• Title/Summary/Keyword: Security Planning

Search Result 466, Processing Time 0.019 seconds

Effective Concepts of Harmonious Management of Production Systems

  • Arutiunian, Iryna;Poltavets, Maryna;Аchacha, Maryna;Bondar, Olena;Pavlov, Fedir;Gerasymenko, Oleksandr;Kulinich, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.141-144
    • /
    • 2021
  • Modern concepts of management of construction production systems require solving the problems of harmonization of the distribution of structural elements on the way to overcoming global destabilization processes. An effective ratio of functional subsystems of production in an environment of mutual influence create sustainable opportunities for production management and contribute to the logical development of the system as a whole in achieving the main goal of harmonious management. The purpose of the study is to develop the concept of effective management of production systems in construction with the harmonious formation of organizational structures. The results of the study allowed to reveal the harmonization approach in improving the interaction of structural elements of production and accelerating their functional sensitivity to changes in the environment. Harmonious production system more effectively adapts to the diversity of interests, goals and actions at all levels of management of different subsystems in any environment.

Comparing the Performance of 17 Machine Learning Models in Predicting Human Population Growth of Countries

  • Otoom, Mohammad Mahmood
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.220-225
    • /
    • 2021
  • Human population growth rate is an important parameter for real-world planning. Common approaches rely upon fixed parameters like human population, mortality rate, fertility rate, which is collected historically to determine the region's population growth rate. Literature does not provide a solution for areas with no historical knowledge. In such areas, machine learning can solve the problem, but a multitude of machine learning algorithm makes it difficult to determine the best approach. Further, the missing feature is a common real-world problem. Thus, it is essential to compare and select the machine learning techniques which provide the best and most robust in the presence of missing features. This study compares 17 machine learning techniques (base learners and ensemble learners) performance in predicting the human population growth rate of the country. Among the 17 machine learning techniques, random forest outperformed all the other techniques both in predictive performance and robustness towards missing features. Thus, the study successfully demonstrates and compares machine learning techniques to predict the human population growth rate in settings where historical data and feature information is not available. Further, the study provides the best machine learning algorithm for performing population growth rate prediction.

The Study of Selecting a Test Area for Validating the Proposal Specification of InSAS(Interferometric Synthetic Aperture Sonar) (간섭계측 합성개구소나 성능 평가를 위한 해상 시험장 선정에 관한 연구)

  • Park, Yosup;Kim, Seong Hyeon;Koh, Jieun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.329-338
    • /
    • 2022
  • This paper provides a case study of development testing and evaluation of design goal of Interferometric SAS (Synthetic Aperture Sonar) system that is developing supported by Civil-Military Technology Cooperation Center in offshore fields. For Deep water operating capabilities evaluation, We have surveyed candidate field, bathymetric mapping and target identification over 200 m depth, East Sea. In testing phase, We have provided environmental information of testing field include water column, seabed and weather condition in real time. And to compare excellency of developing InSAS, we have gather commercial imaging sonar system data with same target. This case study will support the Test Readiness Review of future underwater surveillance system developing via investigate marine testing field environment, testing facilities and planning.

Application of Deep Learning: A Review for Firefighting

  • Shaikh, Muhammad Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.73-78
    • /
    • 2022
  • The aim of this paper is to investigate the prevalence of Deep Learning in the literature on Fire & Rescue Service. It is found that deep learning techniques are only beginning to benefit the firefighters. The popular areas where deep learning techniques are making an impact are situational awareness, decision making, mental stress, injuries, well-being of the firefighter such as his sudden fall, inability to move and breathlessness, path planning by the firefighters while getting to an fire scene, wayfinding, tracking firefighters, firefighter physical fitness, employment, prediction of firefighter intervention, firefighter operations such as object recognition in smoky areas, firefighter efficacy, smart firefighting using edge computing, firefighting in teams, and firefighter clothing and safety. The techniques that were found applied in firefighting were Deep learning, Traditional K-Means clustering with engineered time and frequency domain features, Convolutional autoencoders, Long Short-Term Memory (LSTM), Deep Neural Networks, Simulation, VR, ANN, Deep Q Learning, Deep learning based on conditional generative adversarial networks, Decision Trees, Kalman Filters, Computational models, Partial Least Squares, Logistic Regression, Random Forest, Edge computing, C5 Decision Tree, Restricted Boltzmann Machine, Reinforcement Learning, and Recurrent LSTM. The literature review is centered on Firefighters/firemen not involved in wildland fires. The focus was also not on the fire itself. It must also be noted that several deep learning techniques such as CNN were mostly used in fire behavior, fire imaging and identification as well. Those papers that deal with fire behavior were also not part of this literature review.

