• Title/Summary/Keyword: Security Test

Search Result 1,261, Processing Time 0.03 seconds

Determining Dimensions of Job Satisfaction among Employees: Evidence from Commercial Bank Industries in Bangladesh

  • Md. Sayed, UDDIN;Md. Atikur, RAHAMAN;Wasib Bin, LATIF
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.10 no.2
    • /
    • pp.195-201
    • /
    • 2023
  • Since the banking industry relies so heavily on strong customer-staff interactions, measuring employee job satisfaction has become a critical problem. To achieve benefits for both individuals and organizations, it is crucial to foster and ensure employee job satisfaction. The main objective of this study is to determine the influencing factors of employees' job satisfaction in commercial banks in Bangladesh. This study focused on some significant factors such as employee empowerment, job security, management support, and attractive compensation in an organization. In terms of research purpose, non-probability convenience sampling has been used, and the study is quantitative in nature. For data collection purposes, an online survey questionnaire was prepared based on previously published articles. The targeted population was the bank employees of commercial banks in Bangladesh where the final sample size was n = 200. For analyzing the collected data, SPSS 26.0 version has been used to test the study model and the proposed hypotheses. This study also shows that employee empowerment, job security, management support, and attractive compensation have positive and significant effects on employees' job satisfaction at the workplace. Finally, this study has offered some extraordinary directions and implications for future research on commercial bank authorities in Bangladesh.

Adversarial Machine Learning: A Survey on the Influence Axis

  • Alzahrani, Shahad;Almalki, Taghreed;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.193-203
    • /
    • 2022
  • After the everyday use of systems and applications of artificial intelligence in our world. Consequently, machine learning technologies have become characterized by exceptional capabilities and unique and distinguished performance in many areas. However, these applications and systems are vulnerable to adversaries who can be a reason to confer the wrong classification by introducing distorted samples. Precisely, it has been perceived that adversarial examples designed throughout the training and test phases can include industrious Ruin the performance of the machine learning. This paper provides a comprehensive review of the recent research on adversarial machine learning. It's also worth noting that the paper only examines recent techniques that were released between 2018 and 2021. The diverse systems models have been investigated and discussed regarding the type of attacks, and some possible security suggestions for these attacks to highlight the risks of adversarial machine learning.

An Interactive Whiteboard on Smart Phones for Ubiquitous Collaboration (유비쿼터스 협업을 위한 스마트폰 환경에서의 인터랙티브 화이트보드)

  • Ha, Wonjeong;Kim, Kangseok;Yeh, Hongjin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.151-154
    • /
    • 2011
  • 유비쿼터스 협업 (Ubiquitous Collaboration)은 유비쿼터스 환경에서 다양한 이기종 디바이스 (PC, Tablet PC, Smart Phone, etc)들이 유무선망을 통해 언제 어디서나 원하는 서비스를 주고 받을 수 있는 시스템으로 시간과 장소에 상관없이 다양한 데이터를 주고 받을 수 있다. 스마트폰의 보편화, 하드웨어 / 소프트웨어 그리고 무선망의 진화로 협업의 중요성은 점점 증가하고 있다. 본 연구에서는 스마트폰 환경에서 이미지, 도형, 텍스트 등의 도구를 사용 협업하는 인터랙티브 화이트보드 어플리케이션(Interactive Whiteboard Application on Smart Phone)을 사용하여 다양한 환경의 사용자들이 서로 다른 이기종 디바이스와 함께 통신하는 방법을 보인다. 또한 서로 다른 이기종 디바이스 간 그룹 통신에서 오는 동기화(Synchronization), 비동기화(Asynchronization), 또한 다른 화면 크기로 부터 발생되는 서로 다른 이미지 크기 표현문제를 극복하기 위한 사용성 평가실험(Usability Test)을 통하여 연구의 타당성 및 우수성을 증명해 보이고자 한다.

