• 제목/요약/키워드: Security Integration

검색결과 447건 처리시간 0.028초

Information Support of the Educational Process in the Development of Leadership Potential of Modern University in the Conditions of Distance Learning

  • Viznyuk, Inessa;Rokosovyk, Nataliia;Vytrykhovska, Oksana;Paslawska, Alla;Bielikova, Olena;Radziievska, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.209-216
    • /
    • 2022
  • The modern development of higher education in Ukraine is the result of two main factors. One of them - the factor of social progress - reflects the transformations inherent in modern Ukrainian society. These include, first of all, the processes of democratization and the development of civic responsibility. European the choice of Ukraine, the integration of our state into the European space determine accordingly, the second factor influencing the development of domestic higher education - the trends that guide the progress of the European Higher Education Area (European Higher Education Area (hereinafter - EHEA) and the European Research Area Research Area, hereinafter - ERA). The strategy of information support of the educational process (approved by the European Commission in 2010) recognizes the leading role of higher education as a driver of social progress, accordingly states the priority - the development of free economic education and identifies indicators of such progress - the achievement and international attractiveness of European free economic education. The information support of modernization challenges in higher education are aimed at the educational process, the leadership position of students, in particular through promotion and implementation of leading achievements and best practices in the context of globalization.

Information and Communication Technologies in the Main Types of Legal Activities

  • Kornev, Arkadiy;Lipen, Sergey;Zenin, Sergey;Tanimov, Oleg;Glazunov, Oleg
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.177-183
    • /
    • 2022
  • Thanks to the informatization of society, complex and high-tech devices are being introduced in all areas of human life, and the latest technologies are being actively improved in the modern, globalizing world. The article deals with the issues of using information and communication technologies in legal activities. It also covers the main types of such activities: law-making, law enforcement, and interpretive activity. Since there is an increase in the flow and accumulation of legal information, it is practically impossible to use traditional methods of working with legal information. The article considers and analyzes the role of information and communication technologies in modern legal activity. It is necessary to reveal the principles, concepts, conditions, and factors of their development and develop theoretical and practical recommendations for the use of such technologies in order to solve legal tasks. The authors of the article raise the issues of increasing the efficiency of legal activity, as well as the integration of information technologies into practical legal activity and their use for collecting, storing, searching, and issuing legal and reference information. Much attention is paid to the specific use of automated data banks and information retrieval systems in legal practice that ensure the accumulation, systematization, and effective search for legally important information. The development of such technologies leads to the creation of comfortable conditions for a lawyer in the course of their professional activity. Currently, legal activity cannot exist without telecommunication technologies, legal reference systems, and electronic programs. The authors believe that due to the use of the latest information technologies, the time for making legal decisions has significantly accelerated, the process of searching and systematizing evidence has been worked out, and it has become possible to quickly and efficiently find information on adopted laws and legal acts.

Personalized Diabetes Risk Assessment Through Multifaceted Analysis (PD- RAMA): A Novel Machine Learning Approach to Early Detection and Management of Type 2 Diabetes