Alternate Dispute Resolution - Free and Speedy Complaints Redressal Framework using Technology: Ombudsmanship at Proverbial Doorsteps in Pakistan

  • Phatak, Sohail Ahmad;Chaudhary, Muhammad Azam Ishaq;Khattak, Muhammad Sajid;Naveed, Anjum
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.344-354
    • /
    • 2022
  • Ombudsmanship is the framework to provide the speedy administrative justice to poor man which is originated in Sweden in the 19th Century and the modus operandi with modernized arrangement of public grievance redressal. Pakistan has thirteen different Ombudsman Institutions at both Federal and Provincial level with limited public accessibility. This paper presents a collaboration framework for extending the outreach of Ombudsmanship at proverbial doorstep of complainants. This framework has three main components as collaborative arrangements, Proceedings and Resolution of the complaints that increased the public trust. A pilot project titles Swift Complaint Resolution (SCR) was constructed and executed by Federal Ombudsman Secretariat to materialize the concept of speedy redressal of complaints. The SCR project first affirmed the strength of the components of the framework. The concept of SCR was first presented in the Federal Advisory committee for Administrative Justice, which comprised of highest level of the Parliamentarians, Public Officials, NGOs and Civil Society where presented guidelines to be adopted for the free and speedy redressal of grievances at proverbial doorsteps in tehsils and district headquarters ultimately to the extended to the union councils. In SCR, the complaints were decided within 25 days even though the Law permitted 60 days that is itself a record in any judicial /quasi-judicial forum.

Operators that Reduce Work and Information Overload

  • Sabir Abbas;Shane zahra;Muhammad Asif;khalid masood
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.65-70
    • /
    • 2023
  • The "information roadway" will give us an impact of new PC based assignments and administrations, yet the unusualness of this new condition will ask for another style of human-PC association, where the PC transforms into a sharp, dynamic and customized partner. Interface administrators are PC programs that use Artificial Intelligence frameworks to give dynamic help to a customer with PC based errands. Operators drastically change the present client encounter, through the similitude that a specialist can go about as an individual collaborator. The operator procures its capability by gaining from the client and from specialists helping different clients. A couple of model administrators have been gathered using this methodology, including authorities that give customized help with meeting planning, electronic mail taking care of, Smart Personal Assistant and choice of diversion. Operators help clients in a scope of various ways: they perform assignments for the client's sake; they can prepare or educate the client, they enable diverse clients to work together and they screen occasions and methods.

Predicting Brain Tumor Using Transfer Learning

  • Mustafa Abdul Salam;Sanaa Taha;Sameh Alahmady;Alwan Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.73-88
    • /
    • 2023
  • Brain tumors can also be an abnormal collection or accumulation of cells in the brain that can be life-threatening due to their ability to invade and metastasize to nearby tissues. Accurate diagnosis is critical to the success of treatment planning, and resonant imaging is the primary diagnostic imaging method used to diagnose brain tumors and their extent. Deep learning methods for computer vision applications have shown significant improvements in recent years, primarily due to the undeniable fact that there is a large amount of data on the market to teach models. Therefore, improvements within the model architecture perform better approximations in the monitored configuration. Tumor classification using these deep learning techniques has made great strides by providing reliable, annotated open data sets. Reduce computational effort and learn specific spatial and temporal relationships. This white paper describes transfer models such as the MobileNet model, VGG19 model, InceptionResNetV2 model, Inception model, and DenseNet201 model. The model uses three different optimizers, Adam, SGD, and RMSprop. Finally, the pre-trained MobileNet with RMSprop optimizer is the best model in this paper, with 0.995 accuracies, 0.99 sensitivity, and 1.00 specificity, while at the same time having the lowest computational cost.

