• 제목/요약/키워드: Sense of security

검색결과 260건 처리시간 0.02초

SUPERSTABILITY OF A GENERALIZED EXPONENTIAL FUNCTIONAL EQUATION OF PEXIDER TYPE

  • Lee, Young-Whan
    • 대한수학회논문집
    • /
    • 제23권3호
    • /
    • pp.357-369
    • /
    • 2008
  • We obtain the superstability of a generalized exponential functional equation f(x+y)=E(x,y)g(x)f(y) and investigate the stability in the sense of R. Ger [4] of this equation in the following setting: $$|\frac{f(x+y)}{(E(x,y)g(x)f(y)}-1|{\leq}{\varphi}(x,y)$$ where E(x, y) is a pseudo exponential function. From these results, we have superstabilities of exponential functional equation and Cauchy's gamma-beta functional equation.

Transfer Learning Using Convolutional Neural Network Architectures for Glioma Classification from MRI Images

  • Kulkarni, Sunita M.;Sundari, G.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권2호
    • /
    • pp.198-204
    • /
    • 2021
  • Glioma is one of the common types of brain tumors starting in the brain's glial cell. These tumors are classified into low-grade or high-grade tumors. Physicians analyze the stages of brain tumors and suggest treatment to the patient. The status of the tumor has an importance in the treatment. Nowadays, computerized systems are used to analyze and classify brain tumors. The accurate grading of the tumor makes sense in the treatment of brain tumors. This paper aims to develop a classification of low-grade glioma and high-grade glioma using a deep learning algorithm. This system utilizes four transfer learning algorithms, i.e., AlexNet, GoogLeNet, ResNet18, and ResNet50, for classification purposes. Among these algorithms, ResNet18 shows the highest classification accuracy of 97.19%.

Optimal Control Approach for a Smart Grid

  • Imen Amdouni;Naziha Labiadh;Lilia El amraoui
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.194-198
    • /
    • 2023
  • The current electricity networks will undergo profound changes in the years to come to be able to meet the growing demand for electricity, while minimizing the costs of consumers and producers, etc. The electricity network of tomorrow or even the intelligent « Smart Grids » network will be the convergence of two networks: the electricity network and the telecommunications network. In this context falls our work which aims to study the impact of the integration of energy decentralization into the electricity network. In this sense, we have implemented a new smart grid model where several coexisting suppliers can exchange information with consumers in real time. In addition, a new approach to energy distribution optimization has been developed. The simulation results prove the effectiveness of this approach in improving energy exchange and minimizing consumer purchase costs and line losses.

A Survey of Machine Translation and Parts of Speech Tagging for Indian Languages

  • Khedkar, Vijayshri;Shah, Pritesh
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.245-253
    • /
    • 2022
  • Commenced in 1954 by IBM, machine translation has expanded immensely, particularly in this period. Machine translation can be broken into seven main steps namely- token generation, analyzing morphology, lexeme, tagging Part of Speech, chunking, parsing, and disambiguation in words. Morphological analysis plays a major role when translating Indian languages to develop accurate parts of speech taggers and word sense. The paper presents various machine translation methods used by different researchers for Indian languages along with their performance and drawbacks. Further, the paper concentrates on parts of speech (POS) tagging in Marathi dialect using various methods such as rule-based tagging, unigram, bigram, and more. After careful study, it is concluded that for machine translation, parts of speech tagging is a major step. Also, for the Marathi language, the Hidden Markov Model gives the best results for parts of speech tagging with an accuracy of 93% which can be further improved according to the dataset.

ON THE STABILITY OF A BETA TYPE FUNCTIONAL EQUATIONS

  • Kim, Gwang-Hui;Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • 제14권1_2호
    • /
    • pp.429-445
    • /
    • 2004
  • In this paper we investigate the generalized Hyers-Ulam-Rassias stability for a functional equation of the form $f(\varphi(x,y)){\;}={\;}\phi(x,y)f(x,y)$, where x, y lie in the set S. As a consequence we obtain stability in the sense of Hyers, Ulam, Rassias, Gavruta, for some well-known equations such as the gamma, beta and G-function type equations.

Using GIS to Find the Best Safe Route between Khartoum and Arqin-Crossing

  • Mumdouh M.M Hassan
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.43-52
    • /
    • 2023
  • The paper aims to clarify how to make a decision using geographic information systems and how to choose the best route between two cities to suit the expectations of the driver and his sense of safety and comfort on the road. Use a special model for network analysis, where the network analysis tool relied on the following data (maximum speed of the road - number of intersections - road width - peak period) in choosing the best safe path. The paper concluded that the best safe route for refugees between the cities of Khartoum - Arqin crossing is ( Khartoum - Shendi - Atbara - Meroe - Abu Hamad - Wadi Halfa). We advise all GIS users to use the theories of spatial analysis when creating a new model.