Dynamism Competent LEACH Replication Deliberate for Wireless Sensor Network

  • KONDA HARI KRISHNA;TAPSI NAGPAL;Y. SURESH BABU
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.7-12
    • /
    • 2023
  • Remote sensor systems are utilized in a few applications, including military, restorative, ecological and family unit. In every one of these applications, vitality use is the deciding component in the execution of wireless sensor systems. Thusly, strategies for information steering and exchanging to the base station are critical in light of the fact that the sensor hubs keep running on battery control and the vitality accessible for sensors is constrained. There are two explanations for the various leveled directing Low Energy Adaptive Clustering Hierarchy convention be in investigated. One, the sensor systems are thick and a considerable measure of excess is engaged with correspondence. Second, with a specific end goal to build the versatility of the sensor arrange remembering the security parts of correspondence. In this exploration paper usage of LEACH steering convention utilizing NS2 test system lastly upgraded vitality productive EE-LEACH directing convention guarantees that the chose cluster heads will be consistently conveyed over the system with a specific end goal to enhance the execution of the LEACH convention. EE-LEACH enhances vitality utilization by around 43%.

Malwares Attack Detection Using Ensemble Deep Restricted Boltzmann Machine

  • K. Janani;R. Gunasundari
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.64-72
    • /
    • 2024
  • In recent times cyber attackers can use Artificial Intelligence (AI) to boost the sophistication and scope of attacks. On the defense side, AI is used to enhance defense plans, to boost the robustness, flexibility, and efficiency of defense systems, which means adapting to environmental changes to reduce impacts. With increased developments in the field of information and communication technologies, various exploits occur as a danger sign to cyber security and these exploitations are changing rapidly. Cyber criminals use new, sophisticated tactics to boost their attack speed and size. Consequently, there is a need for more flexible, adaptable and strong cyber defense systems that can identify a wide range of threats in real-time. In recent years, the adoption of AI approaches has increased and maintained a vital role in the detection and prevention of cyber threats. In this paper, an Ensemble Deep Restricted Boltzmann Machine (EDRBM) is developed for the classification of cybersecurity threats in case of a large-scale network environment. The EDRBM acts as a classification model that enables the classification of malicious flowsets from the largescale network. The simulation is conducted to test the efficacy of the proposed EDRBM under various malware attacks. The simulation results show that the proposed method achieves higher classification rate in classifying the malware in the flowsets i.e., malicious flowsets than other methods.

Legal Issues Regarding the Launch Vechicle by DPRK : the Scope and Limit of the UN Security Council Resolution (북한의 발사체발사에 따른 법적 쟁점 : UN 안전보장이사회 결의의 성격과 한계)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.31 no.1
    • /
    • pp.145-167
    • /
    • 2016
  • UN Security Council is entitled to power for determining the existence of the threat to the peace. Specifying the provisions adopted in accordance with the chapter 7 of the UN Charter, its resolution is deemed as document confirming its decision about the threat to the peace. In general, resolutions adopted by the Security Council acting under Chapter VII of the Charter, are considered binding, in accordance with Article 25 of the Charter. Regarding to the terms of the Resolutions to be interpreted, the word "decide" is used as to the suspension of the ballistic missile program, the word "demand" is used as to the stopping of the the launch of ballistic missile, and the word "demand" is used as to return to the missile test moratorium. These provisions may be deemed to determining specific obligations to be imposed upon the States in accordance with the 1967 Outer Space Treaty. On the other hand, the Resolutions may be limited to the decision, not leading to a sort of international legislation, the main purpose of which is to provide a legal basis for international sanctions against Northe Korea. North Korea missile test case has reminded us of continuing discussion about whether the decision of the Security Council lacks the legislative authority due to its decision process. Furthermore, having regard to the outer space and space activities, the outer space law regime would be not compatible with the Security Council decision process in that the former presupposes the agreement among all States parties, while the latter based upon the agreement between Council member States. Therefore, it is premature to consider the Security Council decision as becoming the lex specialis of the space law regime.

Derivation of Probability Plot Correlation Coefficient Test Statistics and Regression Equation for the GEV Model based on L-moments (L-모멘트 법 기반의 GEV 모형을 위한 확률도시 상관계수 검정 통계량 유도 및 회귀식 산정)

  • Ahn, Hyunjun;Jeong, Changsam;Heo, Jun-Haeng
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.1
    • /
    • pp.1-11
    • /
    • 2020
  • One of the important problem in statistical hydrology is to estimate the appropriated probability distribution for a given sample data. For the problem, a goodness-of-fit test is conducted based on the similarity between estimated probability distribution and assumed theoretical probability distribution. Probability plot correlation coefficient test (PPCC) is one of the goodness-of-fit test method. PPCC has high rejection power and its application is simple. In this study, test statistics of PPCC were derived for generalized extreme value distribution (GEV) models based on L-moments and these statistics were suggested by the multiple and nonlinear regression equations for its usability. To review the rejection power of the newly proposed method in this study, Monte Carlo simulation was performed with other goodness-of-fit tests including the existing PPCC test. The results showed that PPCC-A test which is proposed in this study demonstrated better rejection power than other methods, including the existing PPCC test. It is expected that the new method will be helpful to estimate the appropriate probability distribution model.

