• Title/Summary/Keyword: Sense of security

Search Result 260, Processing Time 0.025 seconds

SUPERSTABILITY OF A GENERALIZED EXPONENTIAL FUNCTIONAL EQUATION OF PEXIDER TYPE

  • Lee, Young-Whan
    • Communications of the Korean Mathematical Society
    • /
    • v.23 no.3
    • /
    • pp.357-369
    • /
    • 2008
  • We obtain the superstability of a generalized exponential functional equation f(x+y)=E(x,y)g(x)f(y) and investigate the stability in the sense of R. Ger [4] of this equation in the following setting: $$|\frac{f(x+y)}{(E(x,y)g(x)f(y)}-1|{\leq}{\varphi}(x,y)$$ where E(x, y) is a pseudo exponential function. From these results, we have superstabilities of exponential functional equation and Cauchy's gamma-beta functional equation.

Transfer Learning Using Convolutional Neural Network Architectures for Glioma Classification from MRI Images

  • Kulkarni, Sunita M.;Sundari, G.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.198-204
    • /
    • 2021
  • Glioma is one of the common types of brain tumors starting in the brain's glial cell. These tumors are classified into low-grade or high-grade tumors. Physicians analyze the stages of brain tumors and suggest treatment to the patient. The status of the tumor has an importance in the treatment. Nowadays, computerized systems are used to analyze and classify brain tumors. The accurate grading of the tumor makes sense in the treatment of brain tumors. This paper aims to develop a classification of low-grade glioma and high-grade glioma using a deep learning algorithm. This system utilizes four transfer learning algorithms, i.e., AlexNet, GoogLeNet, ResNet18, and ResNet50, for classification purposes. Among these algorithms, ResNet18 shows the highest classification accuracy of 97.19%.

Optimal Control Approach for a Smart Grid

  • Imen Amdouni;Naziha Labiadh;Lilia El amraoui
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.194-198
    • /
    • 2023
  • The current electricity networks will undergo profound changes in the years to come to be able to meet the growing demand for electricity, while minimizing the costs of consumers and producers, etc. The electricity network of tomorrow or even the intelligent « Smart Grids » network will be the convergence of two networks: the electricity network and the telecommunications network. In this context falls our work which aims to study the impact of the integration of energy decentralization into the electricity network. In this sense, we have implemented a new smart grid model where several coexisting suppliers can exchange information with consumers in real time. In addition, a new approach to energy distribution optimization has been developed. The simulation results prove the effectiveness of this approach in improving energy exchange and minimizing consumer purchase costs and line losses.

A Survey of Machine Translation and Parts of Speech Tagging for Indian Languages

  • Khedkar, Vijayshri;Shah, Pritesh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.245-253
    • /
    • 2022
  • Commenced in 1954 by IBM, machine translation has expanded immensely, particularly in this period. Machine translation can be broken into seven main steps namely- token generation, analyzing morphology, lexeme, tagging Part of Speech, chunking, parsing, and disambiguation in words. Morphological analysis plays a major role when translating Indian languages to develop accurate parts of speech taggers and word sense. The paper presents various machine translation methods used by different researchers for Indian languages along with their performance and drawbacks. Further, the paper concentrates on parts of speech (POS) tagging in Marathi dialect using various methods such as rule-based tagging, unigram, bigram, and more. After careful study, it is concluded that for machine translation, parts of speech tagging is a major step. Also, for the Marathi language, the Hidden Markov Model gives the best results for parts of speech tagging with an accuracy of 93% which can be further improved according to the dataset.

ON THE STABILITY OF A BETA TYPE FUNCTIONAL EQUATIONS

  • Kim, Gwang-Hui;Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • v.14 no.1_2
    • /
    • pp.429-445
    • /
    • 2004
  • In this paper we investigate the generalized Hyers-Ulam-Rassias stability for a functional equation of the form $f(\varphi(x,y)){\;}={\;}\phi(x,y)f(x,y)$, where x, y lie in the set S. As a consequence we obtain stability in the sense of Hyers, Ulam, Rassias, Gavruta, for some well-known equations such as the gamma, beta and G-function type equations.

