• 제목/요약/키워드: computer science

검색결과 31,298건 처리시간 0.053초

Personal Data Security in Recruitment Platforms

  • Bajoudah, Alya'a;AlSuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.310-318
    • /
    • 2022
  • Job offers have become more widespread and it has become easier and faster to apply for jobs through electronic recruitment platforms. In order to increase the protection of the data that is attached to the recruitment platforms. In this research, a proposed model was created through the use of hybrid encryption, which is used through the following algorithms: AES,Twofish,. This proposed model proved the effectiveness of using hybrid encryption in protecting personal data.

Digital Contents for Learning Computer Science using Unplugged CS

  • Han, Sun-Gwan
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권6호
    • /
    • pp.37-43
    • /
    • 2019
  • This study focused on the design and development of contents using Unplugged CS method to learn computer science knowledge. With the strengthening of software education, all universities students including elementary and junior high school students are demanding knowledge of computer science centered on the computational thinking. We have developed educational contents using unplugged computing method as a way to effectively learn the concept of computer science. First, we analyze the related research of Unplugged CS theory and investigate the educational method accordingly. And we divided the areas of computer science and selected learning concepts in each area. The contents of learning were divided into basic and intermediate classes considering the level of the learner. The subject of learning contents was selected evenly in the area of computer science and it consisted of 16 basic subjects and 16 intermediate subjects based on concepts that are important in each field. In order to confirm the validity of the Unplugged CS learning topic and the development contents for computer science, we conducted expert reviews and content validity tests. As a result of the validity test, the validity of the learning topic and area selection was found to be more than .92 for the CVI value and the validity of the 32 subject learning contents was over .935 in basic level and .925 in intermediate level for the CVI values. Based on the design contents, we developed digital contents for online learning and put them in the system. We expect that this study will contribute to the understanding of computer science for all, including elementary and junior-high school students as well as students at software - oriented universities, and contribute to the spread of software education.

P2P 시스템에서 안전성과 성능을 고려한 노드 복구와 복제 기법 (Replication and Node Recovery for Efficiency and Safety in P2P sytmem)

  • 차봉관;박성환;손영성;김경석
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 가을 학술발표논문집 Vol.32 No.2 (1)
    • /
    • pp.472-474
    • /
    • 2005
  • 최근에 P2P(Peer-to-Peer) 시스템에서 효율적인 자원 탐색 방법에 대해 많이 연구되고 있다. 대부분의 P2P 시스템은 overlay network를 형성하므로 노드와 노드 사이의 물리적인 거리를 고려하지 않는다. 그래서 서로 이웃한 노드라도 실제 물리적인 latency가 클 수 있다는 문제점을 가지고 있다. 이런 문제점을 해결하기 위해 Topology를 고려한 계층적 시스템을 설계하였다. 이 시스템을 TB-Chord(Topology-based Chord)라 부른다. TB-Chord는 자신의 subnet에 Global network에 있는 데이터의 사본(Replica)을 저장하기 때문에 저장 공간(Storage)의 낭비와 노드가 떠날(leave) 때 데이터의 이동에 따른 네트워크 부하가 생기는 문제가 있다. 이 논문은 효율적인 복제 기법을 이용하여 저장공간과 네트워크의 효율성을 높이고 노드 fail에 대한 rejoin 메카니즘을 사용하여 효율적으로 시스템을 회복하는 방법을 제안한다.

  • PDF

비즈니스 프로세스 타당성 검증 기법 (Validation Checking Mechanisms of Business Processes)

  • 설주영;박정업;김학수;신영재;장진근;박찬희;김태인;손진현
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2006년도 가을 학술발표논문집 Vol.33 No.2 (C)
    • /
    • pp.1-5
    • /
    • 2006
  • 과거에 비해 최근에 비즈니스 프로세스가 다양해지고 복잡해짐에 따라 비즈니스 프로세스를 디자인할 때 발생할 수 있는 문제점이 점차 증가하고 있다. 그로인해 비즈니스 프로세스 검증의 중요성이 높아지고 있지만 많은 검증 방법이 제안되고 있지 않은 실정이다. 한편, 최근 BPMI에서 주도하는 BPMN(Business Process Modeling Notation)은 비즈니스 프로세스를 위한 표준화된 그래픽 표기법으로써 BPMN을 지원하는 디자인 툴을 이용하면 다양하고 복잡한 프로세스 환경을 일반화된 형태로 디자인하고 분석할 수 있다. 이 논문에서는 이러한 BPMN으로 디자인할 때 발생할 수 있는 문제점들을 효율적으로 검증할 수 있는 몇 가지 검증기법을 제시한다. 이로 인해 비즈니스 프로세스 실행 시 발생할 수 있 문제점들을 효율적으로 검증할 수 있는 몇 가지 검증기법을 제시한다. 이로 인해 비즈니스 프로세스 실행시 발생할 수 있는 에러들을 사전에 검증하여 예기치 못한 큰 비용을 줄일 수 있다.

