To see the other types of publications on this topic, follow the link: Anti-virus information protection system.

Journal articles on the topic 'Anti-virus information protection system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Anti-virus information protection system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Марценюк, В., І. Дідманідзе, I. Андрущак, Т. Крадінова, and К. Рудь. "Information security: anti-virus protection technologies." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 38 (March 13, 2020): 79–84. http://dx.doi.org/10.36910/6775-2524-0560-2020-38-07.

Full text
Abstract:
The article deals with the normative and methodological bases of classification of information security threats related to the use of malware against information systems. The threats to the impact on the information systems of certain types of malware are highlighted. In the process, antivirus experts desing and develop new methodologies to make them stronger, more and more every day. The purpose of this paper is to reviev these methodologies and outline their strengths and weaknesses to encourage those and interested in more investigation on these areas.
APA, Harvard, Vancouver, ISO, and other styles
2

Widarma, Adi, M. Dedi Irawan, Fajri Nurhidayahti, and Ranis Hsb. "Decision Support System Determining Computer Virus Protection Applications Using Simple Additive Weighting (SAW) Method." Journal of Computer Networks, Architecture, and High-Performance Computing 3, no. 1 (March 2, 2021): 86–79. http://dx.doi.org/10.47709/cnahpc.v3i1.936.

Full text
Abstract:
The use of information technology devices such as computers or laptops is currently increasing. The increased use is due to the fact that these devices are very supportive of our daily work activities. With the increasing use of these computers, data security on a computer or laptop device must be completely safe from virus attacks. To ward off viral attacks m aka requires the application of anti-virus to inhibit and prevent a variety of viruses that enter into the computer system so that the computer user's activity was not bothered by the many viruses are easily spread. Because there are too many antiviruses on the market, it is necessary to choose a good antivirus. One of the ways to choose antivirus is the existence of a decision support system . In this study, the Simple Additive Weighting (SAW) method was applied for the anti-virus application selection system. This data assessment analysis aims to produce the best anti - virus application options that computer users can use to secure their computer data. The criteria and weights used are K1 = application rating (5%) , K2 = completeness of features (30%) , K3 = price / official license (5%) , K4 = malware detection (45%) and K5 = blocking URL (15%). Of the 25 alternatives used, the results of the study, namely alternative A1 = Kaspersky anti-virus get the highest ranking result.
APA, Harvard, Vancouver, ISO, and other styles
3

Zaporotskov, Pavel. "Development of a Method for Conducting an Audit of the Information Security System." NBI Technologies, no. 4 (March 2021): 18–27. http://dx.doi.org/10.15688/nbit.jvolsu.2020.4.3.

Full text
Abstract:
Information processes, as well as information resources, manage information of varying degrees of importance for the enterprise. In this regard, the protection of such information is one of the most important procedures in the field of state security, the importance of which is growing every year. The problem of information security – the reliable provision of its safety and the established status of use – is one of the most important problems of our time. The paper considers the existing standards in the field of information security audit. The author has developed an innovative model of audit of the information security system based on the comparison of demand measures of order no. 21 of the FSTEC of Russia and ways of implementation in the subsystem of the information system of personal data protection, the recommendations for inspections of specific measures of protection and used technology audit technical means. The developed method is tested on the example of conducting an audit in “Lama” LLC company. The choice was made to establish the compliance of the organization’s personal data protection system with the requirements of order no. 21 of the FSTEC of Russia. Recommendations have been developed to eliminate the existing shortcomings and inconsistencies by re-equipping the anti-virus protection subsystem and the subsystem of inter-network shielding and protection of communication channels.
APA, Harvard, Vancouver, ISO, and other styles
4

Shevchenko, Svitlana, Pavlo Skladannyi, and Maksym Martseniuk. "ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE." Cybersecurity: Education Science Technique, no. 4 (2019): 62–71. http://dx.doi.org/10.28925/2663-4023.2019.4.6271.

Full text
Abstract:
The article is devoted to the problem of information security, namely the study of the characteristics of antivirus programs which are standardized in Ukraine. The study used statistical methods to analyze the characteristics of antivirus software and comparative methods of comparing the various types of such programs. Relying on researches in scientific literature, the main threats to information security in the field of information technology were analyzed. The emphasis is placed on the fact that antivirus software is the most effective protection against malicious software (malware). The basic methods of work of the antivirus – signature and heuristic – are described. The list of standardized in Ukraine antivirus programs is determined. The study was based on the quantitative and qualitative results which while testing had obtained by the independent testing laboratory AV-Comparatives (Austria), the independent Virus Bulletin (VB) laboratory for testing and certification in the field of security, the Center for antivirus protection information of the State Special Communication Service of Ukraine. The comparative analysis of the main characteristics of antivirus programs was carried out, namely: antivirus and anti-spyware; anti-phishing; anti-rootkit protection against exploits; Intrusion Prevention System; Real-time protection; parental control; host-based firewall; antispam; protection against network attacks; home network protection; anti-theft; password management.
APA, Harvard, Vancouver, ISO, and other styles
5

Tolіupa, Serhii, Oleksandr Pliushch, and Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.

Full text
Abstract:
Systems for detecting network intrusions and detecting signs of attacks on information systems have long been used as one of the necessary lines of defense of information systems. Today, intrusion and attack detection systems are usually software or hardware-software solutions that automate the process of monitoring events occurring in an information system or network, as well as independently analyze these events in search of signs of security problems. As the number of different types and ways of organizing unauthorized intrusions into foreign networks has increased significantly in recent years, attack detection systems (ATS) have become a necessary component of the security infrastructure of most organizations. The article proposes a software prototype of a network attack detection system based on selected methods of data mining and neural network structures. The conducted experimental researches confirm efficiency of the created model of detection for protection of an information network. Experiments with a software prototype showed high quality detection of network attacks based on neural network structures and methods of intelligent data distribution. The state of protection of information systems to counter cyber attacks is analyzed, which made it possible to draw conclusions that to ensure the security of cyberspace it is necessary to implement a set of systems and protection mechanisms, namely systems: delimitation of user access; firewall; cryptographic protection of information; virtual private networks; anti-virus protection of ITS elements; detection and prevention of intrusions; authentication, authorization and audit; data loss prevention; security and event management; security management.
APA, Harvard, Vancouver, ISO, and other styles
6

Grin, S. A., N. M. Pukhova, I. N. Matveyeva, A. Ya Samuylenko, and R. N. Melnik. "IMMUNOGENESIS IN THE DESTRUCTION OF CELLS OF THE NERVOUS SYSTEM UNDER THE INFLUENCE OF THE RABIES VIRUS." Medical academic journal 19, no. 1S (December 15, 2019): 139–41. http://dx.doi.org/10.17816/maj191s1139-141.

Full text
Abstract:
The nature of rabies immunity is not well understood, the zones of deployment of protective mechanisms are unknown, and the place where antibodies meet with the virus is unclear. The issue of the mechanism of protection of the central nervous system against rabies virus is relevant. It has been hypothesized that protection (immunity) of the central nervous system to the rabies virus is induced by the distant interaction of antibodies on the nerve сells and is mediated by the energy-information field of specific antibodies circulating in the blood vessels of the central nervous system. To confirm this hypothesis, the non-contact effect of rabies antibodies on the rabies virus (strain “Shchelkovo-51”) in the culture cell (BHK-21/13) and the decrease in antigen accumulation from 1.7 to 2.9 times were experimentally shown. The obtained data confirm the main point of the hypothesis on the protection of the central nervous system against the rabies virus using an energy-information biofield.
APA, Harvard, Vancouver, ISO, and other styles
7

Gao, Xiang, Yiqiang Zhao, and Haocheng Ma. "Fringing Electric Field Sensors for Anti-Attack at System-Level Protection." Sensors 18, no. 9 (September 11, 2018): 3034. http://dx.doi.org/10.3390/s18093034.

Full text
Abstract:
Information system security has been in the spotlight of individuals and governments in recent years. Integrated Circuits (ICs) function as the basic element of communication and information spreading, therefore they have become an important target for attackers. From this perspective, system-level protection to keep chips from being attacked is of vital importance. This paper proposes a novel method based on a fringing electric field (FEF) sensor to detect whether chips are dismantled from a printed circuit board (PCB) as system-level protection. The proposed method overcomes the shortcomings of existing techniques that can be only used in specific fields. After detecting a chip being dismantled from PCB, some protective measures like deleting key data can be implemented to be against attacking. Fringing electric field sensors are analyzed through simulation. By optimizing sensor’s patterns, areas and geometrical parameters, the methods that maximize sensitivity of fringing electric field sensors are put forward and illustrated. The simulation is also reproduced by an experiment to ensure that the method is feasible and reliable. The results of experiments are inspiring in that they prove that the sensor can work well for protection of chips and has the advantage of universal applicability, low cost and high reliability.
APA, Harvard, Vancouver, ISO, and other styles
8

Dong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.

