• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.034 seconds

Development of Estimation Functions for Strong Winds Damage Based on Regional Characteristics : Focused on Jeolla area (지역특성 기반의 강풍피해 예측함수 개발 : 전라지역을 중심으로)

  • Song, Chang Young;Yang, Byong Soo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.4
    • /
    • pp.13-24
    • /
    • 2020
  • Abnormal weather conditions have lately been occurring frequently due to the rapid economic development and global warming. Natural disasters classified as storm and flood damages such as heavy rain, typhoon, strong wind, high seas and heavy snow arouse large-scale human and material damages. To minimize damages, it is important to estimate the scale of damage before disasters occur. This study is intended to develop a strong wind damage estimation function to prepare for strong wind damage among various storm and flood disasters. The developed function reflects weather factors and regional characteristics based on the strong wind damage history found in the Natural Disaster Yearbook. When the function is applied to a system that collects real-time weather information, it can estimate the scale of damage in a short time. In addition, this function can be used as the grounds for disaster control policies of the national and local governments to minimize damages from strong wind.

Evaluating the Usability and Effectiveness of Madrasati Platforms as a Learning Management System in Saudi Arabia for Public Education

  • Alkinani, Edrees A.;Alzahrani, Abdullah I.A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.275-285
    • /
    • 2021
  • Ministries of Education are integrating different Learning Management Systems (LMS) to enhance teaching and learning during the lockdown to avoid academic loss. The key factor for delivering a high-quality education through LMS platforms is teachers' acceptance and adoption of the platform. Madrasati platform (which means My school) was introduced by Saudi Arabian Ministry of education as the formal teaching and learning for distance education for public education levels. This study aims to examine the effectiveness, usability and adoption of "Madrasati" platform from teachers' perspectives in Saudi Arabia. "SUS, CSUQ" tests were used to test the usability of the new platform. Using quantitative research design, data were collected using questionnaire. 200 teachers were selected randomly answered the survey. Data was analysed descriptively and inferentially using SPSS (25). The results obtained indicate that the teachers are highly satisfied using Madrasati platform and technically it is well designed. Also, Madrasati has positive effect on teaching quality. Moreover, Madrasati has high usability in teaching. One of the key findings were that the quality of the information content in Madrasati has a strong effect on teachers' perception of the Madrasati usefulness that led to a positive attitude towards Madrasati. These findings would be useful to the ministry of education and institutions trying to integrate technology in their teaching and learning processes. Thus, this paper contributes towards more effective utilisation of the extensive functionalities that Madrasati have to offer, which will contribute toward the development of pedagogy in Saudi Arabia.

Prediction of Longline Fishing Activity from V-Pass Data Using Hidden Markov Model

  • Shin, Dae-Woon;Yang, Chan-Su;Harun-Al-Rashid, Ahmed
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.1
    • /
    • pp.73-82
    • /
    • 2022
  • Marine fisheries resources face major anthropogenic threat from unregulated fishing activities; thus require precise detection for protection through marine surveillance. Korea developed an efficient land-based small fishing vessel monitoring system using real-time V-Pass data. However, those data directly do not provide information on fishing activities, thus further efforts are necessary to differentiate their activity status. In Korea, especially in Busan, longlining is practiced by many small fishing vessels to catch several types of fishes that need to be identified for proper monitoring. Therefore, in this study we have improved the existing fishing status classification method by applying Hidden Markov Model (HMM) on V-Pass data in order to further classify their fishing status into three groups, viz. non-fishing, longlining and other types of fishing. Data from 206 fishing vessels at Busan on 05 February, 2021 were used for this purpose. Two tiered HMM was applied that first differentiates non-fishing status from the fishing status, and finally classifies that fishing status into longlining and other types of fishing. Data from 193 and 13 ships were used as training and test datasets, respectively. Using this model 90.45% accuracy in classifying into fishing and non-fishing status and 88.23% overall accuracy in classifying all into three types of fishing statuses were achieved. Thus, this method is recommended for monitoring the activities of small fishing vessels equipped with V-Pass, especially for detecting longlining.