Using GIS to Find the Best Safe Route between Khartoum and Arqin-Crossing

  • Mumdouh M.M Hassan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.43-52
    • /
    • 2023
  • The paper aims to clarify how to make a decision using geographic information systems and how to choose the best route between two cities to suit the expectations of the driver and his sense of safety and comfort on the road. Use a special model for network analysis, where the network analysis tool relied on the following data (maximum speed of the road - number of intersections - road width - peak period) in choosing the best safe path. The paper concluded that the best safe route for refugees between the cities of Khartoum - Arqin crossing is ( Khartoum - Shendi - Atbara - Meroe - Abu Hamad - Wadi Halfa). We advise all GIS users to use the theories of spatial analysis when creating a new model.

IMAGE ENCRYPTION THROUGH THE BIT PLANE DECOMPOSITION

  • Kim, Tae-Sik
    • The Pure and Applied Mathematics
    • /
    • v.11 no.1
    • /
    • pp.1-14
    • /
    • 2004
  • Due to the development of computer network and mobile communications, the security in image data and other related source are very important as in saving or transferring the commercial documents, medical data, and every private picture. Nonetheless, the conventional encryption algorithms are usually focusing on the word message. These methods are too complicated or complex in the respect of image data because they have much more amounts of information to represent. In this sense, we proposed an efficient secret symmetric stream type encryption algorithm which is based on Boolean matrix operation and the characteristic of image data.

  • PDF

STABILITY OF A BETA-TYPE FUNCTIONAL EQUATION WITH A RESTRICTED DOMAIN

  • Lee, Young-Whan;Choi, Byung-Mun
    • Communications of the Korean Mathematical Society
    • /
    • v.19 no.4
    • /
    • pp.701-713
    • /
    • 2004
  • We obtain the Hyers-Ulam-Rassias stability of a betatype functional equation $f(\varphi(x),\phi(y))$ = $ \psi(x,y)f(x,y)+ \lambda(x,y)$ with a restricted domain and the stability in the sense of R. Ger of the equation $f(\varphi(x),\phi(y))$ = $ \psi(x,y)f(x,y)$ with a restricted domain in the following settings: $g(\varphi(x),\phi(y))-\psi(x,y)g(s,y)-\lambda(x,y)$\mid$\leq\varepsilon(x,y)$ and $\frac{g(\varphi(x),\phi(y))}{\psi(x,y),g(x,y)}-1 $\mid$ \leq\epsilon(x,y)$.

A Study on Period Division According to Overall Revision of 「Security Services Industry Act」 (「경비업법」제·개정에 따른 민간경비의 시대적 구분)

  • Park, Su Hyeon;Kim, Byung Tae;Choi, Dong
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.195-213
    • /
    • 2019
  • 「Security Services Industry Act」made in 1976 for the purpose of contributing to the good operation of services industry by establishing the requirements for promotion, development and systematic management of services industry has been since 26 times of overall revisions. Period division of private security through overall revision of 「Security Services Industry Act」 can be roughly divided into three periods. The first is a settlement period. It is a period when the present five business areas were completed rom 1976 to 2001. Beginning with facility and escort security in 1996, five types of jobs have been prepared. so far by adding personal protection in 1996, and machine and special security in 2001. The second is a quantitative growth period. It is a period when quantitative development is made on the institutional basis. As various culture, sports and arts events are increasing based on the demand of security services due to an increase in the people's sense of security, quantitative development was made, which additionally influenced the downward trend of capital and the possibility of having two jobs through revisions. The third is a qualitative growth period. From 2013 to the present is a period when quantitative growth has slowed and qualitative growth has been made. After the period of quantitative growth, the growth slowed down. However, by raising the criteria for permission of services industry through creation of a rule for the group civil petition, by raising capital, by institutionally compensating for diverse punishment regulations, by realizing the training hours for new security guards, by permitting private education, etc, the reliability and professionality of a security guard job has been to be recovered.

Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks

  • Wang, An;Zheng, Xuexin;Wang, Zongyue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1094-1107
    • /
    • 2013
  • NTRU cryptosystem has been suggested for protecting wireless body area networks, which is secure in the sense of traditional cryptanalysis. In this paper, we fulfill the first power analysis attack on the ultra-low-power environment of wireless body area networks. Specifically, two practical differential power analyses on NTRU algorithm are proposed, which can attack the existing countermeasures of NTRU. Accordingly, we suggest three countermeasures against our attacks. Meanwhile, practical experiments show that although the attacks in this paper are efficient, our countermeasures can resist them effectively.