{"title":"An approach for optimized architectural design of virtual local area network","authors":"R. Romansky","doi":"10.57028/c55-119-z1025","DOIUrl":"https://doi.org/10.57028/c55-119-z1025","url":null,"abstract":"The contemporary digital age is mainly based on network communications, which determines the high importance of network design to meet the trends and demands of users to access services. Such a trend is the virtualization of network components, which is characteristic not only of cloud computing, but also of communications between users in different private companies and public organizations. In this regard, the article is deals whit an opportunity for an optimized architectural design of a network environment, discussing the conditions for configuring VLANs, structuring a segment for free access (demilitarized zone) and the peculiarities of developing a virtual private network. A structural model is proposed to design a network architecture with defined sequential phases to achieve an optimized result.","PeriodicalId":254504,"journal":{"name":"Communication & Cognition","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122352635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WEB SECURITY: A QUICK START INTRODUCTION TO OAUTH 2.0 AND KEYCLOAK 19.X AUTHORIZATION SCENARIOS","authors":"P. Kaczmarski, F. Vandamme","doi":"10.57028/c55-119-z1026","DOIUrl":"https://doi.org/10.57028/c55-119-z1026","url":null,"abstract":"OAuth 2.0 (Hardt, 2012) (note 1) is a widely used web security protocol. The aim of this paper is to illustrate OAuth 2.0 procedures by the use of Keycloak authorization server (Thorgensen, 2021) (note 6). Since OAuth 2.0 is a broad subject, we focus on selected Best Current Practice (BCP) topics, including the common types of authorization flows, and on the key aspects of bearer token processing by the protected resource server. The evolution of OAuth 2.0 towards OAuth version 2.1 implied by new internet challenges is also briefly discussed. To illustrate OAuth 2.0 procedures, we use a .NET6/C# demo implementation of client and server HTTP components, utilizing thereby well-known .NET6/C# classes such as HttpClient and HttpListener.","PeriodicalId":254504,"journal":{"name":"Communication & Cognition","volume":"94 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123241443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MINING TELECOMMUNICATION DATA TO PREDICT CUSTOMER CHURN WITH FILTER-BASED FEATURE USING WEKA","authors":"Ahmad Khalaf, Mohamed Dweib, Yousef S. Abuzir","doi":"10.57028/c55-119-z1029","DOIUrl":"https://doi.org/10.57028/c55-119-z1029","url":null,"abstract":"It is important for companies operating in the telecom field to recruit new customers while retaining their customers and avoiding losing them. There are many reasons why customers cancel their contracts, such as poor service experiences, or changing personal situations. In the past decades, the use of data mining methods for decision-making has increased in several areas, and the successful use of data mining methods has shown great advantages in many areas.This paper is aiming to build a classification model, to improve the customer churn prediction with help of feature selection techniques that focus on the most factors that affect this issue.The process of selecting influencing factors plays an important role in the data mining process, the database contains several factors that are not relevant to an effective classification process.After feature selection, this paper performs three different classifiers on the dataset to bring out the best results and compare them.The IBM Sample Data Sets was used in this technique which has 7043 user’s entries and 21 features. The performance was evaluated using Accuracy, Precision, Recall rate, and Confusion Matrix.","PeriodicalId":254504,"journal":{"name":"Communication & Cognition","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120967011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FRACTALS TO EXPRESS AND MEASURE CULTURE, CULTURAL INNOVATION, COOPERATION, HYPOCRITICAL COOPERATION, DYSSOCIAL AND PSYCHOPATIC BEHAVIOR","authors":"F. Vandamme, Wan Lin, P. Kaczmarski","doi":"10.57028/c55-119-z1027","DOIUrl":"https://doi.org/10.57028/c55-119-z1027","url":null,"abstract":"An introduction is made to formulate through the language of fractals the basic processes of culture, cultural change, cultural innovation, cooperation, hypocrisy, hypocritical cooperation, dyssocial or psychopathic behavior, etc... On this base, we are able to express, to describe and moreover to try to discover, to challenge and to protect against abuse all these crucial behaviors in management, in theoretical and applied science of justice, jurisdiction, jurisprudence as well in politicology, science of war and peace…","PeriodicalId":254504,"journal":{"name":"Communication & Cognition","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122845741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EVALUATION PROCESS OF COLLABORATIVE GROUP LEARNING AND THE FEELINGS IT ENGENDERS WITH REFERENCE TO MATHEMATICAL SUBJECTS TAUGHT WITH THE HELP OF ELECTRICAL RESISTORS: APPLICATION IN THE TECHNOLOGY LABORATORY","authors":"Andreas Marinos","doi":"10.57028/c55-119-z1028","DOIUrl":"https://doi.org/10.57028/c55-119-z1028","url":null,"abstract":"This work refers to a teaching evaluation of a collaborative group learning lesson by a second group of teachers who were present in the classroom during the lesson. This collaborative teaching was to do with the learning of simple concepts of fractional numbers by Technical School students who, despite their school class level and their age, had not managed to grasp these concepts earlier and could not understand them. The teaching was carried out with the help of measurements of variable resistors. After the end of the teaching, success of the programme was evaluated positively by other teachers who had been present in the classroom during the actual lesson, basing their findings on a series of criteria. At the same time there appeared a differentiation of the opinions and emotions generated in the students after this approach which correlated with the way the teacher taught the lesson and the form of peer evaluated teaching. Positive results