• Title/Summary/Keyword: Sense of security

Search Result 260, Processing Time 0.023 seconds

The Significance of Professional Subjectivity of a Specialist in Taking into Account Educational and Civilizational Changes in the Information Society

  • Podkovyroff, Tatiana Sonia Nanouchka;Golubenko, Natalya;Altanova, Alona;Shkodyn, Alona;Bielikova, Valentyna;Pasynchuk, Kateryna;Bida, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.83-90
    • /
    • 2022
  • A forecast foresight of the conditions for the development of educational affairs in the Information Society of Ukraine is presented, taking into account changes in the technique, technologies, and the socio-social sphere. Unresolved problems in Ukraine regarding the modernization and improvement of the education system by means of informatization are highlighted. The need for further improvement of Ukrainian education by means of informatization is noted. Formulated the main goal of future education. The necessary conditions for the successful development of future education are highlighted. The role and place of the key figure of the teacher in the education of the future is determined. The article highlights the theoretical and philosophical foundations of professional subjectivity of the future specialist. Recently, the world's pedagogical thought has increasingly focused on how to build an educational process so that it brings a sense of happiness to all its participants. It is believed that this is a new management philosophy in general, although its origins are in ancient Greek sources, which claim that only a happy life has meaning and value. It is found out that the professional subjectivity of a specialist is an important professionally significant quality of the individual, which provides a purposeful and optimal implementation of their mental, personal resources for solving professional and life problems, which is manifested in the desire for self-definition, self-determination, self-regulation and self-improvement in professional activities taking into account the information society. The structure of this phenomenon is shown.

Towards Low Complexity Model for Audio Event Detection

  • Saleem, Muhammad;Shah, Syed Muhammad Shehram;Saba, Erum;Pirzada, Nasrullah;Ahmed, Masood
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.175-182
    • /
    • 2022
  • In our daily life, we come across different types of information, for example in the format of multimedia and text. We all need different types of information for our common routines as watching/reading the news, listening to the radio, and watching different types of videos. However, sometimes we could run into problems when a certain type of information is required. For example, someone is listening to the radio and wants to listen to jazz, and unfortunately, all the radio channels play pop music mixed with advertisements. The listener gets stuck with pop music and gives up searching for jazz. So, the above example can be solved with an automatic audio classification system. Deep Learning (DL) models could make human life easy by using audio classifications, but it is expensive and difficult to deploy such models at edge devices like nano BLE sense raspberry pi, because these models require huge computational power like graphics processing unit (G.P.U), to solve the problem, we proposed DL model. In our proposed work, we had gone for a low complexity model for Audio Event Detection (AED), we extracted Mel-spectrograms of dimension 128×431×1 from audio signals and applied normalization. A total of 3 data augmentation methods were applied as follows: frequency masking, time masking, and mixup. In addition, we designed Convolutional Neural Network (CNN) with spatial dropout, batch normalization, and separable 2D inspired by VGGnet [1]. In addition, we reduced the model size by using model quantization of float16 to the trained model. Experiments were conducted on the updated dataset provided by the Detection and Classification of Acoustic Events and Scenes (DCASE) 2020 challenge. We confirm that our model achieved a val_loss of 0.33 and an accuracy of 90.34% within the 132.50KB model size.

A Study on Methods to Increase the Efficiency of Natural Disaster Early Warning Systems (자연재해 예·경보시스템의 효율성 제고방안에 관한 연구)

  • Seo, Jung Pyo;Cho, Won Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.1
    • /
    • pp.19-27
    • /
    • 2013
  • Damage on assets and lives caused by natural disasters can be minimized by the provision of early warning information and preventive activities. In this sense, the importance of a disaster early warning system continues to increase. This study specifies the kinds of early warning systems depending on the type of natural disasters such as typhoon, flood and heavy snow. The mechanism for information transmission and status of early warning operations are analyzed. Through this analysis, the urgent need to establish a national integrated early warning transmission system is emphasized. In addition, this study offers methods to prevent unnecessary overlapping of investments by establishing an organic mechanism among individual early warning systems. Based on the standardization of disaster-related information, this study also provides methods to improve the efficiency of disaster early warning systems by organizing a permanent team for handling the systematic management and operation of the system.