Full text
Abstract:
With the increasingly advanced computer information network, a great convenience for people's daily work and life at the same time, the network security problem arises. Network security is not only related to the enterprises, institutions and social groups, network information security, is also related to the national security and social stability, Involves many disciplines of computer science, network technology, communication technology, security technology and techniques. Solve the problem of computer network security has become the most important research topics in the field of computer science. Starting from the characteristics of the computer information network security and network security factors, a network security system designed set includes virus protection, dynamic password authentication, firewall access control, information encryption, intrusion detection and other protective measures for our computer the improvement and development of the information Network Security provides a useful reference.
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Yan Wen, and Feng Dong. "Research on Multi-Core Network Equipment Virus Defense System." Applied Mechanics and Materials 738-739 (March 2015): 1197–200. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.1197.

Full text
Abstract:
With the arrival of the wave of information technology, the business activities of a variety of business systems via the network to complete. But the virus to exploit system vulnerabilities to sneak into the enterprise information network server, the enterprise network into a leak and suffered the double threat of external hackers. Leverage existing security infrastructure, enterprise networks, statistical analysis of all possible virus invasion point, combined with a good virus defense technology layers protection system vulnerabilities, the formation of a whole network antivirus, coordinated operations, a unified management modernization virus defense systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Jian, Xiaolin Qin, and Hongying Fang. "Virus-Information Coevolution Spreading Dynamics on Multiplex Networks." Complexity 2021 (March 5, 2021): 1–9. http://dx.doi.org/10.1155/2021/6624612.

Full text
Abstract:
Virus and information spreading dynamics widely exist in complex systems. However, systematic study still lacks for the interacting spreading dynamics between the two types of dynamics. This paper proposes a mathematical model on multiplex networks, which considers the heterogeneous susceptibility and infectivity in two subnetworks. By using a heterogeneous mean-field theory, we studied the dynamic process and outbreak threshold of the system. Through extensive numerical simulations on artificial networks, we find that the virus’s spreading dynamics can be suppressed by increasing the information spreading probability, decreasing the protection power, or decreasing the susceptibility and infectivity.
APA, Harvard, Vancouver, ISO, and other styles
11

Toliupa, S., O. Pliushch, and I. Parhomenko. "CONSTRUCTION OF SYSTEMS OF DETECTION OF INVASIONS INTO THE INFORMATI TON AND TELECOMMUNICATIONS NETWORK ON THE BASIS OF METHODS OF INTELLECTUAL DISTRIBUTION OF DATA." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 68 (2020): 80–89. http://dx.doi.org/10.17721/2519-481x/2020/68-09.

Full text
Abstract:
The article proposes a combinatorial construction of a network attack detection system based on selected methods of data mining and conducts experimental research that confirms the effectiveness of the created detection model to protect the distributed information network. Experiments with a software prototype showed the high quality of detection of network attacks and proved the correctness of the choice of methods of data mining and the applicability of the developed techniques. The state of security of information and telecommunication systems against cyberattacks is analyzed, which allowed to draw conclusions that to ensure the security of cyberspace it is necessary to implement a set of systems and protection mechanisms, namely systems: delimitation of user access; firewall; cryptographic protection of information; virtual private networks; anti-virus protection of ITS elements; detection and prevention of intrusions; authentication, authorization and audit; data loss prevention; security and event management; security management. An analysis of publications of domestic and foreign experts, which summarizes: experience in building attack detection systems, their disadvantages and advantages; of attack and intrusion detection systems based on the use of intelligent systems. Based on the results of the review, proposals were formed on: construction of network attack detection systems on the basis of selected methods of data mining and experimental research, which confirms the effectiveness of the created detection model for the protection of the distributed information network.
APA, Harvard, Vancouver, ISO, and other styles
12

Chen, Shuai, Yang Yin, Zheng Wang, and Fan Gui. "Low-altitude protection technology of anti-UAVs based on multisource detection information fusion." International Journal of Advanced Robotic Systems 17, no. 5 (September 1, 2020): 172988142096290. http://dx.doi.org/10.1177/1729881420962907.

Full text
Abstract:
Nowadays, unmanned aerial vehicles (UAVs) have achieved massive improvement, which brings great convenience and advantage. Meanwhile, threats posed by them may damage public security and personal safety. This article proposes an architecture of intelligent anti-UAVs low-altitude defense system. To address the key problem of discovering UAVs, research based on multisensor information fusion is carried out. Firstly, to solve the problem of probing suspicious targets, a fusion method is designed, which combines radar and photoelectric information. Subsequently, single shot multibox detector model is introduced to identify UAV from photoelectric images. Moreover, improved spatially regularized discriminative correlation filters algorithm is used to elevate real-time and stability performance of system. Finally, experimental platform is constructed to demonstrate the effectiveness of the method. Results show better performance in range, accuracy, and success rate of surveillance.
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Kai, and Hang Yu. "Study on the Method of Android System Cloud Monitoring Information Based on SVM." Applied Mechanics and Materials 602-605 (August 2014): 2272–75. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2272.

Full text
Abstract:
In recent years, android system has become a mobile device is especially preferred intelligent mobile phone operating system, like Microsoft window system, Android operating system is also subject to a variety of mobile phone viruses, Trojans and other malicious software attacks, resulting in the leakage of personal information, the harm of spam messages continuously, in order to solve these problems in this paper for the known virus Trojan cloud monitoring and detecting light client burden increase sample detection efficiency; using SVM to unknown trojan virus (support vector machine) short sequences of API function calls the LINUX classification, analysis of the API function of each call with precise improve classification support vector machine the danger coefficient after integration, to distinguish the Trojan virus, in order to achieve information security protection system role.
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Tianlin, Xiangyi Ji, Zhanhui Tao, Xiao Zhou, Zhe Hao, Xinke Wang, Xia Gao, Shuo Wang, and Yaqing Liu. "Dual stimuli-responsive lanthanide-based phosphors for an advanced full-color anti-counterfeiting system." RSC Advances 10, no. 26 (2020): 15573–78. http://dx.doi.org/10.1039/d0ra01594f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yazov, Yuri, Oleg Avsentev, Alexander Avsentev, and Irina Rubtsova. "Method for Assessing Effectiveness of Protection of Electronic Document Management using the Petri and Markov Nets Apparatus." SPIIRAS Proceedings 18, no. 6 (November 29, 2019): 1269–300. http://dx.doi.org/10.15622/sp.2019.18.6.1269-1300.

Full text
Abstract:
Traditional approaches to assessing the effectiveness of information security, based on a comparison of the possibilities of realizing threats to information security in absence and application of protection measures, do not allow to analyze the dynamics of suppression by security measures of the process of implementing threats. The paper proposes a new indicator of the effectiveness of protection of electronic documents, aimed at assessing the possibility of advancing security measures of the process of implementing threats in electronic document management systems using the probability-time characteristics of the dynamics of the application of protection measures and the implementation of threats to electronic documents. Mathematical models were developed using the Petri-Markov network apparatus and analytical relationships were obtained for calculating the proposed indicator using the example of the "traffic tunneling" threat (placing intruder packets in trusted user packets) and unauthorized access (network attacks) to electronic documents, as well as the threat of intrusion of malicious program by carrying out an "blind IP spoofing" attack (network address spoofing). Examples of calculating the proposed indicator and graphs of its dependence on the probability of detecting network attacks by the intrusion detection system and on the probability of malware detection by the anti-virus protection system are given. Quantitative dependencies are obtained for the effectiveness of protection of electronic documents due to being ahead of protection measures for threat realization processes, both on the probability of detecting an intrusion or the probability of detecting a malicious program, and on the ratio of the time spent by the protection system on detecting an attempt to implement a threat and taking measures to curb its implementation, and threat implementation time. Models allow not only to evaluate the effectiveness of measures to protect electronic documents from threats of destruction, copying, unauthorized changes, etc., but also to quantify the requirements for the response time of adaptive security systems to detectable actions aimed at violating the security of electronic documents, depending on the probability -temporal characteristics of threat realization processes, to identify weaknesses in protection systems related to the dynamics of threat realization and the reaction of defense systems to such threats electronic document.
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Jie, Xiaomei Wang, and Na Li. "Exploration of Environmental Protection-Oriented Ecoenvironmental Performance Audit System." Security and Communication Networks 2022 (February 25, 2022): 1–10. http://dx.doi.org/10.1155/2022/2657411.

