• Title/Summary/Keyword: digital tools

Search Result 953, Processing Time 0.028 seconds

Digital Competencies Required for Information Science Specialists at Saudi Universities

  • Yamani, Hanaa;AlHarthi, Ahmed;Elsigini, Waleed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.212-220
    • /
    • 2021
  • The objectives of this research were to identify the digital competencies required for information science specialists at Saudi universities and to examine whether there existed conspicuous differences in the standpoint of these specialists due to years of work experience with regard to the importance of these competencies. A descriptive analytical method was used to accomplish these objectives while extracting the required digital competency list and ascertaining its importance. The research sample comprised 24 experts in the field of information science from several universities in the Kingdom of Saudi Arabia. The participants in the sample were asked to complete a questionnaire prepared to acquire the pertinent data in the period between January 5, 2021 and January 20, 2021. The results reveal that the digital competencies required for information science specialists at Saudi universities encompass general features such as the ability to use computer, Internet, Web2, Web3, and smartphone applications, digital learning resource development, data processing (big data) and its sharing via the Internet, system analysis, dealing with multiple electronic indexing applications and learning management systems and its features, using electronic bibliographic control tools, artificial intelligence tools, cybersecurity system maintenance, ability to comprehend and use different programming languages, simulation, and augmented reality applications, and knowledge and skills for 3D printing. Furthermore, no statistically significant differences were observed between the mean ranks of scores of specialists with less than 10 years of practical experience and those with practical experience of 10 years or more with regard to conferring importance to digital competencies.

Research on Advanced Methods for Data Extraction from Corrupted OOXML Files (손상된 OOXML 파일에서의 데이터 추출 고도화 방안 연구)

  • Jiyun Kim;Minsoo Kim;Woobeen Park;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.193-206
    • /
    • 2024
  • In tandem with the advancements in the digital era, the significance of digital data has escalated, necessitating an increased focus on digital forensics investigations. However, the process of collecting and analyzing digital evidence faces significant challenges, such as the unidentifiability of damaged files due to issues like media corruption and anti-forensic techniques. Moreover, the technological limitations of existing tools hinder the recovery of damaged files, posing difficulties in the evidence collection process. This paper aims to propose solutions for the recovery of corrupted MS Office files commonly used in digital data creation. To achieve this, we analyze the structure of MS Office files in the OOXML format and present a novel approach to overcome the limitations of current recovery tools. Through these efforts, we aim to contribute to enhancing the quality of evidence collection in the field of digital forensics by efficiently recovering and identifying damaged data.

Application Prospects of Knowledge Awareness System for Supporting Collaborative Learning in Digital Textbook (디지털 교과서에서 협력 학습 지원을 위한 지식 인식 시스템의 적용 방안)

  • Kwon, Suk Jin;Sim, Hyeon Ae;Kwon, Sun Hwa
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.169-182
    • /
    • 2010
  • The purpose of the study is to prospect the application of knowledge awareness system in the use of the digital textbook which is one of the main educational political projects based on the exploration of the awareness theory for the computer-supported collaborative learning. To do this, first, knowledge awareness theory for computer-supported collaborative learning (CSCL) as a rationale for digital textbook which supports the collaborative learning was introduced. Second, three functionalities of knowledge awareness systems were extracted by analyzing the representative knowledge awareness tools of CSCL environment. Third, application prospects of knowledge awareness system toward the development and utilization of digital textbook were presented. The paper suggested the need of more researches such as the prototype development of digital textbook which applies the knowledge awareness system's functionalities and empirical researches which examine their effectiveness and efficiency.

Development of Program counter through the optimization of RSFQ Toggle Flip-Flop (RSFQ Toggle Flip-Flop 회로의 최적화를 통한 Program Counter의 개발)

  • Baek Seung Hun;Kim Jin Young;Kim Se Hoon;Kang Joon Hee
    • Progress in Superconductivity and Cryogenics
    • /
    • v.7 no.1
    • /
    • pp.17-20
    • /
    • 2005
  • We has designed, fabricated, and measured a Single flux quantum (SFQ) toggle flip-flop (TFF). The TFF is widely used in superconductive digital electronics circuits. Many digital devices, such as frequency counter, counting ADC and program counter be used TFF Specially, a program counter may be constructed based on TFF We have designed the newly TFF and obtained high bias margins on test. In this work, we used two circuit simulation tools, WRspice and Julia, as circuit optimization tools. We used XIC for a layout tool. Newly designed TFF had minimum bias margins of +/- $37\%$ and maximum bias margins of +/-$37\%$(enhanced from +/- $37\%$). The designed circuits were fabricated by using Nb technology The test results showed that the re-optimized TFF operated correctly on 100kHz and had a very wide bias margins of +/- $53\%$.

Enabled the research in mission of youth culture as a musical worship (뮤지컬 예배로서 청소년 문화선교 활성화 연구)

  • Lee, Jang-Weon
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.11 no.4
    • /
    • pp.81-86
    • /
    • 2011
  • Activation of Youth Culture Mission For Activation of Youth Culture Mission Is classified into four classes. The concept of youth and youth culture, Cultural tools, Feasibility and effectiveness of open worship, Practical effect of this practice, It Said method. One of those ways will have an interest in musical as a young missionary tool. Young people might like that have been pomp and popularity, and the diversity of characterized. Utilized as a musical worship need to know what will be it. Current musical worship will be of interest which the potential. Them will be able to achieve what you want in terms of open worship it solve the problem. Entirely worship for youth Is come up their gaze and posture. that In terms of you have it musical worship is called public and intimacy. Difficulties with religion think it come up with tools that musical.