  • Gharbi Alshammari
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.17-25
    • /
    • 2023
  • The alarming global prevalence of Type 2 Diabetes Mellitus (T2DM) has catalyzed an urgent need for robust, early diagnostic methodologies. This study unveils a pioneering approach to predicting T2DM, employing the Extreme Gradient Boosting (XGBoost) algorithm, renowned for its predictive accuracy and computational efficiency. The investigation harnesses a meticulously curated dataset of 4303 samples, extracted from a comprehensive Chinese research study, scrupulously aligned with the World Health Organization's indicators and standards. The dataset encapsulates a multifaceted spectrum of clinical, demographic, and lifestyle attributes. Through an intricate process of hyperparameter optimization, the XGBoost model exhibited an unparalleled best score, elucidating a distinctive combination of parameters such as a learning rate of 0.1, max depth of 3, 150 estimators, and specific colsample strategies. The model's validation accuracy of 0.957, coupled with a sensitivity of 0.9898 and specificity of 0.8897, underlines its robustness in classifying T2DM. A detailed analysis of the confusion matrix further substantiated the model's diagnostic prowess, with an F1-score of 0.9308, illustrating its balanced performance in true positive and negative classifications. The precision and recall metrics provided nuanced insights into the model's ability to minimize false predictions, thereby enhancing its clinical applicability. The research findings not only underline the remarkable efficacy of XGBoost in T2DM prediction but also contribute to the burgeoning field of machine learning applications in personalized healthcare. By elucidating a novel paradigm that accentuates the synergistic integration of multifaceted clinical parameters, this study fosters a promising avenue for precise early detection, risk stratification, and patient-centric intervention in diabetes care. The research serves as a beacon, inspiring further exploration and innovation in leveraging advanced analytical techniques for transformative impacts on predictive diagnostics and chronic disease management.

미·중 초국경 데이터 규제와 사이버안보 담론 비교: 아세안 개발원조 사례를 중심으로 (Comparative Study of US-China Discourse on Cross-border Data Regulation and Cybersecurity: Focusing on ASEAN Development Assistance Cases)

  • 이가연
    • 정보화정책
    • /
    • 제30권1호
    • /
    • pp.89-108
    • /
    • 2023
  • 과학기술혁신은 행위자들의 활동을 전통적인 물리적 영토에서 사이버 영역으로 확장했다. 데이터 기반의 플랫폼 서비스와 시장은 사이버 공간의 주권에 대한 담론뿐 아니라 초국경 협력과 사이버 안보에 대한 새로운 논의를 진전시킨다. 이러한 변화는 미국과 중국의 패권 경쟁에도 영향을 미치고 있다. 특히 천연가스나 심해자원과 같은 주요 자원 수송로에 위치한 개도국에 대한 원조 경쟁이 치열하다. 아세안은 미·중의 강대국이 충돌하는 지정학적인 군사·안보의 요지일 뿐만 아니라 6억 명에 이르는 인구는 데이터 자원으로 인해 디지털 경제의 발전 가능성이 크다. 이에 이 논문은 국제개발협력에서 자유주의와 권위주의 담론을 데이터 규제 및 사이버안보와 연계하고, 이를 통해 아세안 통합에 대한 함의를 도출하고자 한다. 본 연구는 글로벌 거버넌스의 측면에서 빅데이터와 관련한 국제정치적 사안들을 연계하는 융합 연구의 의의가 있다.

Integration of Blockchain and Cloud Computing in Telemedicine and Healthcare

  • Asma Albassam;Fatima Almutairi;Nouf Majoun;Reem Althukair;Zahra Alturaiki;Atta Rahman;Dania AlKhulaifi;Maqsood Mahmud
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.17-26
    • /
    • 2023
  • Blockchain technology has emerged as one of the most crucial solutions in numerous industries, including healthcare. The combination of blockchain technology and cloud computing results in improving access to high-quality telemedicine and healthcare services. In addition to developments in healthcare, the operational strategy outlined in Vision 2030 is extremely essential to the improvement of the standard of healthcare in Saudi Arabia. The purpose of this survey is to give a thorough analysis of the current state of healthcare technologies that are based on blockchain and cloud computing. We highlight some of the unanswered research questions in this rapidly expanding area and provide some context for them. Furthermore, we demonstrate how blockchain technology can completely alter the medical field and keep health records private; how medical jobs can detect the most critical, dangerous errors with blockchain industries. As it contributes to develop concerns about data manipulation and allows for a new kind of secure data storage pattern to be implemented in healthcare especially in telemedicine fields is discussed diagrammatically.