Review on Energy Efficient Clustering based Routing Protocol

  • Kanu Patel;Hardik Modi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.169-178
    • /
    • 2023
  • Wireless sensor network is wieldy use for IoT application. The sensor node consider as physical device in IoT architecture. This all sensor node are operated with battery so the power consumption is very high during the data communication and low during the sensing the environment. Without proper planning of data communication the network might be dead very early so primary objective of the cluster based routing protocol is to enhance the battery life and run the application for longer time. In this paper we have comprehensive of twenty research paper related with clustering based routing protocol. We have taken basic information, network simulation parameters and performance parameters for the comparison. In particular, we have taken clustering manner, node deployment, scalability, data aggregation, power consumption and implementation cost many more points for the comparison of all 20 protocol. Along with basic information we also consider the network simulation parameters like number of nodes, simulation time, simulator name, initial energy and communication range as well energy consumption, throughput, network lifetime, packet delivery ration, jitter and fault tolerance parameters about the performance parameters. Finally we have summarize the technical aspect and few common parameter must be fulfill or consider for the design energy efficient cluster based routing protocol.

D.E.Cho : A Study on Smart City Data Security Model Using Blockchain Technology (블록체인 기술을 이용한 스마트시티 데이터 보안 모델 연구)

  • Do-Eun Cho
    • Journal of Platform Technology
    • /
    • v.12 no.2
    • /
    • pp.45-57
    • /
    • 2024
  • Smart cities are the product of modern urban planning that seeks to innovate information and communication technology and improve the quality of urban life. For the efficient operation of smart cities, data collected, stored, and processed in real time is a key resource. Therefore, data from smart cities collected in various fields must be managed safely, and personal information protection is paramount. In this study, a smart city data security model using blockchain technology was proposed to safely manage smart city data. The proposed model integrates IPFS into the blockchain network to distribute and store data to ensure data confidentiality and integrity, and encrypts data using CP-ABE to efficiently control access to data from users. In addition, privacy was guaranteed while enhancing the usability of data by using Homomorphic Encryption with data access control policies.

  • PDF

The Improvement Measures for the Establishment of Emergency Management System in Private Security (위험사회의 전개에 따른 민간경비 산업의 대응과제 - 위기관리를 중심으로)

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.103-125
    • /
    • 2005
  • Hazard are defined here as threat to life, well-being, material goods and environmental from the extremes of natural processes or technology. The challenges of natural and technology in increasing the exposure of people and property to risk pose a dilemma for any government seeking the fullest protection for its people and their property. As society progresses and as technology improves and becomes ever more intricate and far reaching, the human species is confronted with increasingly diverse and numerous catastrophic events. Not so infrequently, unfortunately, the impact of either a man-made or natural disaster is compounded by the fact that policy makers have neither prepared themselves or the public to respond appropriately to a disaster once the tragedy has struck. Many concerns have been raised for importance of emergency management after 1990's numerous urban disasters in Korea. Emergency management is the discipline and profession of applying science, technology, planning, and management to deal with extreme events that can injure or kill large numbers of people, cause extensive damage to property, and disrupt community life. When the primary function of private security is to protect lives and property of clients, emergency management should be included in the security service and many countermeasures should be carried out for that purpose. The purpose of this study is to establish ways and means needed to improve the private security emergency management system in Korea. This study is spilt into four chapters. Chapter I is the introduction part. Chapter II introduces the reader to a private security and emergency management theory, and Chapter III deals with the establishment of an effective emergency management system in Korea private security, Chapter IV is a conclusion. Policy makers and private security industry employers in Korea has not concerned with the importance of training and education by lack of recognition and has been passive about qualified guards. And the authorities supervising and the administrating the guards has not recognized the importance of private security and has neglected the training of the guards. In theses contexts, private security should develop and maintain a educational program of emergency management to meet their responsibilities to provide the protection and safety of the clients. Today's modern corporate security director, is, first of all, a competent, well-rounded business executive and, second, a 'service expert'. And, emergency management personnel in private security industry need continuous training.

  • PDF