Comparative Study of PSO-ANN in Estimating Traffic Accident Severity

  • Md. Ashikuzzaman;Wasim Akram;Md. Mydul Islam Anik;Taskeed Jabid;Mahamudul Hasan;Md. Sawkat Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.95-100
    • /
    • 2023
  • Due to Traffic accidents people faces health and economical casualties around the world. As the population increases vehicles on road increase which leads to congestion in cities. Congestion can lead to increasing accident risks due to the expansion in transportation systems. Modern cities are adopting various technologies to minimize traffic accidents by predicting mathematically. Traffic accidents cause economical casualties and potential death. Therefore, to ensure people's safety, the concept of the smart city makes sense. In a smart city, traffic accident factors like road condition, light condition, weather condition etcetera are important to consider to predict traffic accident severity. Several machine learning models can significantly be employed to determine and predict traffic accident severity. This research paper illustrated the performance of a hybridized neural network and compared it with other machine learning models in order to measure the accuracy of predicting traffic accident severity. Dataset of city Leeds, UK is being used to train and test the model. Then the results are being compared with each other. Particle Swarm optimization with artificial neural network (PSO-ANN) gave promising results compared to other machine learning models like Random Forest, Naïve Bayes, Nearest Centroid, K Nearest Neighbor Classification. PSO- ANN model can be adopted in the transportation system to counter traffic accident issues. The nearest centroid model gave the lowest accuracy score whereas PSO-ANN gave the highest accuracy score. All the test results and findings obtained in our study can provide valuable information on reducing traffic accidents.

An Anonymous Fingerprinting Scheme with a Robust Asymmetry

  • Park, Jae-Gwi;Park, Ji-Hwan;Kouichi Sakurai
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.4
    • /
    • pp.620-629
    • /
    • 2003
  • Fingerprinting schemes are techniques applied to protect the copyright on digital goods. These enable the merchants to identify the source of illegal redistribution. Let us assume the following situations connectedly happen: As a beginning, buyer who bought digital goods illegally distributed it, next the merchant who found it revealed identity of the buyer/traitor, then the goods is illegally distributed again. After this, we describe it as“The second illegal redistribution”. In most of anonymous fingerprinting, upon finding a redistributed copy, a merchant extracts the buyer's secret information from the copy and identifies a traitor using it. Thus the merchant can know the traitor's secret information (digital fingerprints) after identification step. The problem of the second illegal distribution is that there is a possibility of the merchant's fraud and the buyer's abuse: that is a dishonest employee of the merchant might just as well have redistributed the copy as by the buyer, or the merchant as such may want to gain money by wrongly claiming that the buyer illegally distributed it once more. The buyer also can illegally redistribute the copy again. Thus if the copy turns up, one cannot really assign responsibility to one of them. In this paper, we suggest solution of this problem using two-level fingerprinting. As a result, our scheme protects the buyer and the merchant under any conditions in sense that (1) the merchant can obtain means to prove to a third party that the buyer redistributed the copy. (2) the buyer cannot worry about being branded with infamy as a traitor again later if he never distribute it.