Full text
Abstract:
In the era of the COVID-19 (SARS-CoV-2) virus, it has become imperative to audit the environment surrounding us to prioritize public health and the healthcare system. This study aims to accelerate the reform of the economic development modes and the construction of a resource-friendly society. The environmental protection-oriented ecoenvironmental performance audit system is studied here. Based on the current situation of regional ecological pollution in the Yangtze River Economic Belt, the situation and existing problems are analyzed for the ecoenvironment in the Yangtze River Economic Belt from the perspectives of biodiversity, water ecoenvironment, wetland ecoenvironment, and forest ecoenvironment. Then, the situation is deeply analyzed for the ecoenvironmental performance audit project in the Yangtze River Economic Belt. Afterward, we explore the basic characteristics of the environmental audit and summarize the implementation path of resource and environmental audit. The results show that there are some problems in the control and utilization of funds for environmental protection and the development and protection of resources in the cities along the Yangtze River Economic Belt. Then we analyze the problems in the ecoenvironmental performance audit of the Yangtze River Economic Belt and give some suggestions for improving the ecoenvironmental performance audit work. The objective of this paper is to improve the application effect of ecoenvironmental performance audit and provide references for future environmental protection work which will have great impacts on public health and the development of healthcare services.
APA, Harvard, Vancouver, ISO, and other styles
17

Семыкина, Н. А. "MATHEMATICAL MODEL OF PROTECTION IN AN INFORMATION SYSTEM OF A HIERARCHICAL STRUCTURE." Южно-Сибирский научный вестник, no. 4(38) (August 31, 2021): 75–80. http://dx.doi.org/10.25699/sssb.2021.38.4.002.

Full text
Abstract:
С развитием информационных технологий и дальнейшего внедрения их в автоматизированные системы встает вопрос защиты информации и безопасности процессов в сетях. Моделирование компьютерных атак является одним из важных этапов проектирования СЗИ, поскольку дает возможность специалисту по защите информации получить аргументированные доводы о наличии потенциальных угроз безопасности информации на конкретном объекте защиты. Математические модели позволяют провести исследование характеристик определенной атаки для того, чтобы установить, какие средства защиты могут использоваться для её нейтрализации. Цель статьи - построить математическую модель развития вирусной атаки в информационной системе, в которой локальные вычислительные сети иерархически распределены, при этом горизонтальные взаимоотношения между локальными сегментами отсутствуют, а вертикальные – усилены. Данным свойствам обладают хранилища данных федерального и регионального уровней. Модель формализована как система нелинейных дифференциальных уравнений. С помощью построенной модели рассмотрен пример для трехуровневой иерархической системы. Приведены результаты численных экспериментов, которые показывают, что стратегия, при которой большинство ресурсов защиты сети направленные на профилактические мероприятия, дает наилучший результат. Модель может найти применение при создании методологии математического и компьютерного моделирования управления комплексной безопасностью многоуровневых иерархических систем, а также для обеспечения принятия управленческих решений в сфере защиты информации. Today, there is a question of information protection and process security in networks, as information technologies are actively being introduced into automated systems. Modeling of computer attacks is one of the important stages of designing an information security system. E allows an information security specialist to receive reasoned arguments about the presence of potential threats to the security of information at a specific object of protection. Mathematical models allow us to conduct a study of the characteristics of cyberattack and determine which means of protection can be used to neutralize it. The purpose of the article is to build a mathematical model of the development of a virus attack in an information system of a hierarchical structure. There are no horizontal relationships between local segments, and vertical ones are strengthened. Data warehouses at the federal and regional levels have these properties. The model is formalized as a system of nonlinear differential equations. An example for a three-level hierarchical system is considered. The results of numerical experiments are presented. They showed that the strategy in which the majority of network protection resources are directed to preventive measures gives the best result. The model can be used to create a methodology for mathematical and computer modeling of complex security management of multi-level hierarchical systems, as well as to ensure managerial decision-making in the field of information security
APA, Harvard, Vancouver, ISO, and other styles
18

Steckelings, U. Muscha, and Colin Sumners. "Correcting the imbalanced protective RAS in COVID-19 with angiotensin AT2-receptor agonists." Clinical Science 134, no. 22 (November 2020): 2987–3006. http://dx.doi.org/10.1042/cs20200922.

Full text
Abstract:
Abstract The severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) that is responsible for the global corona virus disease 2019 (COVID-19) pandemic enters host cells via a mechanism that includes binding to angiotensin converting enzyme (ACE) 2 (ACE2). Membrane-bound ACE2 is depleted as a result of this entry mechanism. The consequence is that the protective renin–angiotensin system (RAS), of which ACE2 is an essential component, is compromised through lack of production of the protective peptides angiotensin-(1-7) and angiotensin-(1-9), and therefore decreased stimulation of Mas (receptor Mas) and angiotensin AT2-receptors (AT2Rs), while angiotensin AT1-receptors (AT1Rs) are overstimulated due to less degradation of angiotensin II (Ang II) by ACE2. The protective RAS has numerous beneficial actions, including anti-inflammatory, anti-coagulative, anti-fibrotic effects along with endothelial and neural protection; opposite to the deleterious effects caused by heightened stimulation of angiotensin AT1R. Given that patients with severe COVID-19 exhibit an excessive immune response, endothelial dysfunction, increased clotting, thromboses and stroke, enhancing the activity of the protective RAS is likely beneficial. In this article, we discuss the evidence for a dysfunctional protective RAS in COVID and develop a rationale that the protective RAS imbalance in COVID-19 may be corrected by using AT2R agonists. We further review preclinical studies with AT2R agonists which suggest that AT2R stimulation may be therapeutically effective to treat COVID-19-induced disorders of various organ systems such as lung, vasculature, or the brain. Finally, we provide information on the design of a clinical trial in which patients with COVID-19 were treated with the AT2R agonist Compound 21 (C21). This trial has been completed, but results have not yet been reported.
APA, Harvard, Vancouver, ISO, and other styles
19

He, Juan, and Zhi Yun Tan. "Design of Vehicle Anti-Theft Alarm System Based on DSP-GPS." Applied Mechanics and Materials 220-223 (November 2012): 1584–87. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.1584.

Full text
Abstract:
An intelligent vehicle anti-theft alarm system has been designed with DSP technology and GPRS technology. This system is mainly composed of a signal collection system, alarm system, control system, communication system and the four wheel locking system, which can realize the safety status monitoring of vehicle after parking, the dialogue of people-vehicle under unsafe conditions and tracking and positioning of the vehicle after stolen. But the system has a wide range covering network, information transmission speed, low cost and the use cost , small blind area and multiple anti-theft functions and so on. A new way and thought has been provided for automobile anti-theft protection.
APA, Harvard, Vancouver, ISO, and other styles
20

Шагиева, Альбина, Al'bina Shagieva, Андрей Макаров, Andrey Makarov, Наталья Карпова, and Natal'ya Karpova. "INFORMATION AND INFRASTRUCTURAL COMPONENTS OF ANTI-CRISIS MANAGEMENT OF RURAL MUNICIPAL FORMATIONS." Vestnik of Kazan State Agrarian University 14, no. 1 (March 30, 2019): 157–63. http://dx.doi.org/10.12737/article_5ccedf7b3bc2a8.49830527.

Full text
Abstract:
The anti-crisis management of rural municipalities is an organized special management, based on a set of specific management decisions taken by the governing bodies of institutions and organizations, state and local authorities in the context of resource constraints and increased risk. Monitoring the results of the crisis management of rural municipalities is aimed at tracking its condition and financial performance. The purpose of the crisis management of rural municipalities is to restore their livelihoods and the withdrawal from the crisis of enterprises, institutions, organizations that provide services to the rural population. The nature of changes in the crisis management process was assessed taking into account: the full coverage of the areas of project and event management, the pace of change, the degree of achievement of goals, and the growth of economic indicators. The study developed the basic provisions for improving the information system of crisis management of rural municipalities. The information support system includes: a list of indicators for assessing the course of crisis management, requirements for a data bank. The structure of the information system and the network model of the possibility of creating an agricultural cluster based on rural municipalities are proposed. The proposed information system serves and interconnects, in the mode of interaction, local authorities, scientific and educational unit, functional departmental systems: tax, statistical, environmental protection, rural infrastructure and others. It makes it possible to create a cluster of rural municipalities in a less costly and more coordinated way. The main idea of evaluating and adjusting crisis management is to comprehensively examine the interrelationships of the parameters of the tariff, tax, investment and subsidy policies, taking into account the transformations in the management system of rural municipalities.
APA, Harvard, Vancouver, ISO, and other styles
21

Fu, Chuanxi, Jianhua Liang, and Ming Wang. "Matched Case-Control Study of Effectiveness of Live, Attenuated S79 Mumps Virus Vaccine against Clinical Mumps." Clinical and Vaccine Immunology 15, no. 9 (July 30, 2008): 1425–28. http://dx.doi.org/10.1128/cvi.00122-08.