IMAGE ENCRYPTION THROUGH THE BIT PLANE DECOMPOSITION

  • Kim, Tae-Sik
    • 한국수학교육학회지시리즈B:순수및응용수학
    • /
    • 제11권1호
    • /
    • pp.1-14
    • /
    • 2004
  • Due to the development of computer network and mobile communications, the security in image data and other related source are very important as in saving or transferring the commercial documents, medical data, and every private picture. Nonetheless, the conventional encryption algorithms are usually focusing on the word message. These methods are too complicated or complex in the respect of image data because they have much more amounts of information to represent. In this sense, we proposed an efficient secret symmetric stream type encryption algorithm which is based on Boolean matrix operation and the characteristic of image data.

  • PDF

STABILITY OF A BETA-TYPE FUNCTIONAL EQUATION WITH A RESTRICTED DOMAIN

  • Lee, Young-Whan;Choi, Byung-Mun
    • 대한수학회논문집
    • /
    • 제19권4호
    • /
    • pp.701-713
    • /
    • 2004
  • We obtain the Hyers-Ulam-Rassias stability of a betatype functional equation $f(\varphi(x),\phi(y))$ = $ \psi(x,y)f(x,y)+ \lambda(x,y)$ with a restricted domain and the stability in the sense of R. Ger of the equation $f(\varphi(x),\phi(y))$ = $ \psi(x,y)f(x,y)$ with a restricted domain in the following settings: $g(\varphi(x),\phi(y))-\psi(x,y)g(s,y)-\lambda(x,y)$\mid$\leq\varepsilon(x,y)$ and $\frac{g(\varphi(x),\phi(y))}{\psi(x,y),g(x,y)}-1 $\mid$ \leq\epsilon(x,y)$.

「경비업법」제·개정에 따른 민간경비의 시대적 구분 (A Study on Period Division According to Overall Revision of 「Security Services Industry Act」)

  • 박수현;김병태;최동재
    • 시큐리티연구
    • /
    • 제58호
    • /
    • pp.195-213
    • /
    • 2019
  • 경비업의 육성 및 발전과 그 체계적 관리에 관하여 필요한 사항을 정해 경비업의 건전한 운영에 이바지함을 목적으로 1976년에 만들어진 「경비업법」은 법의 제정 이후 「경비업법」이 26차례의 제·개정을 거치면서 현재에 이르고 있다. 「경비업법」의 제·개정을 통한 민간 경비의 시대적 구분은 크게 3가지 시기로 나눠볼 수 있다. 첫 번째 정착기이다. 1976년~2001년까지 지금의 5가지 업무영역이 완성되는 시기이다. 1976년에 시설경비와 호송경비를 시작으로 1996년 신변보호, 2001년에 기계경비와 특수경비업무가 추가되면서 지금의 5가지 업무형태로 갖추게 되었다. 두 번째 성장기(양적)이다. 2002년~2013년까지 제도적인 기반 위에 양적인 발전을 이루는 시기이다. 국민의 안전의식 증가로 안전서비스의 수요를 바탕으로 각종 문화·체육·예술 행사가 증가하면서 양적인 발전이 일어났고, 더불어 개정을 통한 자본금 하양과 겸업의 가능이 영향을 미쳤다. 세 번째 성장기(질적)이다. 2013년~현재까지 양적인 성장이 둔해지고 질적인 성장을 이루는 시기이다. 양적인 성장기 이후에 성장세는 둔화하였지만, 집단민원현장에 대한 규정을 두고, 자본금의 상향으로 경비업 허가기준을 높이고, 각종 처벌규정의 제도적인 보완, 경비원 신임교육시간의 현실화와 개인 교육 허용 등으로 경비원 직업의 신뢰와 전문성을 회복하려고 하였다.

Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks

  • Wang, An;Zheng, Xuexin;Wang, Zongyue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.1094-1107
    • /
    • 2013
  • NTRU cryptosystem has been suggested for protecting wireless body area networks, which is secure in the sense of traditional cryptanalysis. In this paper, we fulfill the first power analysis attack on the ultra-low-power environment of wireless body area networks. Specifically, two practical differential power analyses on NTRU algorithm are proposed, which can attack the existing countermeasures of NTRU. Accordingly, we suggest three countermeasures against our attacks. Meanwhile, practical experiments show that although the attacks in this paper are efficient, our countermeasures can resist them effectively.