An Ensemble Approach for Cyber Bullying Text messages and Images

  • Zarapala Sunitha Bai;Sreelatha Malempati
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.59-66
    • /
    • 2023
  • Text mining (TM) is most widely used to find patterns from various text documents. Cyber-bullying is the term that is used to abuse a person online or offline platform. Nowadays cyber-bullying becomes more dangerous to people who are using social networking sites (SNS). Cyber-bullying is of many types such as text messaging, morphed images, morphed videos, etc. It is a very difficult task to prevent this type of abuse of the person in online SNS. Finding accurate text mining patterns gives better results in detecting cyber-bullying on any platform. Cyber-bullying is developed with the online SNS to send defamatory statements or orally bully other persons or by using the online platform to abuse in front of SNS users. Deep Learning (DL) is one of the significant domains which are used to extract and learn the quality features dynamically from the low-level text inclusions. In this scenario, Convolutional neural networks (CNN) are used for training the text data, images, and videos. CNN is a very powerful approach to training on these types of data and achieved better text classification. In this paper, an Ensemble model is introduced with the integration of Term Frequency (TF)-Inverse document frequency (IDF) and Deep Neural Network (DNN) with advanced feature-extracting techniques to classify the bullying text, images, and videos. The proposed approach also focused on reducing the training time and memory usage which helps the classification improvement.

Digital Technologies in the Innovative and Structural Transformation of Low- and Middle-Income Economies

  • Tetiana Kulinich;Yuliia Lisnievska;Yuliia Zimbalevska;Tetiana Trubnik;Svitlana Obikhod
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.178-186
    • /
    • 2024
  • While in high-income countries the development of digital technology began in the 1970s, in low- and middle-income countries it began in the 1990s and even after 2005, due to the political regime that constrained economic development and innovation. At the same time, there are no studies of the relationship between technological development and structural changes through innovation in low- and middle-income countries. The article aims to quantify the relationship of the introduction of digital technologies on innovation, structural transformation of low- and middle-income economies. The industrial-agrarian economy of Uzbekistan with an authoritarian regime is in a state of transition to a market economy, while in Ukraine, there are active processes of Europeanization and integration into the EU. Ukraine's economy is commodity-based (the export of raw materials of industries and the agricultural sector in developed countries predominates) and industrial-agrarian. Digital technologies and the service sector are little developed in Uzbekistan. On the other hand, Ukraine has a more developed ICT sector. Uzbekistan is gradually undergoing an innovative and structural transformation of the economy: the productivity of the agricultural, industrial, and service sectors is growing, but the ICT sector is virtually undeveloped. In comparison, in Ukraine, there are no significant structural transformations due to a significant drop in productivity of the industrial sector, with stable growth of productivity of the agricultural sector due to technology and a slight increase in productivity of the service sector. It is revealed that Ukraine and Uzbekistan have undergone structural transformations of the economy in favor of the service sector, while the agricultural and industrial sectors produce less and less. If Uzbekistan remains the industrial-agrarian country with an aggregate share of the added value of these sectors 59% in 2019, Ukraine transits to the post-industrial type of economy where the added value of the service sector in GDP grows (55% compared to agrarian and industrial sectors at 42%).

한국군에 모자이크전 개념 적용을 위한 조건과 전략 -AI 의사결정지원체계를 중심으로- (Conditions and Strategy for Applying the Mosaic Warfare Concept to the Korean Military Force -Focusing on AI Decision-Making Support System-)

  • 안지혜;민병기;엄정호
    • 융합보안논문지
    • /
    • 제23권4호
    • /
    • pp.122-129
    • /
    • 2023
  • 제4차 산업혁명 기술의 혁신적 발전에 따라 전쟁의 패러다임이 변화하고 있다. 특히, 미군의 군사혁신 측면에서 제안된 모자이크전은 다양한 무기, 플랫폼, 정보시스템, 인공지능 등 다양한 자원과 능력을 조합하여 유동적인 작전 수행과 상황에 대응하는 능력을 강화하는 것을 목표로 한다. 이러한 개념의 도입은 AI 참모와 인간 지휘자의 결합으로 효과적이고 신속한 지휘통제를 촉진할 수 있다. 모자이크전은 이미 러시아의 침공에 대응하기 위해 우크라이나군의 작전에 도입된 바 있다. 본 논문은 미래전의 모델로 제안되고 있는 모자이크전 개념을 중심으로 전장 패러다임 변화에 따른 한국형 모자이크전 개념 도입을 위한 조건을 도출하고 전략을 제시한다.