  • PDF

Lookup 효율성을 위해 Topology를 고려한 Chord 시스템 (Topology-based Chord system for lookup services)

  • 차봉관;한동윤;손영성;김경석
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 한국컴퓨터종합학술대회 논문집 Vol.32 No.1 (A)
    • /
    • pp.589-591
    • /
    • 2005
  • 최근에 P2P(Peer-to-Peer) 시스템에서 효율적인 자원 탐색 방범에 대해 많이 연구되고 있다. P2P overlay network 중 하나인 Chord는 자원을 효율적으로 탐색할 수 있는 간단한 P2P 프로토콜이다. 대부분의 P2P 시스템은 overlay network를 형성하므로 노드와 노드 사이의 물리적인 거리를 고려하지 않으므로 서로 이웃한 노드라도 실제 물리적인 latency가 클 수 있다는 문제점을 가지고 있다. 이 논문은 물리적으로 가까운 노드들을 하나의 subnet으로 만들어서 물리적인 latency를 감소시키고 각 subnet안에 복사본(replica)을 둠으로써 탐색(lookup)의 효율성을 향상시킨다.

  • PDF

An Automatic Tagging System and Environments for Construction of Korean Text Database

  • Lee, Woon-Jae;Choi, Key-Sun;Lim, Yun-Ja;Lee, Yong-Ju;Kwon, Oh-Woog;Kim, Hiong-Geun;Park, Young-Chan
    • 한국음향학회:학술대회논문집
    • /
    • 한국음향학회 1994년도 FIFTH WESTERN PACIFIC REGIONAL ACOUSTICS CONFERENCE SEOUL KOREA
    • /
    • pp.1082-1087
    • /
    • 1994
  • A set of text database is indispensable to the probabilistic models for speech recognition, linguistic model, and machine translation. We introduce an environment to canstruct text databases : an automatic tagging system and a set of tools for lexical knowledge acquisition, which provides the facilities of automatic part of speech recognition and guessing.

  • PDF

Dominance-Based Service Selection Scheme with Concurrent Requests

  • Tang, Chaogang;Li, Qing;Xiong, Yan;Wen, Shiting;Liu, An;Zhong, Farong
    • Journal of Computing Science and Engineering
    • /
    • 제6권2호
    • /
    • pp.89-104
    • /
    • 2012
  • In dynamic Web service environments, the performance of the Internet is unpredictable; the reliability and effectiveness of remote Web services are also unclear. Therefore, it can hardly be guaranteed that the quality of Web service (QoWS) attributes of Web services do not fluctuate with the dynamic Web service environments. When a composite service is planned in the context of dynamic service environments, there is another aspect which has not been taken into account by existing works, namely, concurrency - the fact that multiple requests to a composite service may arrive at the same time. Considering the dynamics of Web service environments and concurrency of requests, we propose in this paper a service selection scheme which adopts top-k dominating queries to generate a composition solution rather than only select the best composition solution for a given request. The experimental results have investigated the efficiency and effectiveness of our approach and shown that it outperforms baseline and traditional methods for service selection.

Cold Boot Attack on Encrypted Containers for Forensic Investigations

  • Twum, Frimpong;Lagoh, Emmanuel Mawuli;Missah, Yaw;Ussiph, Najim;Ahene, Emmanuel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권9호
    • /
    • pp.3068-3086
    • /
    • 2022
  • Digital Forensics is gaining popularity in adjudication of criminal cases as use of electronic gadgets in committing crime has risen. Traditional approach to collecting digital evidence falls short when the disk is encrypted. Encryption keys are often stored in RAM when computer is running. An approach to acquire forensic data from RAM when the computer is shut down is proposed. The approach requires that the investigator immediately cools the RAM and transplant it into a host computer provisioned with a tool developed based on cold boot concept to acquire the RAM image. Observation of data obtained from the acquired image compared to the data loaded into memory shows the RAM chips exhibit some level of remanence which allows their content to persist after shutdown which is contrary to accepted knowledge that RAM loses its content immediately there is power cut. Results from experimental setups conducted with three different RAM chips labeled System A, B and C showed at a reduced temperature of -25C, the content suffered decay of 2.125% in 240 seconds, 0.975% in 120 seconds and 1.225% in 300 seconds respectively. Whereas at operating temperature of 25℃, there was decay of 82.33% in 60 seconds, 80.31% in 60 seconds and 95.27% in 120 seconds respectively. The content of RAM suffered significant decay within two minutes without power supply at operating temperature while at a reduced temperature less than 5% decay was observed. The findings show data can be recovered for forensic evidence even if the culprit shuts down the computer.