• Title/Summary/Keyword: space security

Search Result 977, Processing Time 0.03 seconds

Media Technologies In The Educational Space: The Formation Of Intellectual Independence

  • Parshukova, Lesia;Loboda, Olga;Maha, Petro;Solomenko, Lina;Svanidze, Lia;Levytskyi, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.323-327
    • /
    • 2021
  • The article examines the process of professional training in educational institutions, media technologies and methods of media communication in the educational space of the institution, characterizes the place of media technologies in the educational space in the context of the term "educational space" itself, systematizes the methods of media communications in education. The peculiarities of media education as a set of means and methods of teaching young people adequate media perception are pointed out.

The Concept of the Formation of the Teacher's Innovative Competence in the Space of Lifelong Education

  • Boiko, Olha;Oborska, Svitlana;Kyrylenko, Kateryna;Cherevko, Svitlana;Lebid, Olha;Kulko, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.59-64
    • /
    • 2021
  • The article proposes the process of formation of the teacher's innovative competence in the space of lifelong education the foundations of the formation of the teacher's innovative competence in the space of continuous education. The concept of the formation of the teacher's innovative competence in the space of lifelong education is proposed; it includes initial ideas, goals, objectives, patterns, principles, stages, content and technologies implementation of this process.

COLORNET: Importance of Color Spaces in Content based Image Retrieval

  • Judy Gateri;Richard Rimiru;Micheal Kimwele
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.33-40
    • /
    • 2023
  • The mainstay of current image recovery frameworks is Content-Based Image Retrieval (CBIR). The most distinctive retrieval method involves the submission of an image query, after which the system extracts visual characteristics such as shape, color, and texture from the images. Most of the techniques use RGB color space to extract and classify images as it is the default color space of the images when those techniques fail to change the color space of the images. To determine the most effective color space for retrieving images, this research discusses the transformation of RGB to different color spaces, feature extraction, and usage of Convolutional Neural Networks for retrieval.

BLOCH-TYPE SPACE RELATED WITH NORMAL FUNCTION

  • Choi, Ki Seong
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.24 no.3
    • /
    • pp.533-541
    • /
    • 2011
  • Let ${\omega}$ be a normal function. In this paper, we will extend the concept of Bloch space to Bloch-type space related with normal function ${\omega}$. We will investigate the properties of Bloch-type space ${\mathcal{B}}_{\omega}$ and the little Bloch-type space ${\mathcal{B}}_{{\omega},0}$ with weight ${\omega}$.

Study Tendency of Cyber Security in Power IT Area (전력 IT Cyber Security 연구 동향)

  • Kim, Hak-Man;Park, Jae-Sae;Kim, Sang-Nam
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.205-206
    • /
    • 2008
  • Electrical Power System is very important infrastructure in the country. The functions of control, monitoring and so on in the electrical power system are implemented by information technologies(IT) through cyber space. Recently, many activities for enhancing cyber security in the world. In this paper, we introduce the study tendency of cyber security in power IT areas.

  • PDF

Influence of Electrical Aging on Space Charge Dynamics of Oil-Impregnated Paper Insulation under AC-DC Combined Voltages

  • Wang, Yan;Li, Jian;Wu, Sicheng;Sun, Peng
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.6
    • /
    • pp.1512-1519
    • /
    • 2013
  • Oil-impregnated paper is a major type of insulation used in oil-filled converter transformers for both traditional and new energy systems. This paper presents and analyzes the results of the experiment conducted on the electrical aging of oil-impregnated paper under AC-DC combined voltages using the pulsed electro-acoustic (PEA) technique. The formation and dynamics of space charge affected the performance of insulation material. The electrical aged oil-paper insulation was obtained through electrical aged experiments under the voltages. Based on the PEA technique, measurements were carried out when the oil-paper insulation system was subjected to different stressing and aging times. The space charge dynamics in the bulk of the oil-paper insulation system with different aging times were measured and analyzed. Characteristic parameters such as the total charge injection amount, the total charges of fast moving and slow moving, and the distortion factor of electric field were calculated and discussed. Results show that the longer electrical aging time, the more charges trapped in the bulk of aging sample. It leads to larger distortion factor of electric field in the bulk of aging samples and accelerate degradation of oil-paper insulation under AC-DC combined voltages.

Fact and plan on specialist training for social security (사회안전관리에 대한 전문인력 양성실태와 발전방안)

  • Kong, Bae-Wan;Kim, Chang-Ho
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.5-18
    • /
    • 2002
  • The private security has been one of the fastest growing parts of the law enforcement industry, confronted with mutual coincidence or complementarity. Therefore, the primary factor in order to straighten it up should be bringing op a person, because he or she arranges the private security, based on the society in the end. In addition, it is suggested that further study of technical learning and its practice should be arranged. Because the education for agents undertaking the social security is comprehensive in space and limited in time, it may accompany hardship in arranging its content and curriculum Although this article leaves much to be desired, it has been analyzed end observed if a greater emphasis is placed on ample human resources supply for increased demand on social security in private law enforcement industry through institutional education system. A scientific advancement is expected to be attained in the majors related to the private security, with validity that the continuous studies should be implemented, and a social role of colleges as a specialized institute should be erected.

  • PDF

Comparison of Corporate Security Control Level with Social Trust Index (사회 신뢰수준에 따른 기업의 보안통제 수준 비교)

  • Na, Husung;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.673-685
    • /
    • 2017
  • STI(Social Trust Index) indicates levels of trustworthiness, honesty and reliability among people in a society. Since the STI varies in countries, security control on cyber space should be applied differently according to the STI so that companies can protect their assets efficiently and effectively. We compare STIs between Korea and United States using the Diamond Model and investigate how the STIs affect corporate security controls in those two countries. We finally present a formula using AHP (Analytic Hierarchy Process) to measure levels of corporate security controls in different countries.

Intrusion detection based on the sound field variation of audible frequency band (가청 주파수대 음장 변화 측정 기반 침입 감지 기술)

  • Lee, Sung-Q.;Park, Kang-Ho;Yang, Woo-Seok;Kim, Jong-Dae;Kim, Dae-Sung;Kim, Ki-Hyun;Wang, Se-Myung
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2010.10a
    • /
    • pp.187-192
    • /
    • 2010
  • In this paper, intrusion detection technique based on the sound field variation of audio frequency in the security space is proposed. The sound field formed by sound source can be detected with the microphone when the obstacle or intruder is positioned. The sound field variation due to the intruder is based on the interference of audio wave. With the help of numerical simulation of sound field formations, the increase or decrease of sound pressure level is analyzed not only the obstacle, but also the intruder. Even the microphone is positioned behind the source, sound pressure level can be increase or decrease due to the interference. Frequency response test is performed with Gaussian white noise signal to get the whole frequency response from 0 to half of sampling frequency. There are three security cases. Case 1 is the situation of empty space with and without intruder, case 2 is the situation of blocking obstacle with and without intruder, and case 3 is the situation of side blocking obstacle with and without intruder. At each case, the frequency response is obtained first at the security space without intruder, and second with intruder. From the experiment, intruder size of $50cm{\times}50cm$ can be successfully detected with the proposed technique. Moreover, the case 2 or case 3 bring about bigger sound field variation. It means that the proposed technique have the potential of more credible security sensing in real situation.

  • PDF