Full text
Abstract:
ABSTRACT Mumps virus infection is a potentially serious viral infection of childhood and early adulthood. In China, live, attenuated S79 mumps virus vaccine has been licensed for pediatric use since 1990. There has been no assessment of its efficacy. Thus, the objective of this study was to determine the effectiveness of live, attenuated S79 mumps virus vaccine against clinical mumps. Cases were selected from the China Information System for Disease Control and Prevention during September 2004 to March 2005. Each case was matched to a control by gender, age, and area of residency. In all, 469 cases and 469 controls were enrolled in the study. Vaccination information was obtained from the Children's EPI Administrative Computerized System. Vaccine effectiveness (VE) was calculated for one or two doses of S79 vaccine, with 95% confidence intervals (CI). VE of mumps virus vaccine for one dose versus none was protection of 86.0% (95% CI, 77.2% to 91.5%) of recipients, and VE was much higher in the first 4 years than in the 5 to 12 years after vaccination. The S79 vaccine can effectively prevent clinical mumps, and a second dose of mumps virus vaccine is necessary for the protection of children in China.
APA, Harvard, Vancouver, ISO, and other styles
22

Masiero, Silvia, and Amit Prakash. "ICT in social protection schemes: deinstitutionalising subsidy-based welfare programmes." Information Technology & People 33, no. 4 (December 6, 2019): 1255–80. http://dx.doi.org/10.1108/itp-02-2018-0086.

Full text
Abstract:
Purpose While the potential of information and communication technology (ICT) for poverty reduction is widely recognised, limited knowledge exists on its use in the social protection schemes devised for the world’s poor. Drawing on the institutionalist vision of IS development and organisational change put forward by Avgerou (2000), the authors propose that computerisation of these schemes entails two processes, namely, the progressive affirmation of ICT innovation and a shift in the programmes' organisational structure, which moves from a subsidy-based model to one grounded on direct cash transfers. The purpose of this paper is to illustrate how the role of ICT in anti-poverty schemes results from concomitance of such processes. Design/methodology/approach The paper draws on a study of the public distribution system (PDS), the main food security scheme in India, as it is being computerised in the state of Karnataka. Following an interpretive case study methodology, it investigates the ongoing computerisation of the Karnataka PDS through a combination of back-end and front-end technologies, based on biometric recognition of the programme’s users. Findings The data reveal that transformation of the PDS results from the simultaneous processes of institutionalisation of ICT innovation and deinstitutionalisation of the extant state-led subsidy scheme, in favour of a leaner social protection system centred on cash transfers to beneficiaries. This illustrates the point that ICT innovation is intertwined with the decline of an extant social welfare structure and the rise of a new one, based on the direct transfer of benefits. Originality/value The paper offers a new theoretical perspective to illuminate the computerisation of anti-poverty programmes, a phenomenon that affects the entitlements of millions of poor people on a global scale. In parallel, it draws practical implications for countries embarking on the digitalisation of their social protection schemes.
APA, Harvard, Vancouver, ISO, and other styles
23

Buchyk, Serhii, Oleksandr Yudin, Ruslana Ziubina, Ivan Bondarenko, and Oleh Suprun. "Devising a method of protection against zero-day attacks based on an analytical model of changing the state of the network sandbox." Eastern-European Journal of Enterprise Technologies 1, no. 9 (109) (February 27, 2021): 50–57. http://dx.doi.org/10.15587/1729-4061.2021.225646.

Full text
Abstract:
This paper reports a method of protection against zero-day attacks using SandBox technology based on the developed analytical model with a probabilistic ranking of information system states. The model takes into consideration the conditions of a priori uncertainty regarding the parameters of the destructive flow on the system, accounting for the typical procedures of the network SandBox. The proposed model of information system states makes it possible to analyze and track all possible states, as well as assess the level of security in these states, and the probability of transitions into them. Thus, it is possible to identify the most dangerous ones and track the activities that caused the corresponding changes. The fundamental difference between this model and standard approaches is the weight coefficients that characterize not the intensity of random events but the intensity of transitions between states. Direct implementation and application of the proposed analytical model involved the technology of multilevel network "SandBoxes". The difference from other popular anti-virus tools is the use of a priori mathematical threat assessment, which makes it possible to detect influences that are not considered threats by classical systems until the moment of harm to the system. The combination with standard security tools makes it possible to separately analyze files that are too large in size, whether they enter the system not through a common gateway controlled by the network "SandBox" but from the external media of end-users. The implementation of the developed analytical model has made it possible to improve the level of protection of the corporate network by 15 %, based on the number of detected threats. This difference is explained by the inability of classical software to detect new threats if they are not already listed in the database of the program, and their activity is not trivial
APA, Harvard, Vancouver, ISO, and other styles
24

Pollock, Ross D., Rachel V. Firth, Jessica A. Storey, Katherine E. Phillips, Desmond M. Connolly, Nicholas D. C. Green, and Alec T. Stevenson. "Hemodynamic Responses and G Protection Afforded by Three Different Anti-G Systems." Aerospace Medicine and Human Performance 90, no. 11 (November 1, 2019): 925–33. http://dx.doi.org/10.3357/amhp.4927.2019.

Full text
Abstract:
BACKGROUND: UK Royal Air Force fast jet aircrew use three different anti-G systems, however, little objective comparison of the G protection they provide exists. The G-protection afforded by each system and associated hemodynamic responses were investigated.METHODS: Ten subjects performed centrifuge acceleration exposures using Mk-10 (S1) and Mk-4 (S2) five-bladder anti-G trousers (AGT) and full coverage AGT plus pressure breathing for G-protection (PBG; S3). Measurements of relaxed G tolerance (RGT), eye-level blood pressure (BPeye), lower body blood volume (LBV), stroke volume (SV) and total peripheral resistance (TPR) were made during gradual onset runs (GOR) and rapid onset runs (ROR). The subjective effort required to maintain clear vision at +7 and +8 Gz provided an indication of the protection provided by the system.RESULTS: All systems moderated decreases in SV and BPeye and increases in LBV under increased +Gz. S3 provided the greatest mean RGT during GOR (+6.2 Gz) and ROR (+6 Gz), reduced the effort required to maintain clear vision at up to +8 Gz, prevented venous pooling and afforded the greatest rise in TPR. The majority of indices revealed no difference between S1 and S2 although RGT during the ROR was greater with S2 (+0.25 Gz).DISCUSSION: S3 effectively prevented pooling of blood in the lower limbs under +Gz, despite the use of PBG, and offers an advantage over five-bladder AGT. Given the similarities of S1 and S2, it was unsurprising that the majority of indices measured were similar. The objective measurement of hemodynamic parameters provides useful information for comparing the G-protection provided by anti-G systems.Pollock RD, Firth RV, Storey JA, Phillips KE, Connolly DM, Green NDC, Stevenson AT. Hemodynamic responses and G protection afforded by three different anti-G systems. Aerosp Med Hum Perform. 2019; 90(11):925–933.
APA, Harvard, Vancouver, ISO, and other styles
25

Et.al, Ahmad Faiz Ghazali. "A Survey of Malware Risk Detection Techniques in Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 868–76. http://dx.doi.org/10.17762/turcomat.v12i3.797.

Full text
Abstract:
This article aims to contribute in securing information technology (IT) systems and processes for information security by utilizing malware risk detection for decision-making processes to mitigate cyber-attacks. It has potential to be a real threat to the businesses and industrial applications. The risk management is an essential component where it can present a new information security model for supporting decision making. The current ideologies such as the anti-virus, malware and firewalls detection and protection are proving to be ineffective as they were not specifically designed for multi-tenant cloud environments. Therefore, this article presents a survey of malware risk detection techniques in cloud. The survey was conducted on publications from Scopus from the last 5 years. The findings indicate the current malware detection techniques are not enough to effectively detect and protect the cloud environments.
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Jun Xiang, and Li Fu. "Anti-Counterfeiting Jingdezhen Ceramic Decal Manufacturing Technique Based on Digital Watermarking Method." Advanced Materials Research 503-504 (April 2012): 23–26. http://dx.doi.org/10.4028/www.scientific.net/amr.503-504.23.

Full text
Abstract:
The traditional digital watermarking, as a copyright protection technique, has been widely applied for the multimedia information, such as text, picture, video, etc. In this paper, a new scheme is planned to embed watermark into the porcelain decal for describing the property declaration of Jingdezhen ceramics. Since the images on Jingdezhen ceramic are manually created, it cannot be regularly modulated by the watermark during the watermark embedding process. Therefore, the digital watermarking technique cannot be directly applied to the ceramics. This paper presents a specially designed digital watermarking system for the protection of the ceramic property. The results from the experiment show that our proposed algorithm achieves the purpose.
APA, Harvard, Vancouver, ISO, and other styles
27

WANG, Feng. "China's Regulatory Framework for Dynamic and Personalized Pricing in the Digital Economy." International Journal of Social Science Studies 10, no. 1 (November 5, 2021): 1. http://dx.doi.org/10.11114/ijsss.v10i1.5370.

