• Title/Summary/Keyword: computer technology

Search Result 19,871, Processing Time 0.048 seconds

Security Risk Assessment in Conducting Online Exam

  • Danah AlDossary;Danah AlQuaamiz;Fai AlSadlan;Dana AlSharari;Lujain AlOthman;Raghad AlThukair;Ezaz Aldahasi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.77-83
    • /
    • 2023
  • This research is conducted to minimize the potential security risks of conducting online exams to an acceptable level as vulnerabilities and threats to this type of exam are presented. This paper provides a general structure for the risk management process and some recommendations for increasing the level of security.

AIMS: AI based Mental Healthcare System

  • Ibrahim Alrashide;Hussain Alkhalifah;Abdul-Aziz Al-Momen;Ibrahim Alali;Ghazy Alshaikh;Atta-ur Rahman;Ashraf Saadeldeen;Khalid Aloup
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.225-234
    • /
    • 2023
  • In this era of information and communication technology (ICT), tremendous improvements have been witnessed in our daily lives. The impact of these technologies is subjective and negative or positive. For instance, ICT has brought a lot of ease and versatility in our lifestyles, on the other hand, its excessive use brings around issues related to physical and mental health etc. In this study, we are bridging these both aspects by proposing the idea of AI based mental healthcare (AIMS). In this regard, we aim to provide a platform where the patient can register to the system and take consultancy by providing their assessment by means of a chatbot. The chatbot will send the gathered information to the machine learning block. The machine learning model is already trained and predicts whether the patient needs a treatment by classifying him/her based on the assessment. This information is provided to the mental health practitioner (doctor, psychologist, psychiatrist, or therapist) as clinical decision support. Eventually, the practitioner will provide his/her suggestions to the patient via the proposed system. Additionally, the proposed system prioritizes care, support, privacy, and patient autonomy, all while using a friendly chatbot interface. By using technology like natural language processing and machine learning, the system can predict a patient's condition and recommend the right professional for further help, including in-person appointments if necessary. This not only raises awareness about mental health but also makes it easier for patients to start therapy.

Applications of 5G and 6G in Smart Health Services

  • Al-Jawad, Fatimah;Alessa, Raghad;Alhammad, Sukainah;Ali, Batoola;Al-Qanbar, Majd;Rahman, Atta-ur
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.173-182
    • /
    • 2022
  • Healthcare organizations are overwhelmingly embracing smart value-based care strategies, which focuses on providing superior treatment at a significantly lower cost and quality of service (QoS). For these purposes, fifth generation (5G) of mobile service provides an innumerable improvement that clearly outperforms previous generations e.g., 3G and 4G. However, as with most advancements, 5G is projected to introduce new challenges, prompting the community to think about what comes next. This research was conducted to examine the most recent smart 5G technology applications and the solutions they provide to the healthcare industry. Finally, the paper discusses how the upcoming 6G technology has the potential to transform the future of healthcare sector even beyond the current 5G systems.

Integration of Blockchain and Cloud Computing in Telemedicine and Healthcare

  • Asma Albassam;Fatima Almutairi;Nouf Majoun;Reem Althukair;Zahra Alturaiki;Atta Rahman;Dania AlKhulaifi;Maqsood Mahmud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.17-26
    • /
    • 2023
  • Blockchain technology has emerged as one of the most crucial solutions in numerous industries, including healthcare. The combination of blockchain technology and cloud computing results in improving access to high-quality telemedicine and healthcare services. In addition to developments in healthcare, the operational strategy outlined in Vision 2030 is extremely essential to the improvement of the standard of healthcare in Saudi Arabia. The purpose of this survey is to give a thorough analysis of the current state of healthcare technologies that are based on blockchain and cloud computing. We highlight some of the unanswered research questions in this rapidly expanding area and provide some context for them. Furthermore, we demonstrate how blockchain technology can completely alter the medical field and keep health records private; how medical jobs can detect the most critical, dangerous errors with blockchain industries. As it contributes to develop concerns about data manipulation and allows for a new kind of secure data storage pattern to be implemented in healthcare especially in telemedicine fields is discussed diagrammatically.

A Status Quo Study of Using Computer Technology for Language Testing (언어평가에 대한 컴퓨터 기술의 활용방안)

  • 이영식
    • Korean Journal of English Language and Linguistics
    • /
    • v.3 no.4
    • /
    • pp.571-588
    • /
    • 2003
  • The purpose of this study is to investigate into the various ways that the computer technology is used for language testing. Three uses of computer technology are mentioned: 1) computer-adaptive language testing and computer-based language testing, 2) the scoring of performance-based language assessment, and 3) the development and use of psychometric tools for analyzing the scoring results. Although the various uses of computer technology could provide expanded possibilities for language testing development, the developers should be reminded that they are currently subject to indepth research which could support their validity. In this regard, the advantages and limitations of some uses of computer technology for language testing are discussed.

