• Title/Summary/Keyword: Security technologies

Search Result 1,846, Processing Time 0.023 seconds

Problems of Distance Learning in Specialists Training in Modern Terms of The Informative Society During COVID-19

  • Kuchai, Oleksandr;Yakovenko, Serhii;Zorochkina, Tetiana;Оkolnycha, Tetiana;Demchenko, Iryna;Kuchaі, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.143-148
    • /
    • 2021
  • The article considers the training of specialists in education in the conditions of distance learning. It is lights up the advantages of distance learning and determined the characteristic features of distance learning of students training in the implementation of these technologies in the educational process. The article focuses on the main aspects of computerization of studies as a technological breach in methodology, organization and practical realization of educational process and informative culture of a teacher. Information technologies are intensive involved in life of humanity, educational process of schools and higher educational establishments. Intercommunication is examined between the processes of informatization of the society and education.

Enhanced Security Framework for E-Health Systems using Blockchain

  • Kubendiran, Mohan;Singh, Satyapal;Sangaiah, Arun Kumar
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.239-250
    • /
    • 2019
  • An individual's health data is very sensitive and private. Such data are usually stored on a private or community owned cloud, where access is not restricted to the owners of that cloud. Anyone within the cloud can access this data. This data may not be read only and multiple parties can make to it. Thus, any unauthorized modification of health-related data will lead to incorrect diagnosis and mistreatment. However, we cannot restrict semipublic access to this data. Existing security mechanisms in e-health systems are competent in dealing with the issues associated with these systems but only up to a certain extent. The indigenous technologies need to be complemented with current and future technologies. We have put forward a method to complement such technologies by incorporating the concept of blockchain to ensure the integrity of data as well as its provenance.

Intensification Of Cognitive Activity Of Higher Education Seekers As A Central Problem Of Modern Didactics

  • Kharkivska, Aryna;Honcharuk, Valentyna;Tyurina, Valentyna;Yuldasheva, Svitlana;Koval, Liudmyla;Poliakova, Olha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.161-166
    • /
    • 2022
  • The article describes technologies in a unified methodological vein, since teaching based on them at the present stage is clearly eclectic in nature and depends on the individual - "biased" - professional attitude of teachers to technologies and those ideologies that gave rise to them. In this article, the future teacher will get acquainted with only some of these technologies. With the hope that this article will help the future teacher understand the essence of the technological approach, determine his pedagogical position and improve his pedagogical culture.

Obstructions of Using Educational Technology in Gifted Students' Schools In Jeddah: Learners' Voices

  • Alammari, Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.250-254
    • /
    • 2022
  • This study touched on the limitations of educational technologies in gifted students' schools depending on the learners' viewpoints. The descriptive approach was used, and the tool was represented in a questionnaire distributed to a sample of 196 gifted secondary school students in Jeddah. Results showed moderate obstacles to educational technologies in gifted students' schools. The general mean of the responses of the study sample was 2.76. based on the findings, the author suggested some recommendations to reduce the difficulties that gifted students face in using educational technologies, as well as provide gifted students with electronic applications in order to their development, and especially the development of school buildings for gifted students with modern devices to help them facilitate the use of technology.

Information And Communication Communication Technologies In The System Of Distance Education

  • Hubarieva, Daria;Polisuchenko, Anna;Matviienko, Olena;Savenko, Oksana;Hrebnieva, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.287-293
    • /
    • 2021
  • The purpose of this article is to consider the distance education system, its principles, features and means. One of its existing and promising tools is video conferencing. The article discusses the types of video conferencing, hardware and software, features and requirements for communication channels, types of information transmitted through these channels.

Digital Management System in a Business Environment

  • Veresklia, Mariana;Mykhalitska, Nataliia;Trut, Olha;Honchar, Svitlana;Larin, Stanislav
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.217-223
    • /
    • 2022
  • In modern business conditions, the improvement of business processes cannot do without digitalization. Digital technologies allow businesses to conquer markets, quickly introduce new technologies not only into production processes, but also at all levels of economic activity. The rapid pace of development of information, communication and economic spheres determine the relevance of the research topic and the goals that digital management solves. Today, the use of digital equipment and platforms makes it possible to form the basis for the formation of competitive business advantages, minimize costs, and most importantly, respond in time to changes in both the internal and external environment..Thus, the main task of the study is to analyze the digital management system in a business environment. As a result of the study, current trends and prerequisites for digital management system in a business environment were investigated.

A Preliminary Exploration on Component Based Software Engineering

  • Basha, N Md Jubair;Ganapathy, Gopinath;Moulana, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.143-148
    • /
    • 2022
  • Component-based software development (CBD) is a methodology that has been embraced by the software industry to accelerate development, save costs and timelines, minimize testing requirements, and boost quality and output. Compared to the conventional software development approach, this led to the system's development being completed more quickly. By choosing components, identifying systems, and evaluating those systems, CBSE contributes significantly to the software development process. The objective of CBSE is to codify and standardize all disciplines that support CBD-related operations. Analysis of the comparison between component-based and scripting technologies reveals that, in terms of qualitative performance, component-based technologies scale more effectively. Further study and application of CBSE are directly related to the CBD approach's success. This paper explores the introductory concepts and comparative analysis related to component-based software engineering which have been around for a while, but proper adaption of CBSE are still lacking issues are also focused.

Marketing Technologies In Educational Management: Current Problems

  • Zhytomyrska, Tetiana;Zrybnieva, Iryna;Romaniuk, Nadiia;Havrysh, Iryna;Gorditsa, Tetyana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.298-302
    • /
    • 2022
  • The article considers in detail the possibilities and significance of marketing technologies for additional education programs as the most flexible and adaptive component of the educational process. Moreover, additional education programs are the most market-defined. Also at this stage, we have developed the structure of the e-mail message about ongoing additional educational programs in order to promote them, and on its basis, we have prepared an example of a letter for e-mail.informational and educational mailing using techniques to attract the attention of the addressee in order to promote additional educational programs.The content of the letter was also formed for students of the electronic course "Education Marketing", sent out in order to monitor the educational process.

Theoretical Aspects Of Innovation Processes In The Holistic Educational Process

  • Prokopenko, Alona;Chukhrai, Liubov;Behal, Tetiana;Pustovalov, Sergii;Kliuchko, Yuliia;Khimchuk, Liliana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.382-389
    • /
    • 2022
  • The article is devoted to the research and search for effective pedagogical technologies. The definitions of "innovation", "technologicalization", "pedagogical technology" are analyzed. "Innovative pedagogical technology". The blocks that make up the innovative processes in education are studied. The importance and role of innovations in education (vocational education) are clarified. The components of pedagogical technology are studied: conceptual, content-procedural and professional. The signs of classifications of pedagogical technologies are investigated. The stages of evolution of the definition of "pedagogical technology", as well as the levels of its application in pedagogical science are highlighted. Criteria of manufacturability and signs of pedagogical technology are investigated.The algorithm for the analysis of pedagogical technology is investigated: identification of technology; name of technology; conceptual principles; the content of education; activity characteristics; organizational and methodological support of the educational process. Pedagogical technologies that should be implemented in vocational education institutions are analyzed.

A Study on the Design of the Gateway for a Strong and Safe Mobile Agent System (강하고 안전한 이동 에이전트 시스템을 위한 게이트웨이 설계에 관한 연구)

  • Kim Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.183-188
    • /
    • 2004
  • In the course of Internet proliferation. many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most Promising among the new paradigms is use of mobile agents. It also however, suffers from a major drawback, namely the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper proposed the design of strong and safe mobile agent gateway that split and merge the agent code with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.

  • PDF