Full text
Abstract:
Under the Chinese legal system, in principle, there is no objection to dynamic and personalized pricing of enterprises. Dynamic pricing does not involve the processing of personal information, and consumers have a higher perception of price fairness, it is seldom concerned by laws and policies. Personalized pricing involves the processing of personal information, and consumers generally feel that the price is unfair and difficult to accept, so it is the focus of legal regulation. Enterprises face three obstacles in implementing personalized pricing. First, in terms of personal information protection, enterprises should abide by the provisions on personal consent and automatic decision-making in the Personal Information Protection Law. Second, in the aspect of anti-monopoly, enterprises should abide by the provisions of the Anti-Monopoly Law, and cannot achieve collusion through algorithms and abuse market dominance to implement differential treatment for trading counterparts. Third, in the protection of consumers' rights and interests, enterprises should respect the Price Law and other laws, and cannot commit price fraud and price discrimination. The current law on dynamic and personalized pricing is not perfect. In the future, we can protect consumers' rights and interests mainly by strengthening enterprises' obligation of providing information.
APA, Harvard, Vancouver, ISO, and other styles
28

Wibowo, Wahyu Kunto, Seok-Kwon Jeong, Sam-Sang You, and Lee Jaemin. "Automatic Threshold on Current based Anti-pinch Mechanism for Power Windows." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (August 1, 2018): 2172. http://dx.doi.org/10.11591/ijece.v8i4.pp2172-2179.

Full text
Abstract:
<span>In this paper, the automotive power window has been integrated with an advanced safety mechanism called anti-pinch system for good protection. Based on a contact method, a new safety mechanism using a low-cost technology has been proposed to set a threshold value as a limit to decide the pinch condition, or automatic threshold method. The electric current information is easily detected by using current sensor installed on a motor driver without incorporating extra device. Then the pinch condition is quickly reflected and calculated by using current information in the system. Since the automatic threshold is decided by analyzing system behavior in advance, the optimal calculation can be guaranteed and then applied it on the safety mechanism in a cost-effective manner. Through extensive experimental tests, the squeezing forces of the proposed anti-pinch system have been verified to satisfy requirements of the FMVSS 118 regulations.</span>
APA, Harvard, Vancouver, ISO, and other styles
29

Novash, I. V. "MODELING OF POWER SYSTEMS AND TESTING OF RELAY PROTECTION DEVICES IN REAL AND MODEL TIME." ENERGETIKA. Proceedings of CIS higher education institutions and power engineering associations 60, no. 3 (May 17, 2017): 198–210. http://dx.doi.org/10.21122/1029-7448-2017-60-3-198-210.

Full text
Abstract:
The methods of modelling of power system modes and of testing of relay protection devices with the aid the simulation complexes in real time and with the help of computer software systems that enables the simulation of virtual time scale are considered. Information input protection signals in the simulation of the virtual model time are being obtained in the computational experiment, whereas the tests of protective devices are carried out with the help of hardware and software test systems with the use of estimated input signals. Study of power system stability when modes of generating and consuming electrical equipment and conditions of devices of relay protection are being changed requires testing with the use of digital simulators in a mode of a closed loop. Herewith feedbacks between a model of the power system operating in a real time and external devices or their models must be determined (modelled). Modelling in real time and the analysis of international experience in the use of digital simulation power systems for real-time simulation (RTDS simulator) have been fulfilled. Examples are given of the use of RTDS systems by foreign energy companies to test relay protection systems and control, to test the equipment and devices of automatic control, analysis of cyber security and evaluation of the operation of energy systems under different scenarios of occurrence of emergency situations. Some quantitative data on the distribution of RTDS in different countries and Russia are presented. It is noted that the leading energy universities of Russia use the real-time simulation not only to solve scientific and technical problems, but also to conduct training and laboratory classes on modelling of electric networks and anti-emergency automatic equipment with the students. In order to check serviceability of devices of relay protection without taking into account the reaction of the power system tests can be performed in an open loop mode with the use of hardware and software test systems. Testing methods for relay protection and their models in open-loop mode have been proposed.
APA, Harvard, Vancouver, ISO, and other styles
30

Dolgov, O. S., and B. B. Safoklov. "Quality Management of De-Icing Liquid as an Object for Ensuring Safe Take-Off of an Aircraft." Quality and life 27, no. 3 (September 23, 2020): 84–91. http://dx.doi.org/10.34214/2312-5209-2020-27-3-84-91.

Full text
Abstract:
This paper discusses the possibility of the evolution of quality control of an object of ground anti-icing physicochemical treatment of the surface of an aircraft – anti-icing fluids, in «Quality management – an anti-icing fluid as an object of ensuring the safe takeoff of an aircraft.» The definition – «The quality of the anti-icing fluid» has been formulated. Introduced, as a functional, the concept of «Quality of anti-icing fluid at the stage of AIT», for integration into the system «Quality management of anti-icing fluid» – on the basis of knowledge bases about the IAF as a set of all properties expected by the operator. For the implementation of information software support for the AIT process, the concept of «Regeloscopic program of ground anti-icing protection of aircraft» was introduced, on the basis of which a functional model was presented for building a strategy for processing and protection of aircraft from ground-based icing in accordance with modern requirements for airlines – «Security. Profitability. Environmental friendliness».
APA, Harvard, Vancouver, ISO, and other styles
31

Ji, Hong. "Research on the Protection Strategy of Network Security." Advanced Materials Research 703 (June 2013): 236–39. http://dx.doi.org/10.4028/www.scientific.net/amr.703.236.

Full text
Abstract:
The global information has become the human development trend with the development of network technology. People enjoy the convenience brought by the network technology and confront many network security issues. Because the network attack behavior has concealment, complexity and permeability, the network security issues become increasingly prominent and the network security protection become more difficult. Based on the analysis of the threatening factors to the network security, such as hacking, computer viruses, computer system vulnerabilities, security issues of the network protocol, weak authentication and logic bombs, the firewall technology, intrusion detection technology, access control technology and computer virus protection technology are proposed to ensure safe and stable operation and use of network.
APA, Harvard, Vancouver, ISO, and other styles
32

Lebedev, Alexandr, Lyubov Gileva, Alexey Danilishin, and Mikhail Sokolov. "Surge protection system development in centrifugal compressor with an indicative method using numerical simulation of unsteady processes and analysis of pressure fluctuation signals." MATEC Web of Conferences 245 (2018): 09010. http://dx.doi.org/10.1051/matecconf/201824509010.

Full text
Abstract:
Nowadays, anti-surge protection system based on parametric method is widely used. The disadvantage of this anti-surge system is the fact that it is not possible to fully ensure the safe operation of the compressor at low flow conditions, because large measurement error will occur. Other method of anti-surge protection is indicative method. This method is what it is necessary to detect occurrence of rotating stall in time on the score of information criterion. Further the control decision is accepted in connection with the approach to the danger zone of surge. Indicative method is more complicated and requires special signal analysis such as wavelet analysis, correlation analysis. Also in addition to the methods of analysis, important is the length of the sample for processing unsteady pressure fluctuations and the method of its displacement on time. It is now possible to mathematically pre-simulate unsteady processes in the flow part of centrifugal compressor.
APA, Harvard, Vancouver, ISO, and other styles
33

Volosova, Nonna, and Olga Zhurkina. "On the Protection Program for Whistleblowers (Informants) in Cases of Corruption." Russian Journal of Criminology 12, no. 5 (November 8, 2018): 699–710. http://dx.doi.org/10.17150/2500-4255.2018.12(5).699-710.

Full text
Abstract:
Counteracting corruption, which is viewed as a systemic phenomenon, requires a complex approach. It is impossible to eradicate it using nothing but criminal law prohibitions. Combating corruption should also include other mechanisms that will make it possible to fight negative phenomena effectively. The authors make an attempt to study the issue of counteracting corruption with the help of criminal procedure tools. Witness protection is one of such tools, it includes not only witnesses of corruption crimes, but also persons that facilitate the detection of corruption and the uncovering of corruption schemes at the earliest stage of committing corruption crimes and offences - the stage of planning or attempting. The risk of corruption crimes is increased if there is no system to support and protect whistleblowers. The development and implementation of a system of measures aimed at protecting people that report corruption crimes and offences have a crucial importance for preventing corruption and establishing the rules of anti-corruption behavior for public officials and other persons. The program of protecting whistleblowers in cases of corruption is aimed at providing accessible and safe channels for reporting corruption violations, reliable protection of whistleblowers against all kinds of influence as well as the development of mechanisms to publicize information which would contribute to the reforms in the legislative and law enforcement spheres for the purposes of corruption prevention. At present there is a substantial gap in the Russian legislation in the sphere of disclosing information about corruption crimes and offences as well as a specialized system of whistleblower protection. The authors use the analysis of international legal acts and foreign legislation to research the problems of corruption whistleblowers and present suggestions on solving them.
APA, Harvard, Vancouver, ISO, and other styles
34

Lee, Yong-Joon, and Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.