Digital Forensic Analysis of Timestamp Change Tools: An Anti-Forensics Perspective (안티포렌식을 위한 타임스탬프 변경도구들에 대한 디지털포렌식 관점에서의 기능의 분석)

  • Cho, Gyu-Sang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.391-392
    • /
    • 2019
  • 본 논문에서는 타임스탬프의 위변조를 위한 안티포렌식의 도구로 사용되는 타임스탬프 변경도구들에 기능에 대하여 디지털 포렌식 관점에서 분석을 수행한다. 타임스탬프 변경도구들로써 수행할 수 있는 타임스탬프 변경작업의 범위와 특징을 찾아본다. NTFS파일시스템에서 사용하는 타임스탬프 변경도구들의 기능상의 분류는 그것들이 변경할 수 있는 타임스탬프 종류와 정밀도를 기준으로 정하고 그 도구들을 사용한 후에 기록된 타임스탬프의 특징들을 디지털 포렌식 관점에서 분석을 수행하기로 한다. 이 연구에서의 분류 형태 중 타입 I은 FileTouch.exe, SKTimeStamp, BulkFileChanger류의 도구들과 타입 II는 timestomp, 타입 III은 SetMACE로 분류하고 각 도구들을 사용한 후에 변경된 타임스탬프들의 특징을 살펴보기로 한다.

  • PDF

Y Block Diagram as a New Process Notation in a GPS Manufacture

  • Lee, Jung-Gyu;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.125-133
    • /
    • 2019
  • Company A should maintain myriad conversion tools for the purpose of making a geometric compilation of navigation maps. Company A is already using complex compilation tools, which are tailored to geographical areas and various GPS models. However, due to frequent requirement and personnel changes, there is an endless challenge for perfect tool configuration and multiple map consolidation. To solve this problem, Company A launched a process automation project using Graphviz, which is an open source workflow graph visualization software. Before implementation, they had to document their current map compilation processes and then match it with the applicable conversion tool. For effective representation of process controls, a new graphical process notation is designed, i.e. Y Block diagram. The authors will compare Y Block diagram with other process notations and explain why Y Block diagram is more useful for tool based business processes such as digital map generation processes.

Quantitative measures of thoroughness of FBD simulations for PLC-based digital I&C system

  • Lee, Dong-Ah;Kim, Eui-Sub;Yoo, Junbeom
    • Nuclear Engineering and Technology
    • /
    • v.53 no.1
    • /
    • pp.131-141
    • /
    • 2021
  • Simulation is a widely used functional verification method for FBD programs of PLC-based digital I&C system in nuclear power plants. It is difficult, however, to estimate the thoroughness (i.e., effectiveness or quality) of a simulation in the absence of any clear measure for the estimation. This paper proposes two sets of structural coverage adequacy criteria for the FBD simulation, toggle coverage and modified condition/decision coverage, which can estimate the thoroughness of simulation scenarios for FBD programs, as recommended by international standards for functional safety. We developed two supporting tools to generate numerous simulation scenarios and to measure automatically the coverages of the scenarios. The results of our experiment on five FBD programs demonstrated that the measures and tools can help software engineers estimate the thoroughness and improve the simulation scenarios quantitatively.

Development of a Mobile Application for Effective Mental Health Intervention

  • Mousab Issa Alhamada;Khairayu Badron
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.33-39
    • /
    • 2023
  • The global surge in depression and anxiety, intensified by challenges such as cost and stigma, emphasizes the pressing need for accessible, evidence-based digital solutions. The research centers on the creation of a mobile application specifically designed to address mental health challenges. By integrating cognitive behavioral therapy techniques and features like appointment bookings and mindfulness feedback tools, the app is positioned to improve user outcomes. Utilizing platforms like React Native and React, combined with NestJS for enhanced backend security, the application adheres to the rigorous standards required for mental health interventions. Collaborative efforts with experts, notably the counseling unit of IIUM, ensure the app's alignment with contemporary best practices and research. Preliminary findings indicate a promising tool with the potential to address the global mental health treatment disparity.

A Method of Forensic Authentication via File Structure and Media Log Analysis of Digital Images Captured by iPhone (아이폰으로 촬영된 디지털 이미지의 파일 구조 및 미디어 로그 분석을 통한 법과학적 진본 확인 방법)

  • Park, Nam In;Lee, Ji Woo;Jeon, Oc-Yeub;Kim, Yong Jin;Lee, Jung Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.4
    • /
    • pp.558-568
    • /
    • 2021
  • The digital image to be accepted as legal evidence, it is important to verify the authentication of the digital image. This study proposes a method of authenticating digital images through three steps of comparing the file structure of digital images taken with iPhone, analyzing the encoding information as well as media logs of the iPhone storing the digital images. For the experiment, digital image samples were acquired from nine iPhones through a camera application built into the iPhone. And the characteristics of file structure and media log were compared between digital images generated on the iPhone and digital images edited through a variety of image editing tools. As a result of examining those registered during the digital image creation process, it was confirmed that differences from the original characteristics occurred in file structure and media logs when manipulating digital images on the iPhone, and digital images take with the iPhone. In this way, it shows that it can prove its forensic authentication in iPhone.