가상자산 커스터디 서비스의 최신 동향 및 DeFi 프로토콜 커스터디 가능성 평가 가이드라인 제시 (Trends in Cryptocurrency Custody Services and Evaluation Guidelines for DeFi Protocols' Custody Poten)

  • 이형근;주문호;임지훈;김범중;전기석;심준식;이중희
    • 정보보호학회논문지
    • /
    • 제34권4호
    • /
    • pp.811-831
    • /
    • 2024
  • 본 논문은 1차 목적과 2차 목적을 가지고 작성됐다. 1차 목적은 가상자산 커스터디 서비스에 대한 종합적인 서베이와 글로벌 규제 동향 및 기술적 시사점을 탐구하는 것이다. 이를 위해 가상자산 커스터디 솔루션의 장단점, 분류 체계, 기술적 취약점 등을 다룬 기존 서베이 논문을 종합적으로 검토했다. 또한, 법률적 측면에서 최신 규제 흐름과 기존 규제 프레임워크의 적용 사례, 커스터디 업무 수행에 필요한 조건, 서비스 제공자의 의무사항을 분석했다. 2차 목적은 규제권 밖에서 운영되는 DeFi 프로토콜을 'Gray Area'로 식별하고, 이들의 기술적/거버넌스적 메커니즘을 분석하는 것이다. 최종적으로, 위 서베이 내용을 종합하여 DeFi 프로토콜의 탈중앙화 평가 기준 가이드라인을 제시하고, 이를 통해 제도권 내 통합 가능성을 제기함으로써, 업계 전문가, 규제 기관, 정책 입안자 등 이해관계자들에게 업계의 요구와 사회적 이익의 균형을 찾는 데 중요한 인사이트를 제공하고자 한다.

재난 영화를 통해 본 소방관 이미지에 대한 융·복합적 고찰 (Convergence and Integration Review of Fire fighter Image through Disaster Movies)

  • 이인섭;김지희;김윤정
    • 한국융합학회논문지
    • /
    • 제8권2호
    • /
    • pp.91-97
    • /
    • 2017
  • 본 연구의 목적은 재난 현장에서 활동하는 소방관을 모델로 한 국내 및 국외 영화를 통해 영화가 말하고자 하는 소방관 이미지와 영화 속에서 활약하는 소방관의 업무를 정리하고 소개하고자 함이다. 연구는 2016년 9월을 기준으로 하여 9월 1일부터 7일까지 수행하였으며, 1903년부터 2016년까지 만들어진 위키피디아(Wikipedia)의 인터넷 자료를 통해 찾은 소방관 관련 영화 목록을 바탕으로 관련 학회지의 논문을 검색하였고, 직접 관람했던 영화들에 대한 자료를 문헌고찰을 통해 정리하였다. 연구 결과 소방관 이미지는 화재진압, 수사관, 자기희생적인 사람으로 요약할 수 있다. 본 연구에서는 재난영화를 통해 본 소방관 이미지를 융복합적으로 고찰해 본 결과 소방관은 위험한 재난상황에서 희생과 헌신으로 많은 생명을 구하며 존경을 받고 있으면서 한편으로 구조과정에서 외상 후 스트레스를 경험하게 되기 때문에 위기상황 스트레스 해소에 대한 적극적인 국가적 복지와 안전 방안을 마련할 것을 제안한다. 본 연구는 "가장 먼저 들어가서 가장 나중에 나오라"는 소방관 구호처럼 자기희생을 하는 소방관을 위한 복지와 안전 관리 개발을 위한 기초자료를 제공한다.