Full text
Abstract:
There has been significant research in security of e-passport. E-passport combine the security technologies such as smartcard, PKI, and biometric, so that these technologies can prevent unauthorized copies and counterfeits. We propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The biometric watermarking embeds the invisible date of acquisition into the original data so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased. This study proposed test results through issuing and deciphering of watermarks for e-passports, and it is expected that it can be used as standards for protecting biometric information.
APA, Harvard, Vancouver, ISO, and other styles
35

Lee, Yong-Joon, and Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.

Full text
Abstract:
There has been significant research in security of e-passport. E-passport combine the security technologies such as smartcard, PKI, and biometric, so that these technologies can prevent unauthorized copies and counterfeits. We propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The biometric watermarking embeds the invisible date of acquisition into the original data so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased. This study proposed test results through issuing and deciphering of watermarks for e-passports, and it is expected that it can be used as standards for protecting biometric information.
APA, Harvard, Vancouver, ISO, and other styles
36

Lesko, S. A., A. S. Alyoshkin, and V. V. Filatov. "Stochastic and Percolating Models of Blocking Computer Networks Dynamics during Distribution of Epidemics of Evolutionary Computer Viruses." Russian Technological Journal 7, no. 3 (June 9, 2019): 7–27. http://dx.doi.org/10.32362/2500-316x-2019-7-3-7-27.

Full text
Abstract:
The paper presents a complex model of the dynamics of virus epidemies propagation in computer networks, based on topological properties of computer networks and mechanisms of the viruses spread. On one hand, this model is based on the use of percolation theory methods, which makes it possible to determine such structural-information characteristics of networks as the dependence of the percolation threshold on the average number of connections per one node (network density). On the other hand, the dynamic processes of stochastic propagation in computer networks of evolving viruses are observed when anti-virus programs become outdated and postponed. The paper discusses the concept of percolation threshold, provides an equation for the dependence of the percolation threshold of a network on its density obtained by analyzing numerical simulation data. The dynamics of virus epidemies were studied through two approaches. The first one is based on the description of transition diagrams between states of nodes, after which a system of kinetic differential equations for the virus epidemies is constructed. The second is based on considering the probabilities of transitions between possible states of the entire network. A second-order differential equation is obtained in this article, and a boundary value problem is formulated. Its solution describes the dependence of the network blocking probability on the blocking probability of an individual node. The solution also makes it possible to estimate the time required to reach the percolation threshold. The model incorporates the evolutionary properties of viruses: previously immunized or disinfected nodes can be infected again after a certain time interval. Besides, the model incorporates a lag of the anti-virus protection. Analysis of the solutions obtained for the models created shows the possibility of various modes of virus propagation. Moreover, with some sets of values of differential equation coefficients, an oscillating and almost periodic nature of virus epidemies is observed, which largely coincides with real observations.
APA, Harvard, Vancouver, ISO, and other styles
37

Diro, Abebe, Naveen Chilamkurti, Van-Doan Nguyen, and Will Heyne. "A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms." Sensors 21, no. 24 (December 13, 2021): 8320. http://dx.doi.org/10.3390/s21248320.

Full text
Abstract:
The Internet of Things (IoT) consists of a massive number of smart devices capable of data collection, storage, processing, and communication. The adoption of the IoT has brought about tremendous innovation opportunities in industries, homes, the environment, and businesses. However, the inherent vulnerabilities of the IoT have sparked concerns for wide adoption and applications. Unlike traditional information technology (I.T.) systems, the IoT environment is challenging to secure due to resource constraints, heterogeneity, and distributed nature of the smart devices. This makes it impossible to apply host-based prevention mechanisms such as anti-malware and anti-virus. These challenges and the nature of IoT applications call for a monitoring system such as anomaly detection both at device and network levels beyond the organisational boundary. This suggests an anomaly detection system is strongly positioned to secure IoT devices better than any other security mechanism. In this paper, we aim to provide an in-depth review of existing works in developing anomaly detection solutions using machine learning for protecting an IoT system. We also indicate that blockchain-based anomaly detection systems can collaboratively learn effective machine learning models to detect anomalies.
APA, Harvard, Vancouver, ISO, and other styles
38

McSharry, James J., Mark R. Deziel, Kris Zager, Qingmei Weng, and George L. Drusano. "Pharmacodynamics of Cidofovir for Vaccinia Virus Infection in an In Vitro Hollow-Fiber Infection Model System." Antimicrobial Agents and Chemotherapy 53, no. 1 (October 13, 2008): 129–35. http://dx.doi.org/10.1128/aac.00708-08.

Full text
Abstract:
ABSTRACT Variola major virus remains a potent weapon of bioterror. There is currently an investigational-new-drug application for cidofovir for the therapy of variola major virus infections. Stittelaar and colleagues compared the levels of effectiveness of postexposure smallpox vaccination (Elstree-RIVM) and antiviral treatment with cidofovir or an acyclic nucleoside phosphonate analogue {6-[2-(phosphonomethoxy)alkoxy]-2,4-diaminopyrimidine (HPMPO-DAPy)} after lethal intratracheal infection of cynomolgus monkeys with monkeypox virus, a variola virus surrogate. Their results demonstrated that either compound was more effective than vaccination with the Ellstree vaccine (K. J. Stittelaar et al., Nature 439:745-748, 2006). An unanswered question is how to translate this information into therapy for poxvirus infections in people. In a proof-of-principle study, we used a novel in vitro hollow-fiber infection model system to determine the pharmacodynamics of vaccinia virus infection of HeLa-S3 cells treated with cidofovir. Our results demonstrate that the currently licensed dose of cidofovir of 5 mg/kg of body weight weekly with probenecid (which ameliorates nephrotoxicity) is unlikely to provide protection for patients intentionally exposed to Variola major virus. We further demonstrate that the antiviral effect is independent of the schedule of drug administration. Exposures (area under the concentration-time curve) to cidofovir that will have a robust protective effect will require doses that are 5 to 10 times that currently administered to humans. Such doses may cause nephrotoxicity, and therefore, approaches that include probenecid administration as well as schedules of administration that will help ameliorate the uptake of cidofovir into renal tubular epithelial cells need to be considered when addressing such treatment for people.
APA, Harvard, Vancouver, ISO, and other styles
39

Gazizov, A. R., E. R. Gazizov, and S. E. Gazizova. "Security threats and methods of protecting websites of paid educational services of educational institutions." SHS Web of Conferences 113 (2021): 00033. http://dx.doi.org/10.1051/shsconf/202111300033.

Full text
Abstract:
With the increase in the number of paid educational services of educational institutions, the percentage of fraudulent actions committed, both in relation to web services and in relation to service purchasers, also increases. Therefore, all participants in the process of banking transactions, i.e. the totality of operations that accompany remote interaction between the user and the payment system, must be protected from such actions, which determines the introduction and development of anti-fraud technologies used in the virtual space of the global Internet. Errors in the protection of websites, including websites of paid educational services of educational institutions, continue to be one of the most common shortcomings in ensuring the protection of information. Such errors, i.e. vulnerabilities, are exploited by attackers who attack websites in order to steal valuable information. It also increases the likelihood of subsequent penetration into the corporate information systems of educational institutions. Therefore, there is a need to use specialized tools and methods to protect web applications.
APA, Harvard, Vancouver, ISO, and other styles
40

Szücs, Veronika, Gábor Arányi, and Ákos Dávid. "Introduction of the ARDS—Anti-Ransomware Defense System Model—Based on the Systematic Review of Worldwide Ransomware Attacks." Applied Sciences 11, no. 13 (June 30, 2021): 6070. http://dx.doi.org/10.3390/app11136070.

Full text
Abstract:
We live in a world of digital information communication and digital data storage. Following the development of technology, demands from the user side also pose serious challenges for developers, both in the field of hardware and software development. However, the increasing penetration of the Internet, IoT and digital solutions that have become available in almost every segment of life, carries risks as well as benefits. In this study, the authors present the phenomenon of ransomware attacks that appear on a daily basis, which endangers the operation and security of the digital sphere of both small and large enterprises and individuals. An overview of ransomware attacks, the tendency and characteristics of the attacks, which have caused serious financial loss and other damages to the victims, are presented. This manuscript also provides a brief overview of protection against ransomware attacks and the software and hardware options that enhance general user security and their effectiveness as standalone applications. The authors present the results of the study, which aimed to explore how the available software and hardware devices can implement digital user security. Based on the results of the research, the authors propose a complex system that can be used to increase the efficiency of network protection and OS protection tools already available to improve network security, and to detect ransomware attacks early. As a result, the model of the proposed protection system is presented, and it can be stated that the complex system should be able to detect ransomware attacks from either the Internet or the internal network at an early stage, mitigate malicious processes and maintain data in recoverable state.
APA, Harvard, Vancouver, ISO, and other styles
41

Golovko, G., M. Koltunov, and A. Samofal. "PROBLEMS OF COMPREHENSIVE PROTECTION OF INFORMATION AT PJSC "RESEARCH AND DESIGN-PROCESSING INSTITUTE OF THE ENAMELED CHEMICAL EQUIPMENT AND NEW TECHNOLOGIES KOLAN"." Системи управління, навігації та зв’язку. Збірник наукових праць 3, no. 49 (July 3, 2018): 100–102. http://dx.doi.org/10.26906/sunz.2018.3.100.