showed the success of the teaching as did the repetition of the process with a test after one month using similar fractional concepts (done in the students’ notebooks).","PeriodicalId":254504,"journal":{"name":"Communication & Cognition","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126481263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distant Learning during Covid-19 Epidemic","authors":"L. Rothkrantz","doi":"10.57028/c55-003-z1020","DOIUrl":"https://doi.org/10.57028/c55-003-z1020","url":null,"abstract":"During the academic year 2020-2021 Universities in the Netherlands were closed because of the COVID-19 pandemic. All real life lectures were replaced by distant learning. It was expected that during the academic year new innovative ways of digital teaching-learning have been developed. But it proved that most teachers used classical web-lectures to teach their classes. Even though students have access to learning material any time and any place, current tools for e-learning still have their limitations. The main shortcoming, compared to real life learning is the limited opportunity for human like interaction between student, teacher and material. Another problem is that web-lectures are self-paced programs, offered asynchronously. They allow students to take the course anytime, anywhere. This is an advantage for some students, but others miss the self-control to take and complete courses. They miss the social control of peer students and teachers. It proves that about 25% of students of Universities in the Netherlands suffer from burnout symptoms at the end of the academic year. These students suffered from feelings of loneliness, unhappiness, stress, nervousness, having a negative effect on their well-being sometimes resulting in a burn-out or depression. In this paper we report about a MOOC based on serious gaming technology, stimulating interaction and cooperation between participants.","PeriodicalId":254504,"journal":{"name":"Communication & Cognition","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130638370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Quadrature of the Governance Triangle: on the Heritage of Idealism and Prometheus’ myth","authors":"W. Allaerts","doi":"10.57028/c55-021-z1021","DOIUrl":"https://doi.org/10.57028/c55-021-z1021","url":null,"abstract":"In this paper, the historical, philosophical and political roots of binary thinking are analyzed. The influence of a religious or ideological hegemony of symbolic nature, on patterns of thinking in philosophy, science and in other aspects of human interest are critically examined. Starting from the Foucauldian merger of biopolitics and state sovereignity – after a major world pandemic crisis – and a post-deconstructivist analysis of the role of written language and academic literacy, a closer look at contemporary developments is offered. In particular, the heritage of Idealism is investigated in the present notions of universal mathematics and loopholes claiming the unification of physics and mathematics and the digitalization and algorithmic quantification of all aspects of human life and culture. In contrast to these developments, we propose a renewed approach of reading and experiencing symbols in patterns of interpersonal communication, with special reference to the phenomenon of music.","PeriodicalId":254504,"journal":{"name":"Communication & Cognition","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121700410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disinformation, Critical Thinking and Dyssocial Techniques and Methods","authors":"F. Vandamme, P. Kaczmarski, Wan Lin","doi":"10.57028/c55-049-z1022","DOIUrl":"https://doi.org/10.57028/c55-049-z1022","url":null,"abstract":"One of the wonders of disinformation, is the popularity, which is very quickly generated by the bullies, the manipulators, the users of dyssocial, hypocritic methods and techniques. In this study, we do not only give an overview in the main techniques and methods for generation successful and efficient disinformation methods in view of better fighting the disinformation methods. To be efficient in these fights, it is vital to be aware why these bullies and disinformation actors are becoming so easily that popular. We are able to clarify these basic process of popularity generation by these disinformation producing actors. Moreover disinformation and critical thinking are phenomena which are very central in all issues concerning communication and cognition. However there are a lot of methods and techniques which are being used for making and producing disinformation, but which are also very important in ways to avoid, to defeat, to overcome and to limit the impact of the methods and techniques which are being used for making and producing disinformation. Some of those methods or techniques can be very noble in some domains or situations and nevertheless be very dangerous to hamper, to harm people if used to abuse. We think about using and abusing empathy and compassion. We introduce an overview of a lot of techniques and methods, which are used to generate disinformation. We also indicate ways how to defend against these methods and techniques. The methods discussed are: manipulation methods and techniques, bullying techniques, the mechanism of “fake news” production, based on the 16th century theory and practice of casuistry and probabilism, which are still highly relevant today, the dyssocial methods and techniques, the C and DC fractals, abuse of empathy and compassion. In this paper special attention is paid to stimulating and training critical thinking and NEG-critical thinking in children, adolescents, adults, seniors and nestors; to grids for detection and assessment of disinformation methods and techniques; to dynamic harmony challenges concerning cooperation versus self-protection in the face of disinformation challenges (of organizations, individuals, groups). Another challenge is how to exploit and use the assessments of manipulations and disinformation’s in the media, between colleagues, between companies, in wartime…","PeriodicalId":254504,"journal":{"name":"Communication & Cognition","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123438937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}