• Title/Summary/Keyword: security component

Search Result 407, Processing Time 0.022 seconds

Hybrid Model Based Intruder Detection System to Prevent Users from Cyber Attacks

  • Singh, Devendra Kumar;Shrivastava, Manish
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.272-276
    • /
    • 2021
  • Presently, Online / Offline Users are facing cyber attacks every day. These cyber attacks affect user's performance, resources and various daily activities. Due to this critical situation, attention must be given to prevent such users through cyber attacks. The objective of this research paper is to improve the IDS systems by using machine learning approach to develop a hybrid model which controls the cyber attacks. This Hybrid model uses the available KDD 1999 intrusion detection dataset. In first step, Hybrid Model performs feature optimization by reducing the unimportant features of the dataset through decision tree, support vector machine, genetic algorithm, particle swarm optimization and principal component analysis techniques. In second step, Hybrid Model will find out the minimum number of features to point out accurate detection of cyber attacks. This hybrid model was developed by using machine learning algorithms like PSO, GA and ELM, which trained the system with available data to perform the predictions. The Hybrid Model had an accuracy of 99.94%, which states that it may be highly useful to prevent the users from cyber attacks.

LTE Packet Scheduling with Bandwidth Type Consideration

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.351-357
    • /
    • 2022
  • LTE (Long-Term Evolution, sometimes known as 4G LTE) is a wireless high-speed data communication technology for mobile phones and data terminals. The Packet Scheduler (PS) is an important component in improving network performance. Physical Resource Blocks (PRBs) are assigned to associated User Equipment by the packet scheduler (UEs). The primary contribution of this study is a comparison of the eNodeB throughput between a suggested method and the Round Robin (RR) Algorithm. The RR Algorithm distributes PRBs among all associated UEs without taking channel circumstances into account. In this research, we present a new scheduling method that takes into account the number of PRBs and associated UEs and produces higher throughput than the RR algorithm.

HetNet Characteristics and Models in 5G Networks

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.27-32
    • /
    • 2022
  • The fifth generation (5G) mobile communication technology is designed to meet all communication needs. Heterogeneous networks (HetNets) are a new emerging network structure. HetNets have greater potential for radio resource reuse and better service quality than homogeneous networks since they can evolve small cells into macrocells. Effective resource allocation techniques reduce inter-user interference while optimizing the utilization of limited spectrum resources in HetNets. This article discusses resource allocation in 5G HetNets. This paper explains HetNets and how they work. Typical cell types in HetNets are summarized. Also, HetNets models are explained in the third section. The fourth component addresses radio resource control and mobility management. Moreover, future study in this subject may benefit from this article's significant insights on how HetNets function.

Usability Principles for Augmented Reality Applications in Education

  • Al-Obaidi, Arwa;Prince, Master
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.49-54
    • /
    • 2022
  • It is challenging to select appropriate technology in education to interact with students in today's digital world. Especially when the technologies used at home on smart devices like tablets and mobile phones are very advanced, on the other side, it may be more challenging to find sharing technology in the classroom. One of the ways is to use new technologies like Augmented Reality (AR). The current study aims to develop usability principles for the development and evaluation of education using AR technology applications. We develop usability principles for AR applications by analyzing existing research about heuristic evaluation methods, design principles for AR systems.

Novel Two-Level Randomized Sector-based Routing to Maintain Source Location Privacy in WSN for IoT

  • Jainulabudeen, A.;Surputheen, M. Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.285-291
    • /
    • 2022
  • WSN is the major component for information transfer in IoT environments. Source Location Privacy (SLP) has attracted attention in WSN environments. Effective SLP can avoid adversaries to backtrack and capture source nodes. This work presents a Two-Level Randomized Sector-based Routing (TLRSR) model to ensure SLP in wireless environments. Sector creation is the initial process, where the nodes in the network are grouped into defined sectors. The first level routing process identifies sector-based route to the destination node, which is performed by Ant Colony Optimization (ACO). The second level performs route extraction, which identifies the actual nodes for transmission. The route extraction is randomized and is performed using Simulated Annealing. This process is distributed between the nodes, hence ensures even charge depletion across the network. Randomized node selection process ensures SLP and also avoids depletion of certain specific nodes, resulting in increased network lifetime. Experiments and comparisons indicate faster route detection and optimal paths by the TLRSR model.