Full text
Abstract:
The subject of research describes the peculiarities of the use of information security systems in the activities of PJSC "Research and Design-Processing Institute of the Enameled Chemical Equipment and New Technologies KOLAN". The essence of information security systems and the tasks that they can perform are defined. The aim is to take notice of comprehensive protection problems in enterprises. The following results are obtained. Information security performs four important for an organization which is protect the organization’s ability to function, enable the safe operation of applications implemented on the organization’s IT systems, protect the data the organization collect and uses, and lastly is safeguards the technology assets in use at the organization. Conclusions. The main components that form internal and external information security are defined. It is proved that the use of information security systems is an obligatory condition for the activity of a modern enterprise or production, which will help prevent the loss or theft of important sensitive information. Information security is crucial in organization. All information stored in the organization should be kept secure. Information security will be defined as the protection of data from any threats of virus. The information security in important in the organization because it can protect the confidential information, enables the organization function, also enables the safe operation of application implemented on the organization’s Information Technology system, and information is an important asset for an organization
APA, Harvard, Vancouver, ISO, and other styles
42

Dicevich, Jaroslava, Olga Belykh, and Genrietta Rusetskaya. "The Use of New Technologies in Counteracting Violations of Environmental Legislation." Russian Journal of Criminology 15, no. 3 (July 2, 2021): 295–305. http://dx.doi.org/10.17150/2500-4255.2021.15(3).295-305.

Full text
Abstract:
The authors describe the experience of using information and other new technologies in the daily work of state law enforcement, nature protection agencies and other bodies involved in nature protection activities, including automated information systems, technical means of recording information, computer geoinformation systems that make it possible to monitor the condition of nature and nature-anthropogenic objects as part of control-supervision and other activities; they also make it possible to reveal, record and assess the consequences of violations of environmental legislation. The paper presents information on how procuratorial authorities, internal affair’s bodies and customs authorities use information technologies to solve the problems of identifying timber materials as they are transported on the territory of Russia and taken abroad, of controlling the legal origin of timber materials in customs reporting procedures and, in general, how these technologies are used to reduce the latency level of environmental offences. The authors claim that, in order to improve the nature protection law enforcement activities, it is necessary to use information technologies to organize a single accounting and analysis system for administrative offences in the environmental sphere, while taking into account the multi-subject nature of the bodies of administrative jurisdiction in this sphere and the existing difficulties in differentiating between environmental administrative offences and crimes. The authors discuss examples of using biotechnological and bioinformation methods to reveal the violations of environmental legislation and to repair the damage inflicted on the environment. They draw attention to the legislative embodiment of the duty, since 2019, for subjects of industrial environmental control to use new technologies in the form of distance monitoring over objects having a considerable negative impact on the environment. The authors also note a positive influence that the use of new technologies in Russia has on the activation of public environmental control thanks to, among other things, a federal information system of public control in the sphere of environmental protection. They suggest that there is a considerable anti-criminogenic potential in creating, at the regional level, internet-based information resources of environmental character to promote the cooperation between subjects of nature protection activities and improve the level of environmental culture of the Russian people.
APA, Harvard, Vancouver, ISO, and other styles
43

Schirrmacher, Volker. "New Insights into Mechanisms of Long-term Protective Anti-tumor Immunity Induced by Cancer Vaccines Modified by Virus Infection." Biomedicines 8, no. 3 (March 6, 2020): 55. http://dx.doi.org/10.3390/biomedicines8030055.

Full text
Abstract:
The topic is how to achieve long-term protective anti-tumor immunity by anti-cancer vaccination and what are its mechanisms. Cancer vaccines should instruct the immune system regarding relevant cancer targets and contain signals for innate immunity activation. Of central importance is T-cell mediated immunity and thus a detailed understanding of cognate interactions between tumor antigen (TA)-specific T cells and TA-presenting dendritic cells. Microbes and their associated molecular patterns initiate early inflammatory defense reactions that can contribute to the activation of antigen-presenting cells (APCs) and to costimulation of T cells. The concommitant stimulation of naive TA-specific CD4+ and CD8+ T cells with TAs and costimulatory signals occurs in T-APC clusters that generate effectors, such as cytotoxic T lymphocytes and T cell mediated immunological memory. Information about how such memory can be maintained over long times is updated. The role that the bone marrow with its specialized niches plays for the survival of memory T cells is emphasized. Examples are presented that demonstrate long-term protective anti-tumor immunity can be achieved by post-operative vaccination with autologous cancer vaccines that are modified by virus infection.
APA, Harvard, Vancouver, ISO, and other styles
44

Lantsov, E. V., A. V. Petrov, S. V. Moshchenko, A. A. Kuzin, G. V. Goncharov, and E. N. Kolosovskaya. "The value of laboratory monitoring of dangerous infectious diseases in the aspect of anti-epidemic protection in emergency situations of biological character." Journal Infectology 10, no. 4 (December 30, 2018): 116–23. http://dx.doi.org/10.22625/2072-6732-2018-10-4-116-123.

Full text
Abstract:
The most important direction in the system of anti-epidemic protection of the population and military personnelfrom dangerous infectious and natural focal diseases is epidemiological monitoring with the obligatory use of laboratory methods of detection of pathogens and their markers. On separate territories of placement of the military units which are a part of the southern military district, there are centers of natural and focal infections of dangerous infectious diseases (plague, tularemia, cholera). The article presents the results of laboratory studies during epidemiological monitoring of natural focal and dangerous infectious diseases, which can be used by the military medical service as an information basis for decision-making on the organization of anti-epidemic protection of troops in the event of emergency situations of biological and social nature in these areas.
APA, Harvard, Vancouver, ISO, and other styles
45

Ma, Fengying, Zhe Yang, and Peng Ji. "Sliding Mode Controller Based on the Extended State Observer for Plant-Protection Quadrotor Unmanned Aerial Vehicles." Mathematics 10, no. 8 (April 18, 2022): 1346. http://dx.doi.org/10.3390/math10081346.

Full text
Abstract:
Owing to the complex dynamics of quadrotor unmanned aerial vehicles (UAVs) and their susceptibility to unknown interferences in an actual working environment, the flight control accuracy of UAVs is extremely high. Moreover, their anti-interference ability is particularly important. This study designed a sliding-mode controller based on the extended state observer. The position control was obtained through the outer-loop position controller. The attitude control was determined through the inner-loop attitude controller. The input of the UAV system was obtained through the controller. The boundary-layer function was used to weaken the oscillatory response of the system, and the traditional extended state observer was improved to improve the response speed, robustness, and tracking accuracy of the controller. For the entire process, the input and output state information of the system and total internal and external disturbances were estimated in real-time through the extended state observer. A sliding-mode control law was designed to compensate for the estimated disturbance in real-time to realize attitude control. Finally, Lyapunov theory was used to confirm the stability of the system. The simulation results demonstrated the improved anti-interference and tracking ability of the designed controller.
APA, Harvard, Vancouver, ISO, and other styles
46

Ereshchenko, A. A., O. A. Gusyakova, S. I. Murskiy, A. V. Khaliulin, A. I. Gabrilchak, and T. R. Nikitina. "Problem of interpreting results of determination of IgG to measles virus by enzyme immunoassay." Medical alphabet, no. 27 (November 11, 2020): 36–39. http://dx.doi.org/10.33667/2078-5631-2020-27-36-39.

Full text
Abstract:
Laboratory information is an important tool for determining indications for preventive measures and evaluating their effectiveness in healthy individuals. In the instructions for some test-systems for IgG to measles virus, the results of the study are interpreted on the basis of analytical characteristics of the reagents and have no connection with the determination of this indicator in the reference group. At the moment, there is no document setting the protective level of anti-measles Ig G. The aim of the study is to establish reference values of IgG to measles virus by immunoenzyme analysis for health care professionals. The reference group was formed of 299 people and divided into two subgroups: older and under 44 years of age. Reference intervals were calculated according to the CLSI C 28-A3 protocol. The set reference intervals were different from the manufacturer’s stated values. The question arises as to whether the values established by the manufacturer, based on the analytical characteristics of a particular test system, should be used when identifying risk groups of persons with a low level of immunity.
APA, Harvard, Vancouver, ISO, and other styles
47

Alhosban, Ahmad. "GPS Characterization in Cyberspace Between Vulnerability and Geo-Encryption: Impact on GBAS Landing System (GLS)." Land Forces Academy Review 25, no. 2 (June 1, 2020): 146–58. http://dx.doi.org/10.2478/raft-2020-0018.

