• Title/Summary/Keyword: use of computer technologies

Search Result 652, Processing Time 0.024 seconds

IoT Security and Machine Learning

  • Almalki, Sarah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.103-114
    • /
    • 2022
  • The Internet of Things (IoT) is one of the fastest technologies that are used in various applications and fields. The concept of IoT will not only be limited to the fields of scientific and technical life but will also gradually spread to become an essential part of our daily life and routine. Before, IoT was a complex term unknown to many, but soon it will become something common. IoT is a natural and indispensable routine in which smart devices and sensors are connected wirelessly or wired over the Internet to exchange and process data. With all the benefits and advantages offered by the IoT, it does not face many security and privacy challenges because the current traditional security protocols are not suitable for IoT technologies. In this paper, we presented a comprehensive survey of the latest studies from 2018 to 2021 related to the security of the IoT and the use of machine learning (ML) and deep learning and their applications in addressing security and privacy in the IoT. A description was initially presented, followed by a comprehensive overview of the IoT and its applications and the basic important safety requirements of confidentiality, integrity, and availability and its application in the IoT. Then we reviewed the attacks and challenges facing the IoT. We also focused on ML and its applications in addressing the security problem on the IoT.

Smart Deaf Emergency Application Based on Human-Computer Interaction Principles

  • Ahmed, Thowiba E;Almadan, Naba Abdulraouf;Elsadek, Alma Nabil;Albishi, Haya Zayed;Al-Qahtani, Norah Eid;Alghamdi, arah Khaled
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.284-288
    • /
    • 2021
  • Human-computer interaction is a discipline concerned with the design, evaluation, and implementation of interactive systems for human use. In this paper we suggest designing a smart deaf emergency application based on Human-Computer Interaction (HCI) principles whereas nowadays everything around us is becoming smart, People already have smartphones, smartwatches, smart cars, smart houses, and many other technologies that offer a wide range of useful options. So, a smart mobile application using Text Telephone or TeleTYpe technology (TTY) has been proposed to help people with deafness or impaired hearing to communicate and seek help in emergencies. Deaf people find it difficult to communicate with people, especially in emergency status. It is stipulated that deaf people In all societies must have equal rights to use emergency services as other people. With the proposed application the deafness or impaired hearing can request help with one touch, and the location will be determined, also the user status will be sent to the emergency services through the application, making it easier to reach them and provide them with assistance. The application contains several classifications and emergency status (traffic, police, road safety, ambulance, fire fighting). The expected results from this design are interactive, experiential, efficient, and comprehensive features of human-computer interactive technology which may achieve user satisfaction.

Quality Assessment Model for Practical Wearable Computers (실용적 웨어러블 컴퓨터 품질평가모델)

  • Oh, Cheon-Seok;Choi, Jae-Hyun;Kim, Jong-Bae;Park, Jea-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.842-855
    • /
    • 2014
  • Recently, the progress of smart phone market has retarded by oversupply therefore wearable computer has been the focus of new growth engine. Wearable computing system is a complex fusion of a variety of technologies such as wireless network, embedded, sensor and new material. Because these technologies involves utilization and mobility in addition to quality characteristic in existing software, application of ISO/IEC 9126 is not perfect when assessing quality of wearable computer. In this study, author suggested new quality assessment model for wearable computer by sorting quality attribute in ISO/IEC 9126 and adding new quality attribute. For this, author investigated features and functional requirements related to wearable computer. and then author suggested quality standard and metrics by identifying quality characteristic. Author confirmed practicality of quality assessment model by using suggested model in scenario and comparing quality assessment of three goods such as company S, L, G. This quality assessment model is expected to use guidelines for assessing quality of wearable computer.

Impact of Digitalization On the Banking System Transformation

  • Shcherbatykh, Denis;Shpileva, Vira;Riabokin, Maryna;Zham, Olena;Zalizniuk, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.513-520
    • /
    • 2021
  • The purpose of the article is to study the impact of digitalization on the transformation of the banking system, taking into account current innovative development trends. The article analyzes the impact of key factors on the development of the digital economy. Ukraine's ranking positions in terms of digital competitiveness are shown. The necessity of using digital technologies in the sphere of banking activity is substantiated. The dynamics of changes in the number of operating banks in Ukraine is analyzed. The directions of introduction of information technologies in the sphere of banking activity are determined. An analysis of changes in the share of the population of individual EU member states that use the Internet for Internet banking. It is noted that modern transformation trends, digitalization of the economy have a significant impact on the landscape of the banking sector, in this context, the rating of Ukrainian banks in the categories of "Internet Banking" and "Mobile Banking". The advantages and disadvantages of using the capabilities of Internet banking are identified. Based on the study, the importance of expanding the boundaries of digitalization of the domestic banking system is substantiated, which will further increase the level of availability of online services in the field of banking. Prospects for further research are identified in the study of the impact of digitalization on the development of the banking system of foreign countries.