Marketing Technologies In Educational Management: Current Problems

  • Zhytomyrska, Tetiana;Zrybnieva, Iryna;Romaniuk, Nadiia;Havrysh, Iryna;Gorditsa, Tetyana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.298-302
    • /
    • 2022
  • The article considers in detail the possibilities and significance of marketing technologies for additional education programs as the most flexible and adaptive component of the educational process. Moreover, additional education programs are the most market-defined. Also at this stage, we have developed the structure of the e-mail message about ongoing additional educational programs in order to promote them, and on its basis, we have prepared an example of a letter for e-mail.informational and educational mailing using techniques to attract the attention of the addressee in order to promote additional educational programs.The content of the letter was also formed for students of the electronic course "Education Marketing", sent out in order to monitor the educational process.

Multi-encryption Watermarking Technique using Color Image Pixels

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.116-121
    • /
    • 2022
  • In this paper, we propose a highly secure watermarking technique in which the watermark is multi-encrypted using the R, G, and B component pixels of color image, and then the multi-encrypted watermark is hidden in the LSB of the color image pixel. According to the technique proposed in this paper, the quality of the stego-image created by hiding the multi-encrypted watermark in the LSB of the color image is so excellent that the difference from the cover image cannot be recognized. Also, it is possible to extract the original watermark from the stego-image without loss. If the watermark is hidden in the image using the proposed technique, the security of the watermark is maintained very well because the watermark hidden in the stego-image is multi-encrypted. The proposed watermarking technique can be used in the applications such as military and intellectual property protection requiring high security.

Features Of The Implementation Of Inclusive Education: The Role Of The Teacher

  • Klochko, Oksana;Pohoda, Olena;Rybalko, Petro;Kravchenko, Anatoly;Tytovych, Andrii;Kondratenko, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.109-114
    • /
    • 2022
  • The article theoretically analyzed and specified definitions such as: "professional development of personality, competence, professional competence of a teacher". Structural components of professional competence are defined, namely: theoretical involves deep knowledge in the field of special pedagogy, special psychology; technological involves the use of acquired knowledge in practical activities and personal in which important personal characteristics of a special teacher are noted. Criteria and levels of development of professional competence of future special teachers are determined. The article analyzes the peculiarities of the professional activity of a teacher in the conditions of an inclusive educational space, in particular, the special training of a teacher as an integral component of this process. Emphasis is placed on the cooperation of teachers in an inclusive educational institution for the socialization of a child with special needs and her preparation for independent life.

Effective Criminals Face Recognition Integrating Holistic and Local methods (전역적 특징 인식 및 지역적 특징 인식의 결합을 이용한 효과적인 지명수배자 얼굴인식)

  • Yeo, Dong-Hyun;Kim, Hyun-Jung;Won, Il-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.384-387
    • /
    • 2011
  • 본 논문에서 제안된 모델은 기존의 얼굴 인식 및 지명수배자 얼굴 인식 시스템보다 효과적인 인식률 향상을 위해 전역적 특징을 사용하는 PCA(Principal Component Analysis) 알고리즘과 지역적 특징을 사용하는 2D-HMM(Hidden Markov Model) 알고리즘을 결합한 지명수배자 얼굴인식 시스템이다. 입력된 영상을 전역적 얼굴인식 알고리즘을 통해 얼굴 탐지 및 인식을 수행하고, 탐지 및 인식에 실패한 영상은 지역적 얼굴인식 알고리즘을 통해 2차 인식 과정을 수행한다. 실험과 분석을 통해 제안된 방법을 효율성을 증명하였다.

Software Supply Chain Management and SBOM Trends (SW공급망 관리 및 SBOM 동향)

  • W.O. Ryoo;S.M. Park;S.Y. Lee
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.4
    • /
    • pp.81-94
    • /
    • 2023
  • The increased adoption of open source security management in supply chains is gaining worldwide attention. In particular, as security and threatening situations, such as solar winds, Kaseya ransomware, and Log4j vulnerability, are becoming more common in supply chains using software (SW)-defined networks, SW bills of materials (SBOMs) for SW products should be prepared to protect major countries like the United States. An SBOM provides SW component information and is expected to become required for SW supply chain management. We focus on SW supply chain management policies and SBOM trends in major countries and private organizations worldwide for safe SW use and determine the current status of Korea and ETRI's open source SW supply chain management trends.