Can tailored home-delivered meal services alleviate self-rated frailty of the low-income older adults in Korea?

  • Junghyun Kim;Hyeja Chang
    • Nutrition Research and Practice
    • /
    • v.17 no.5
    • /
    • pp.1007-1018
    • /
    • 2023
  • BACKGROUND/OBJECTIVES: This study aimed to examine whether the tailored home-delivered meal (HDM) services included nutrition counseling impacts alleviating self-rated frailty among low-income older adults in Korea. SUBJECTS/METHODS: Pre- and post-test were implemented on May 27 and on November 25 in 2019 during 3 weeks, respectively, before and after the 6 months intervention program. Participants completed a questionnaire measuring frailty, malnutrition, food security, depression, and underlying diseases. Initially, 136 older adults were selected as participants for this study, they were recipients of a free meal program from 2 senior welfare centers in Seoul, the final sample size of those who completed the intervention program was 117 (female 70.9%, male 29.1%). Statistical analyses were conducted with IBM SPSS package program, paired t-test and χ2 test to validate the test. RESULTS: There were statistically significant differences in the score of the Tilburg Frailty Indicator (TFI) before and after receiving the tailored HDM services (pre-test 9.46, post-test 2.8, P < 0.01). The differences in the score of TFI by 3 risk groups at the pre-test decreased as a result of receiving these services. CONCLUSIONS: The tailored HDM services alleviated the self-rated frailty of low-income older adults with limited mobility in a community setting. Based on the positive outcomes this study could be applied to developing social services for aging in place.

A Study on Living Space with the Internet Information Appliances (인터넷 정보가전을 활용한 주거공간 연구)

  • 전흥수;김주연
    • Korean Institute of Interior Design Journal
    • /
    • no.28
    • /
    • pp.44-50
    • /
    • 2001
  • This study propose the new concept of residence by analyzing the change of residence through the characteristic of popularity and degree of development of technology on home network information appliance for intelligent home. Accordingly, Cyber village represented as home automation and extend to information of society. it encourage need of information and multimedia of home. It expect home information infrastructure for accepting informations, which make smart home to linked home-working home-learning home-treatment. home-shopping and home-banking. The system of intelligent home is the intelligence of human-biology in the side of environmental friendly and multi-function. it distinguish the system of security, controlling system of inside environment, supporting system of house-working, automatic controlling, house working. Future house require to meet demand of young generation, such as small residental space, the multi-functional space, the flexible space, making mood for dual income couple and of single as intelligent home. Accordingly, basic purpose which are pleasantness, the safe and the convenience the mobile multi-function as well as networking with controlling of temperature, security, health-test, home-entertainment, home-office and consider environment together.

  • PDF

The Material Values, Attitudes toward Money, and Money Use Behavior of Female Collegians (여자대학생의 물질주의 가치성향과 화폐에 대한 태도 및 금전사용행동)

  • 홍은실;황덕순;한경미
    • Journal of Families and Better Life
    • /
    • v.19 no.1
    • /
    • pp.143-158
    • /
    • 2001
  • The purpose of this study was to examine the influences of the material values, attitudes toward money, and the background variables to the money use behavior of female collegians. The samples were selected from 541 female collegians. Cronbach$\alpha$, One-way ANOVA, Duncan test, Multiple regression, Path analysis were used as statistical analysis. The results were summarized as follows : Resulting from multiple regression analysis, the money use behavior of female collegians had the positive linear relationships with the variables such as mothers level of education, material values, and 3 money attitude - the means of security, the symbol of anxiety, the means of pleasure - in five money attitude dimensions. The most influential variable was money attitude of the means of security.

  • PDF