  • PDF

The Future of BlockChain Technology Leading Innovation in the Industrial Ecosystem (산업 생태계의 혁신을 선도할 블록체인 기술의 미래전망)

  • Kim, Jung-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.324-332
    • /
    • 2018
  • Blockchain technology has the potential to revolutionize trust models and business processes in a variety of industries. However, it is considered to be the initial stage of the system that pursues autonomy rather than efficiency, and it is necessary to monitor and inspect the distributed ledger technology from the price and introduction time as compared with the existing relational DB transaction technology. However, domestic and foreign private sectors have already been activated by applying block-chain technology in the national domain, and the block chain is devoid of doubt that it is an exaggerated technology, characterized by the invariance of the record, transparency, and autonomous execution of business rules. It has begun to be utilized in history, identity, certification and auditing in the financial industry as well as various industries. In this paper, we analyze the problems such as security weakness, insufficient regulatory environment, technical consensus and lack of common standard. In addition, the business sense and possibility of the block chain technology is expected to be the innovation of the industrial ecosystem by entering into the reality system from the concept through monitoring the actual introduction performance in the field of copyright, logistics, health care and environment.

Encapsulation of SEED Algorithm in HCCL for Selective Encryption of Android Sensor Data (안드로이드 센서 정보의 선택적 암호화를 지원하는 HCCL 기반 SEED 암호의 캡슐화 기능 연구)

  • Kim, Hyung Jong;Ahn, Jae Yoon
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.73-81
    • /
    • 2020
  • HCCL stands for Heterogenous Container Class Library. HCCL is a library that allows heterogeneous types of data to be stored in a container as a single record and to be constructed as a list of the records to be stored in database. With HCCL, encryption/decryption can be done based on the unified data type. Recently, IoT sensor which is embedded in smartphone enables developers to provide various convenient services to users. However, it is also true that infringement of personal information may occur in the process of transmitting sensor information to API and users need to be prepared for this situation in some sense. In this study, we developed a data model that enhances existing security using SEED cryptographic algorithms while managing information of sensors based on HCCL. Due to the fact that the Android environment does not provide permission management function for sensors, this study decided whether or not to encrypt sensor information based on the user's choice so that the user can determine the creation and storage of safe data. For verification of this work, we have presented the performance evaluation by comparing with the situation of storing the sensor data in plaintext.

A Study on the Autonomy of the Autonomous Weapon Systems (자율 무기체계의 자율성에 대한 연구)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.101-111
    • /
    • 2018
  • The autonomous weapon systems are being developed with a global competition due to the 4th industrial revolution technologies such as artificial intelligence. This theses analyzes on the technologies related to the autonomy of the new weapons, the new changes in war fighting regime that will be brought by such autonomous weapons, the level of autonomy in a autonomous weapon system, and also the definition and functions of the autonomy. The advanced artificial intelligence for the civilian commercial sectors would be similar to the required military autonomous systems. The future war fighting regime would be the war with autonomous weapon systems without any human casualties. The level of autonomy in the future weapons would be fully autonomous without any human supervision or involvement in the decision making processes. The functions of the autonomous weapon would be to sense, to decide, and to act with a full autonomy in order to accomplish desired purposes.

  • PDF

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices (안드로이드 모바일 단말에서의 이벤트 수집을 통한 악성 앱 탐지 시스템 설계 및 구현)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.35-46
    • /
    • 2013
  • As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.

The Review on the Social Adaptation process of Professional Soldiers before and after Discharge (직업군인 전역 전.후 사회적응 과정에 관한 고찰)

  • Jung, Jae Keak;Jung, Doo Jin
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.139-145
    • /
    • 2014
  • The military of the Republic of Korea has had the world's strongest combat powers through systematic training and has been preparing for future wars with advanced arms. As the arms have been developed for the future, the medicine also has made so much progress that the average life expectancy has increased about 30-40years compared to the past. Even though different problems about professional soldiers who have relatively lower retirement age, have come the surface, there seems to be no particular measures for them. Although they try to apply their ability and experiences obtained by the life in the military to the social life, they feel a great sense of loss when they realize that there is not many thing to apply. The job as a professional soldier has been everything for them, but the time to be discharged has come. However, this is the second act of their life, and also they have much longer social life than that in the military. Strong determination is needed to prepare wisely and rigorously for that and then to live a happy life as a member of society.