Development of University Liberal Education Curriculum for Creating Video Content -Understanding and Production of Video Content- (영상콘텐츠 제작을 위한 대학 교양 커리큘럼 개발 -영상콘텐츠의 이해와 제작-)

  • Park, Sung-Dae
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.6
    • /
    • pp.792-801
    • /
    • 2020
  • Today, the media environment has changed dramatically with the development of Internet transmission technology, computer performance, and various media production technologies. In particular, video content is widely used every day through mobile device or computer connected to the Internet. In addition, the ability to produce video content today is more important than ever, as the use of video content is also increasing in the area of information delivery and communication over the Internet. In this study, it was developed a liberal education curriculum in universities for the production of video content. The developed curriculum was composed of a combination of an online curriculum for theory and an offline curriculum for practicum. In the online curriculum, a 54 DOOR contents were developed to allow students to learn the theoretical knowledge and basic making techniques related to the production of video content. In an offline 15-week practicum curriculum, it covered the practical training contents of video content production that should be acquired every week. This developed liberal education curriculum aims to give non-major students in universities the opportunity to learn the technology of producing video content and to foster the ability to communicate in the media environment by using the video content produced.

Digital Tourism Security System for Nepal

  • Shrestha, Deepanjal;Wenan, Tan;Khadka, Adesh;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4331-4354
    • /
    • 2020
  • Nepal is a sensitive and disaster-prone country where safety and security risk are of high concern for travelers. Digital technologies can play a vital role in addressing safety and security issues in the country. This research work proposes a Digital tourism security system design for addressing the safety and security issues in tourism industry of Nepal. The study uses Design science research methodology to identify artifacts, interactions, information flow and dependencies between them which are then mapped with existing prevalent technology to provide design solutions. Data is obtained from interview of tourist and experts as a primary source and technical documents/draft, software documentations, surveys as secondary source. Generalized information model, Use cases model, Network architecture model, Layered taxonomy model and Digital tourism technology reference model are the outcomes of the study. The work is very important as it talks specifically about implementation and integration of digital technologies in tourism security governance at federal, provincial, municipal and rural level. The research supplements as a knowledge document for design and implementation of digital tourism security system in practice. As there is very less work on digital systems in tourism security of Nepal, this work is a pioneer and first of its kind.

u-Learning DCC Contents Authoring Systems based on Learning Activities

  • Seong, Dong-Ook;Lee, Mi-Sook;Park, Jun-Ho;Park, Hyeong-Soon;Park, Chan;Yoo, Kwan-Hee;Yoo, Jae-Soo
    • International Journal of Contents
    • /
    • v.4 no.4
    • /
    • pp.18-23
    • /
    • 2008
  • With the development of information communication and network technologies, ubiquitous era that supports various services regardless of places and time has been advancing. The development of such technologies has a great influence on educational environments. As a result, e-learning concepts that learners use learning contents in anywhere and anytime have been proposed. The various learning contents authoring systems that consider the e-learning environments have also been developed. However, since most of the existing authoring systems support only PC environments, they are not suitable for various ubiquitous mobile devices. In this paper, we design and implement a contents authoring system based on learning activities for u-learning environments. Our authoring system significantly improves the efficiency for authoring contents and supports various ubiquitous devices as well as PCs.

TRANS-SASAKIAN MANIFOLDS WITH RESPECT TO GENERALIZED TANAKA-WEBSTER CONNECTION

  • Kazan, Ahmet;Karadag, H.Bayram
    • Honam Mathematical Journal
    • /
    • v.40 no.3
    • /
    • pp.487-508
    • /
    • 2018
  • In this study, we use the generalized Tanaka-Webster connection on a trans-Sasakian manifold of type (${\alpha},{\beta}$) and obtain the curvature tensors of a trans-Sasakian manifold with respect to this connection. Also, we investigate some special curvature conditions of a trans-Sasakian manifold with respect to generalized Tanaka-Webster connection and finally, give an example for trans-Sasakian manifolds.

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.

Trends in Programmable Object-Based Content Production Technologies (프로그래밍 방식의 객체 기반 영상 콘텐츠 제작 기술 동향)

  • Lee, J.Y.;Kim, T.O.;Choo, H.G.;Lee, H.K.;Seok, W.H.;Kang, J.W.;Hur, N.H.;Kim, H.M.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.4
    • /
    • pp.70-80
    • /
    • 2022
  • With the rapid growth in media service platforms providing broadcast programs or content services, content production has become more important and competitive. As a strategy to meet the diverse needs of global consumers for a variety of content and to retain them as long-term repeat customers, global over-the-top service providers are increasing not only the number of content productions but also their production efficiency. Moreover, a considerable amount of scene composition in the flow of content production work appears to be combined with rendering technology from a game engine and converted to object-based computer programming, thereby enhancing the creativity, diversity, quality, and efficiency of content production. This study examines the latest technology trends in content production such as virtual studio technology, which has emerged as the center of content production, the use cases in various fields of artificial intelligence, and the metadata standards for content search or scene composition. This study also examines the possibility of using object-based computer programming as one of the future candidate technologies for content production.