  • PDF

Directions for Future Research for Introducing Computer Technology into Mathematics Eduction (컴퓨터공학의 도입을 위한 수학교육연구의 방향)

  • 조완영;권성룡
    • The Mathematical Education
    • /
    • v.39 no.2
    • /
    • pp.179-186
    • /
    • 2000
  • Although computer technology has a great potential for improving mathematics learning practice, it rarely used in mathematics classroom. The purpose of this study is to suggest the future direction for research in mathematics computer technology. First, there has to be a research on mathematics curriculum that take computer technology into account. Second, research on teaching sequence for certain content area is needed. Because computer technology would change the order of teaching sequence. Third, how students would learn with computer technology? how do they acquire knowledge and make sense of it? Fourth, how could we assess the learning with computer technology? Most of all, because teachers play a key role to succeed in educational reform, they have to be familiar with computer technology and software to introduce it into mathematics learning and to use it properly.

  • PDF

A Computer Model for Simulating the Bicycle Rider's Behavior in a Virtual Riding System

  • Ding, Wei-long;Ding, Xiao;Chen, Kai;Wan, Zang-xin;Xu, Yan;Feng, Yuan-jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1026-1042
    • /
    • 2020
  • People are increasingly demanding to experience realistic behavior of virtual characters in computer games. In this article, we build a computer model for simulating a bicycle rider's behavior in a virtual riding system. A method to calculate the speed of a bicycle rider is proposed to improve the reality in a virtual riding system. In this method, the property of physical energy is introduced, and the bicycle-riding speed is calculated in real time according to the relationship between the rider's physical energy and bicycle-riding speed. Then based on the analysis of the behavior of a cyclist in a real competition, various behaviors of the virtual rider are designed and a behavior-tree for the virtual bicycle rider is constructed accordingly. On the basis of these, a virtual riding system is developed. The experiments results show that our system can simulate the behavior of a virtual bicycle rider, and thus encourage exercise on a stationary bicycle.

A Proposed Model for Supply Chain using Blockchain Framework

  • Zenab AlSadeq;Haya Alubaidan;Alanoud Aldweesh;Atta-ur-Rahman ;Tahir Iqbal
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.91-98
    • /
    • 2023
  • The rapid increase in the use of new technology known as 'blockchain technologies' has addressed many challenges in different areas and provided benefits to users, in this paper we discuss the field of supply chains, improve confidence and transparency between participants and stakeholders significantly also in this paper we Compare between different blockchain frameworks focusing on most popular frameworks. Moreover, we proposed a model in the supply chain using a blockchain framework, the proposed supply chain model included many different resources that help to exchange information over the network. The proposed model also includes smart contracts that maintain all rules for transactions. using blockchain technology information such as transaction details, time and money are recorded and stored within the system from the beginning of the transaction entry.

An idle time-based link adaptation algorithm for IEEE 802.11 WLANs (IEEE 802.11 무선 랜 환경에서 Idle time 기반의 링크 적응기술에 관한 연구)

  • Lee You-Sung;Kim Hyo-Gon;Choi Kyu-Young;Yoon Jong-Won;Kang In-Hye
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1283-1286
    • /
    • 2006
  • 본 논문에서는 관찰된 채널의 유휴 시간을 이용하여, ACK(Acknowledgement) 기반의 링크 적응 기술의 단점을 극복하는 새로운 알고리즘인 COLA 를 제안한다. COLA 는 광범위한 채널과 부하 상황에서 최적의 성능을 얻으며 RTS/CTS 메커니즘이나 하드웨어를 이용한 채널 SNR 측정과 같은 추가적인 옵션 혹은 별도의 프로토콜 메커니즘의 지원이 필요하지 않다. 또한 COLA 알고리즘은 단지 짧은 10 개의 critical 한 명령어를 사용함으로써 부하를 줄이며, 실제 동작 시 수반되는 heuristic 한 매개변수로부터 자유롭고, 따라서 실제 사용 시 장점을 가진다.

  • PDF

Implementing Firewall to Mitigate YOYO Attack on Multi Master Cluster Nodes Using Fail2Ban

  • Muhammad Faraz Hyder;Muhammad Umer Farooq;Mustafa Latif;Faizan Razi Khan;Abdul Hameed;Noor Qayyum Khan;M. Ahsan Siddiqui
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.126-132
    • /
    • 2023
  • Web technology is evolving with the passage of time, from a single node server to high availability and then in the form of Kubernetes. In recent years, the research community have been trying to provide high availability in the form of multi master cluster with a solid election algorithm. This is helpful in increasing the resources in the form of pods inside the worker node. There are new impact of known DDoS attack, which is utilizing the resources at its peak, known as Yoyo attack. It is kind of burst attack that can utilize CPU and memory to its limit and provide legit visitors with a bad experience. In this research, we tried to mitigate the Yoyo attack by introducing a firewall at load-balancer level to prevent the attack from going to the cluster network.