연구)

  • Cho Nwe Zin Latt;Igugu Tshisekedi Etienne;Muhammad Firdaus;Kyung-hyune Rhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.264-267
    • /
    • 2023
  • The circular economy approach in the coffee supply chain promotes a more sustainable, environmentally friendly, and socially responsible coffee industry. It aims to reduce the environmental impact of coffee production and consumption while ensuring the long-term viability of coffee farming communities and ecosystems. However, there are many challenges in the traditional circular economy coffee supply chain. Hence, this paper undertakes a comparative analysis between the traditional circular economy coffee supply chain and its integration with blockchain. As a result, we display the benefits of incorporating blockchain technology into the conventional circular economy framework of the coffee supply chain. Additionally, this integration promises to overcome the challenges in the traditional circular economy coffee supply chain.

A Deep Learning Approach for Intrusion Detection

  • Roua Dhahbi;Farah Jemili
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.89-96
    • /
    • 2023
  • Intrusion detection has been widely studied in both industry and academia, but cybersecurity analysts always want more accuracy and global threat analysis to secure their systems in cyberspace. Big data represent the great challenge of intrusion detection systems, making it hard to monitor and analyze this large volume of data using traditional techniques. Recently, deep learning has been emerged as a new approach which enables the use of Big Data with a low training time and high accuracy rate. In this paper, we propose an approach of an IDS based on cloud computing and the integration of big data and deep learning techniques to detect different attacks as early as possible. To demonstrate the efficacy of this system, we implement the proposed system within Microsoft Azure Cloud, as it provides both processing power and storage capabilities, using a convolutional neural network (CNN-IDS) with the distributed computing environment Apache Spark, integrated with Keras Deep Learning Library. We study the performance of the model in two categories of classification (binary and multiclass) using CSE-CIC-IDS2018 dataset. Our system showed a great performance due to the integration of deep learning technique and Apache Spark engine.

Development of a Formal Access Control Model in CORBA Security using the Z Language (Z 언어를 기반으로 CORBA 보안의 정형화된 접근 제어 모델 개발)

  • 김영균;김경범;인소란
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.79-94
    • /
    • 1997
  • OMG (Object Management Group) published a security service specification, called CORBA (Common Object Request Broker Architecture) security reference model because the integration of security and object-oriented techniques was critical for successful deployment of distributed object systems. The CORBA security reference model treats access control as an implementation independent semantic concept but has incomplete semantics of the access control function. Because of such imcompleteness it is difficult for the system administrator and the CORBA security implementor to have the same understanding for the meaning of access control in the CORBA security. We propose a formal model for access control the CORBA security using the formal description language, which is called Z language based on typed set theory. The proposed model provides concrete semantics of the access control function to both the system administrator and the implementor.

Information security auditing Framework in Industrial control system (산업제어시스템 정보보안 감리 프레임워크 연구)

  • Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.139-148
    • /
    • 2008
  • Information technology have led to change the automation of large industrial control system as well as business system and environments. Industrial control system(ICS) is vital components of most nation's critical infrastructures such as electricity, natural gas, water, waste treatment, transportation and communication that are based of national security, safety of citizen and development of national economy According to the change of business environment, organizational management pushed integration all of the system include MIS and ICS. This situation led to use standard information technologies for ICS, this transition has been to expose ICS to the same vulnerabilities and threats that plague business system. Recently government obliged owners of the public information system to audit for safety, efficiency and effectiveness, and also obliged the owners of national infrastructure to improve their system security as a result of vulnerability analysis. But there doesn't prepare a security architecture and information security auditing framework of ICS fur auditing. In this paper, I suggested the security architecture and information security auditing framework for ICS in order to prepare the base of industrial system security auditing.

A Critical Analysis of the Perspectives on Health Care Reform in Korea (의료개혁 논의의 비교분석)

  • 조병희
    • Korean Journal of Health Education and Promotion
    • /
    • v.15 no.2
    • /
    • pp.217-233
    • /
    • 1998
  • This paper analyzed four different perspectives on health care reform in Korea in terms of the basic values, formulated problems and reform plans, implementation methods, and supporting groups. The medical security plan was insisted by social security specialists and social activists focusing on the integration of medical insurance coops in order to enhancing equity and right of the people. However, its perspective was limited to promoting security instead of reforming health care system. The government proposed the health care reform plans in 1994 and in 1997, focusing on promoting efficiency by remedying many problems in health care delivery system. However, its implementation was not successful due to the lack of organizational and financial supporters. Recently, two opposite proposals were issued. The market reform plan paid attention to revitalizing the market function to promoting efficiency by allowing hospitals to treat private patients instead of applying the medical insurance regulation. The government reform plan focused on intensifying governmental planning and intervention in the health care sector in order to removing inefficiency and promoting equity with the supports of social activists and labor unions. Finally, this paper proposed an alternative plan to promote harmonious social relationship between actors in the health care system.

  • PDF

A Study on Efficient Distributed Data Processing POS System of PKI Based (PKI 기반의 효율적인 분산처리 Point of sales 시스템에 관한 연구)

  • Kang Min-Gyun;Kim Seok-Soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.200-204
    • /
    • 2005
  • POS system that become that is supply net administration and computerization fetters of customer management that become point in distribution network constructed database and use XML-Encryption that is certificate techniques of PKI and standard of security for security that is XML's shortcoming and design distributed processing POS system using XML for data integration by introduction of Ubiquitous concept. This POS system has four advantages. First, high portability Second, efficiency of data transmission. Third, improvement of data process speed. Fourth, security of data.

  • PDF

A Study on Securing Stability following the proposal and Application of Integration Procedure following the Diversification Process of Information Security Policies (정보보안 정책의 다변화 과정에 따른 일원화 절차의 제안과 적용에 따른 안전성 확보에 대한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.405-410
    • /
    • 2018
  • Distribution of a series of procedure for establishment and revision for various instructions on information security for public institutions and diversified process of performance system following the compliance with the instruction are applied to the integrated procedure that any revision or change has led to the studies that are applied on the basis of all environment requirements and the facilitation of such studies in the integrated procedure for the entire information security. However, as the difference of possessing the work territory for each institution, maintaining and securing the security with the heterogeneous type for subject, the information still displays the issues to link to a series of process to the procedure to secure the foregoing as stability, In addition, the notice should be made by the public institutions for the result structured and notified on the basis of budget and the additional time and expenses for re-distributing to the private institutions would be another issue for the part to accomplish the purpose of such study. Therefore, under this study, the subject of information security of similar institutions should be sorted out and statistically classified, and it proposes the integration procedure through a series of diversity and multi-change process and summarize the same in the proposed procedure to engage in studies to secure the optimal stability.