A Study on the Safe Use of Data in the Digital Healthcare Industry Based on the Data 3 Act (데이터 3법 기반 디지털 헬스케어 산업에서 안전한 데이터 활용에 관한 연구)

  • Choi, Sun-Mi;Kim, Kyoung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.25-37
    • /
    • 2022
  • The government and private companies are endeavoring to help the digital healthcare industry grow. This includes easing regulations on the big data industry such as the amendment of the Data 3 Act. Despite these efforts, however, there have been constant demands for the amendment of laws related to the medical field and for securing medical data transmissions. In this paper, the Data 3 Act of Korea and the legal system related to healthcare are examined. Then the legal, institutional, and technical aspects of the strategies are compared to understand the issues and implications. Based on this, a legal and institutional strategy suitable for the digital healthcare industry in Korea is suggested. Additionally, a direction to improve social perception along with technical measures such as safe de-identification processing and data transmission are also proposed. This study hopes to contribute to the spread of various convergent industries along with the digital healthcare industry.

Conceptual bases of the Investment Mechanism of the Innovative Activity of Enterprises in the Context of Achieving the Tasks of Strategic Development

  • Komandrovska, Veronika;Kolesnyk, Maksym;Barkova, Kateryna;Vasylyk, Sergii;Dorofieiev, Denys
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.111-118
    • /
    • 2021
  • The authors of the study highlight the conceptual foundations of the investment mechanism of innovation of enterprises in the context of strategic development. Such indicators of investment attraction for the enterprise as investment attractiveness, investment activity of the enterprise, critical mass of investments, minimum sufficiency of investments and others are singled out. It is proved that the balance of investment resources is facilitated by the action of the investment mechanism of innovation activity at the enterprise in the context of achievements of strategic development tasks. Investment processes and their intensification have an impact on the expansion of production capacity of economic entities in strategic development and on improving the efficiency of existing capacities. The investment mechanism of innovative activity at the enterprise in the context of achievement of tasks of strategic development contains system of complex actions which provides: definition of the clear purpose and tasks for the mechanism and achievement of the purposes of the enterprise; assessment of the investment potential of the enterprise; definition of tasks of innovative development of enterprises and investment resources necessary for this purpose, etc. The tasks of the investment mechanism of innovative activity at the enterprise in the context of achievements of tasks of strategic development and its economic, organizational and information components are singled out, as well as levers of influence and regulators of the investment mechanism of innovation in the enterprise.

Improving the Professional Competence of a Specialist in Poland by Implementing Multimedia Technologies

  • Kravchenko, Tetiana;Varga, Lesia;Lypchanko-Kovachyk, Oksana;Chinchoy, Alexander;Yevtushenko, Nataliia;Syladii, Ivan;Kuchai, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.51-58
    • /
    • 2022
  • The article emphasizes the features of the modern education system in Poland, reveals the peculiarities of improving the professional competence of a specialist in Poland through the implementation of multimedia technologies. Various forms of innovations implemented in improving the professional competence of a specialist are listed: improvement (rationalization), modernization, innovation. The forms of professional improvement through the introduction of computer technologies in general and multimedia technologies, in particular, primarily include various professional courses, qualification, preparatory, methodological conferences, seminars, postgraduate studies, foreign and state internships. At the same time, the main direction is self-education. The subject of professional improvement in the application of computer technologies by specialists is the updating of existing knowledge, exchange of professional experience, planning, as well as discussion of innovative works in which specialists participate. Professional growth of specialists can occur both during work and in higher education institutions during their studies. Modernization of computer technologies, especially multimedia ones, is a necessary condition for the functioning of specialists in modern society, since specialists are at the center of the educational process, during the improvement of professional competence. The main functions of the educational process necessary for improving the professional competence of specialists through the implementation of multimedia technologies are revealed. These functions not only contribute to the professional improvement of specialists, but also affect their solutions and optimize the maintenance of contacts between specialists. The importance of creating conditions that are consistent with the modern needs of innovative education is emphasized.

Comparative Study of PSO-ANN in Estimating Traffic Accident Severity

  • Md. Ashikuzzaman;Wasim Akram;Md. Mydul Islam Anik;Taskeed Jabid;Mahamudul Hasan;Md. Sawkat Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.95-100
    • /
    • 2023
  • Due to Traffic accidents people faces health and economical casualties around the world. As the population increases vehicles on road increase which leads to congestion in cities. Congestion can lead to increasing accident risks due to the expansion in transportation systems. Modern cities are adopting various technologies to minimize traffic accidents by predicting mathematically. Traffic accidents cause economical casualties and potential death. Therefore, to ensure people's safety, the concept of the smart city makes sense. In a smart city, traffic accident factors like road condition, light condition, weather condition etcetera are important to consider to predict traffic accident severity. Several machine learning models can significantly be employed to determine and predict traffic accident severity. This research paper illustrated the performance of a hybridized neural network and compared it with other machine learning models in order to measure the accuracy of predicting traffic accident severity. Dataset of city Leeds, UK is being used to train and test the model. Then the results are being compared with each other. Particle Swarm optimization with artificial neural network (PSO-ANN) gave promising results compared to other machine learning models like Random Forest, Naïve Bayes, Nearest Centroid, K Nearest Neighbor Classification. PSO- ANN model can be adopted in the transportation system to counter traffic accident issues. The nearest centroid model gave the lowest accuracy score whereas PSO-ANN gave the highest accuracy score. All the test results and findings obtained in our study can provide valuable information on reducing traffic accidents.

HMM Based Part of Speech Tagging for Hadith Isnad

  • Abdelkarim Abdelkader
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.151-160
    • /
    • 2023
  • The Hadith is the second source of Islamic jurisprudence after Qur'an. Both sources are indispensable for muslims to practice Islam. All Ahadith are collected and are written. But most books of Hadith contain Ahadith that can be weak or rejected. So, quite a long time, scholars of Hadith have defined laws, rules and principles of Hadith to know the correct Hadith (Sahih) from the fair (Hassen) and weak (Dhaif). Unfortunately, the application of these rules, laws and principles is done manually by the specialists or students until now. The work presented in this paper is part of the automatic treatment of Hadith, and more specifically, it aims to automatically process the chain of narrators (Hadith Isnad) to find its different components and affect for each component its own tag using a statistical method: the Hidden Markov Models (HMM). This method is a power abstraction for times series data and a robust tool for representing probability distributions over sequences of observations. In this paper, we describe an important tool in the Hadith isnad processing: A chunker with HMM. The role of this tool is to decompose the chain of narrators (Isnad) and determine the tag of each part of Isnad (POI). First, we have compiled a tagset containing 13 tags. Then, we have used these tags to manually conceive a corpus of 100 chains of narrators from "Sahih Alboukhari" and we have extracted a lexicon from this corpus. This lexicon is a set of XML documents based on HPSG features and it contains the information of 134 narrators. After that, we have designed and implemented an analyzer based on HMM that permit to assign for each part of Isnad its proper tag and for each narrator its features. The system was tested on 2661 not duplicated Isnad from "Sahih Alboukhari". The obtained result achieved F-scores of 93%.

A Modified Delay and Doppler Profiler based ICI Canceling OFDM Receiver for Underwater Multi-path Doppler Channel

  • Catherine Akioya;Shiho Oshiro;Hiromasa Yamada;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.1-8
    • /
    • 2023
  • An Orthogonal Frequency Division Multiplexing (OFDM) based wireless communication system has drawn wide attention for its high transmission rate and high spectrum efficiency in not only radio but also Underwater Acoustic (UWA) applications. Because of the narrow sub-carrier spacing of OFDM, orthogonality between sub-carriers is easily affected by Doppler effect caused by the movement of transmitter or receiver. Previously, Doppler compensation signal processing algorithm for Desired propagation path was proposed. However, other Doppler shifts caused by delayed Undesired signal arriving from different directions cannot be perfectly compensated. Then Receiver Bit Error Rate (BER) is degraded by Inter-Carrier-Interference (ICI) caused in the case of Multi-path Doppler channel. To mitigate the ICI effect, a modified Delay and Doppler Profiler (mDDP), which estimates not only attenuation, relative delay and Doppler shift but also sampling clock shift of each multi-path component, is proposed. Based on the outputs of mDDP, an ICI canceling multi-tap equalizer is also proposed. Computer simulated performances of one-tap equalizer with the conventional Time domain linear interpolated Channel Transfer Function (CTF) estimator, multi-tap equalizer based on mDDP are compared. According to the simulation results, BER improvement has been observed. Especially, in the condition of 16QAM modulation, transmitting vessel speed of 6m/s, two-path multipath channel with direct path and ocean surface reflection path; more than one order of magnitude BER reduction has been observed at CNR=30dB.

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar;Deborah U. Ebem;Francis S. Bakpo;Modesta Ezema
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.207-215
    • /
    • 2024
  • Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.