• Title/Summary/Keyword: international network

Search Result 4,164, Processing Time 0.031 seconds

Fake News Detector using Machine Learning Algorithms

  • Diaa Salama;yomna Ibrahim;Radwa Mostafa;Abdelrahman Tolba;Mariam Khaled;John Gerges;Diaa Salama
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.195-201
    • /
    • 2024
  • With the Covid-19(Corona Virus) spread all around the world, people are using this propaganda and the desperate need of the citizens to know the news about this mysterious virus by spreading fake news. Some Countries arrested people who spread fake news about this, and others made them pay a fine. And since Social Media has become a significant source of news, .there is a profound need to detect these fake news. The main aim of this research is to develop a web-based model using a combination of machine learning algorithms to detect fake news. The proposed model includes an advanced framework to identify tweets with fake news using Context Analysis; We assumed that Natural Language Processing(NLP) wouldn't be enough alone to make context analysis as Tweets are usually short and do not follow even the most straightforward syntactic rules, so we used Tweets Features as several retweets, several likes and tweet-length we also added statistical credibility analysis for Twitter users. The proposed algorithms are tested on four different benchmark datasets. And Finally, to get the best accuracy, we combined two of the best algorithms used SVM ( which is widely accepted as baseline classifier, especially with binary classification problems ) and Naive Base.

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.

The Promotive Direction of the International Cooperation in Telecommunication (전기통신의 국제협력의 증진방향)

  • 신상각
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1982.10a
    • /
    • pp.1-13
    • /
    • 1982
  • Nowadays , The function of telecommunication contributes to maintaining the peace of the world, and the internetional cooperation in the communication field can not be emphasized too much. The pioneers in telecommunication field devoted their lives to the Infinite love for humanity. However, the modern communication system in our country was initiated, in the later part of the Lee-Dynasty, not for the international cooperation but for the invasive avarices of the neighbouring nations such as Japan and China. The true internationaL cooprration should be based on the love of humanity and the peace of the world such as the pionreers. This paper proposes to resoarch the historic process of initiation and development of the international organs relating to telecommunication as well as the intenational elecomunication network. Finally, I will make the foIlowing suggestions for the promotive direction of the true international coonperation, 1. Intensification of the radio administrative power 2. Promotion of the international cooperation on the man-power and economy in telecommunication field. 3. Establishment and Adjustment of the research institutes Of telecommunication. 4. Establishment of the world telecommunication network for world-wide peace

  • PDF

Strategies of Implementing Internet Logistics System in Internet Trade Environment (인터넷무역(貿易) 환경(環境)에서 인터넷 물류(物流)시스템의 구현(具現) 전략(戰略))

  • Song, Gye-Eui
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.14
    • /
    • pp.75-102
    • /
    • 2000
  • At present, on increasing to use a computer network and internet network, Internet Trade has been rapidly created and developed in international Electronic Commerce. However, Internet Trade has not been continued to grow up without supporting by a efficient Logistics System. Because it is very important to delivery contract commodities to consumer with speedy, accurate, steady, convenient services. International Logistics System is consisted of demand forecasting, order processing, packing, labeling, shipping documentation and consumer service into three distant phases of transaction, distribution and payment. International Logistics System can be done more efficiently and effectively by using Internet Logistics System. Therefore it is very important to implementing a efficient Internet Logistics System.

  • PDF

A Survey on Role of Block Chain in Smart Cities

  • Chokkanathan, K;Shanmugaraja, P;Ramasamy, Siva Shankar;Ouncharoen, Rujira;Chakpitak, Nopasit
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.1-7
    • /
    • 2021
  • An amazing growth in the field of Internet of Things (IoT) and Blockchain based smart cities from both industry and academia has been witnessed in the recent years. There are many smart applications such as intelligent transportation, smart banking, improving the life style of citizen, energy consumption and managing the waste in the city, handling home needs are supporting the Smart city concept. These applications are profoundly supported by the advanced technologies like Blockchain as well as IoT in the recent past. Smart cities can be supported by the Blockchain core concepts such as secure, transparent, decentralized and immutable nature. Still, Blockchain and IoT technologies implementation in smart cities are in their early stages and significant research efforts are desirable to integrate them. This review article explores the roles and responsibilities of Blockchain and IoT in building smart cities.

Multimedia Technologies As A Basis For The Development Of Modern It Education In Ukraine

  • Seiko, Nataliia;Yershov, Mykola-Oleg;Sakhnenko, Anna;Shevchenko, Marina;Bezsmertnyi, Roman;Kostyrya, Inna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.363-367
    • /
    • 2021
  • This article analyzes the state and development of multimedia technologies in the educational process. The reasons for the emergence of multimedia educational technologies are shown. The definition of the concept of "multimedia education" is given. The advantages and disadvantages of teaching using multimedia technologies are presented. The article, based on multimedia technologies, provides one of the ways to solve the problem of lack of classroom time for the presentation of all educational material in the process of teaching engineering students. The creation and application of educational videos in education is discussed, an example of teaching electrical engineering is given; the requirements for the development of video lessons, their advantages and importance in the educational process are indicated.

Meeting the Demands for Major International Traffic Flows through Railnet Austria's Maintenance and Capacity Planning Regime

  • Herbacek, R.;Petri, K.;Ertl, B.
    • International Journal of Railway
    • /
    • v.1 no.4
    • /
    • pp.134-142
    • /
    • 2008
  • Serving as a strategic crossing point for major corridors in Central Europe, Railnet Austria's Infrastructure Network incurs continual increases in international traffic flows and is therefore subject to accumulating traffic congestion with potential restrictions to infrastructure access. This imposes challenges towards preserving open access to Railnet Austria's existing railway network and hinders quality infrastructure service during maintenance, repair, and upgrading. Through Railnet Austria's experiences, the economic viability of a railway network can be sustained through maintaining open access with good quality service of planned trainpaths, thus representing new challenges for future infrastructure maintenance and capacity planning. Railnet Austria's Capacity Management Department has proven that these challenges can be accommodated more effectively through recent technological developments in data warehousing and software development.

  • PDF

Survey of Trust Management System in Internet of Things

  • Meghana P.Lokhande;Dipti Durgesh Patil;Sonali Tidke
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.53-58
    • /
    • 2024
  • The Internet of Things (IoT) enables the connection of millions of disparate devices to the World Wide Web. To perform the task, a lot of smart gadgets must work together. The gadgets recognize other devices as part of their network service. Keeping participating devices safe is a crucial component of the internet of things. When gadgets communicate with one another, they require a promise of confidence. Trust provides certainty that the gadgets or objects will function as expected. Trust management is more difficult than security management. This review includes a thorough examination of trust management in a variety of situations.

Single Image Dehazing: An Analysis on Generative Adversarial Network

  • Amina Khatun;Mohammad Reduanul Haque;Rabeya Basri;Mohammad Shorif Uddin
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.136-142
    • /
    • 2024
  • Haze is a very common phenomenon that degrades or reduces the visibility. It causes various problems where high quality images are required such as traffic and security monitoring. So haze removal from images receives great attention for clear vision. Due to its huge impact, significant advances have been achieved but the task yet remains a challenging one. Recently, different types of deep generative adversarial networks (GAN) are applied to suppress the noise and improve the dehazing performance. But it is unclear how these algorithms would perform on hazy images acquired "in the wild" and how we could gauge the progress in the field. This paper aims to bridge this gap. We present a comprehensive study and experimental evaluation on diverse GAN models in single image dehazing through benchmark datasets.