Full text
Abstract:
AbstractIn the cyberterrorism concept, whoever was the type of terrorist group: Religious, Ethno-nationalist separatist, Revolutionary, and Far-right extremist, the most efficient deterrence solution locates in the end-user’s protection and hardening. In the cyberterrorism activities, either disruptive and/or destructive, people tend to be the softest link in security chain. Therefore, the threat source would be less important compared with the way of protection. Many efforts have been performed in strengthening the farend-recipients’ infrastructure of communications and critical information systems. Amongst, is the Geo-Encryption Cryptographic Algorithm. It depends on adding a new layer of security by using the most vulnerable signals to cyber-attacks, which is the GPS signals. Hence, its strength came out from its weakness. The Geo-encryption technique assumes the use of anti-jam and anti-spoof GPS receivers, which without, the model would be of no added value to the end-users’ security. In this study, an assessment of the model performance among vulnerability challenges is conducted, showing the characterization of the GPS tool in such model being a solution while it is simultaneously a vulnerable target. A special focus was put in the GBAS Landing System (GLS) performance, in both military and civilian aviation aspect.
APA, Harvard, Vancouver, ISO, and other styles
48

Liu, Wen-Chun, Chia-Ying Lin, Yung-Ta Tsou, Jia-Tsrong Jan, and Suh-Chin Wu. "Cross-Reactive Neuraminidase-Inhibiting Antibodies Elicited by Immunization with Recombinant Neuraminidase Proteins of H5N1 and Pandemic H1N1 Influenza A Viruses." Journal of Virology 89, no. 14 (May 6, 2015): 7224–34. http://dx.doi.org/10.1128/jvi.00585-15.

Full text
Abstract:
ABSTRACTNeuraminidase (NA), an influenza virus envelope glycoprotein, removes sialic acid from receptors for virus release from infected cells. For this study, we used a baculovirus-insect cell expression system to construct and purify recombinant NA (rNA) proteins of H5N1 (A/Vietnam/1203/2004) and pandemic H1N1 (pH1N1) (A/Texas/05/2009) influenza viruses. BALB/c mice immunized with these proteins had high titers of NA-specific IgG and NA-inhibiting (NI) antibodies against H5N1, pH1N1, H3N2, and H7N9 viruses. H5N1 rNA immunization resulted in higher quantities of NA-specific antibody-secreting B cells against H5N1 and heterologous pH1N1 viruses in the spleen. H5N1 rNA and pH1N1 rNA immunizations both provided complete protection against homologous virus challenges, with H5N1 rNA immunization providing better protection against pH1N1 virus challenges. Cross-reactive NI antibodies were further dissected via pH1N1 rNA protein immunizations with I149V (NA with a change of Ile to Val at position 149), N344Y, and I365T/S366N NA mutations. The I365T/S366N mutation of pH1N1 rNA enhanced cross-reactive NI antibodies against H5N1, H3N2, and H7N9 viruses. It is our hope that these findings provide useful information for the development of an NA-based universal influenza vaccine.IMPORTANCENeuraminidase (NA) is an influenza virus enzymatic protein that cleaves sialic acid linkages on infected cell surfaces, thus facilitating viral release and contributing to viral transmission and mucus infection. In currently available inactivated or live, attenuated influenza vaccines based on the antigenic content of hemagglutinin proteins, vaccine efficacy can be contributed partly through NA-elicited immune responses. We investigated the NA immunity of different recombinant NA (rNA) proteins associated with pH1N1 and H5N1 viruses. Our results indicate that H5N1 rNA immunization induced more potent cross-protective immunity than pH1N1 rNA immunization, and three mutated residues, I149V, I365T, and S366N, near the NA enzyme active site(s) are linked to enhanced cross-reactive NA-inhibiting antibodies against heterologous and heterosubtypic influenza A viruses. These findings provide useful information for the development of an NA-based universal influenza vaccine.
APA, Harvard, Vancouver, ISO, and other styles
49

Al-Assam, Assaad, Joanne M. Langley, and Shelly Sarwal. "Respiratory Watch: Development of a Provincial System for Respiratory Syncytial Virus Surveillance in Nova Scotia, 2005–2008." Canadian Journal of Infectious Diseases and Medical Microbiology 20, no. 4 (2009): e153-e156. http://dx.doi.org/10.1155/2009/361948.

Full text
Abstract:
OBJECTIVE: Respiratory syncytial virus (RSV) is the most common cause of severe lower respiratory tract infection in young children and is increasingly recognized as a cause of influenza-like illness in those older than 65 years of age. A surveillance system to provide timely local information about RSV activity in Nova Scotia (NS) is described.METHODS: A case report form was developed for weekly reporting of all laboratory isolates of RSV at diagnostic laboratories around the province. Laboratories were asked to send the forms by fax each Friday to the Nova Scotia Department of Health Promotion and Protection. Data were entered in Excel (Microsoft, USA) and aggregate results summarized by age, sex, health district and date of laboratory confirmation for 2005 to 2008.RESULTS: During three winter seasons (2005–2006, 2006–2007 and 2007–2008), there were 207, 350 and 186 isolates of RSV reported in NS, respectively. The average incidences of RSV in NS varied greatly by age, with the highest rates in infants younger than 24 months of age, and approaching 4000 cases per 100,000 population in infants up to five months of age. The duration of the RSV outbreak was approximately five to six months each year, but the month of onset varied.CONCLUSIONS: A RSV surveillance system was successfully established in NS that provides weekly data to the public health system, clinicians and infection control practitioners. The time of onset and severity of the RSV season varied over time. These data can be used to plan anti-RSV passive prophylaxis programs and infection control education, and distinguish RSV outbreaks from other viruses in acute care and long-term care settings.
APA, Harvard, Vancouver, ISO, and other styles
50

Lykholat, S., and A. Ryskalshuk. "MANAGEMENT OF ECONOMIC SECURITY OF ENTERPRISES SYSTEM IN THE CONDITIONS OF COVID-19." Journal of Lviv Polytechnic National University. Series of Economics and Management Issues 5, no. 1 (June 1, 2021): 158–69. http://dx.doi.org/10.23939/semi2021.01.158.

Full text
Abstract:
Purpose. The purpose of the article is to prove the interdependence of economic security of public catering establishments from the adoption of anti-crisis decisions by the heads of such establishments in the conditions of Covid-19 and their support by public authorities. This approach will help create opportunities for public catering establishments, attract innovation, etc., but also find effective ways to adapt their business to non-standard conditions, taking into account the components of economic security in the context of the Covid19 pandemic. Design/methodology/approach. The structure of the economic security system of public catering establishments is characterized, which is a set of various measures to protect all functional components from possible risks (internal and external), requires a system-integrated approach taking into account the objects of protection, use of safety and available protection resources. The anti-crisis management mechanisms of the economic security of enterprises are structured. We envisage the presence of the following elements: organizational structure, indicators, and evaluation criteria, as well as management mechanisms aimed at using regulatory and legal support of economic security of enterprises, tools, and levers; information support; methods of provision; functions of the organization, management and implementation of effective forms and methods of construction and development of economic security. Threats to the economic security of the enterprise are systematized, which depend on typical factors and involve state financial regulation, including finding solutions to the Covid-19 pandemic; search for highly professional staff; building reliable protection of commercial classified information; developing reliable suppliers of raw materials; ensuring stable demand for own products; providing the company with appropriate technological and production equipment. The analysis of indicators of subjects’ activity in the field of public catering is carried out. It is defined that the enterprises are susceptible to changes in the social and economic environment and are dependent on a financial situation in the country. The growth of trade in this industry was realized due to the rising cost of raw materials, not due to an increase in visitors’ number. The amount of money spent by Ukrainians on basic meals in comparison with the minimum wage remains unsatisfactory, which also has an impact on the opportunity to visit public catering establishments. The conducted SWOT analysis of the catering industry gives grounds to claim a high level of bankruptcy. At the same time, making prompt anti-crisis management decisions and using their reputation (image) helps the establishments avoid bankruptcy. Findings. It is concluded that anti-crisis management should be a pivotal element to manage public catering establishments, as it helps to anticipate and minimize risks, prevents bankruptcy. The hypothesis offered that public dining establishments’ operation significantly depends on the economic conditions that have arisen due to the spread of coronavirus infection Covid-19 can be considered proven. Practical implications. The results of this research help practitioner, namely the owners of public dining establishments, who are trying to adapt to the new management conditions in the context of Covid-19 and theorists. The obtained results provide an opportunity to build the own business strategy, which will contribute to the formation of the enterprise’s required level of economic security. Originality/value This research shows that the information used to determine public dining establishments’ effectiveness has expected results, although their collection methods differed. In analyzing the results, the authors offer their vision for assessing the interdependence of enterprises’ economic security from anti-crisis decisions that help public dining establishments resist the actions of existing destructive factors in the conditions of Covid-19.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography