Journal articles on the topic 'Software and hardware protection methods'

To see the other types of publications on this topic, follow the link: Software and hardware protection methods.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Software and hardware protection methods.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

He, Gao Ming. "Research on Protection Methods of Embedded Operating System Software Based on Hardware Compiler." Applied Mechanics and Materials 443 (October 2013): 556–60. http://dx.doi.org/10.4028/www.scientific.net/amm.443.556.

Full text
Abstract:
This paper describes a system; CODESSEAL can provide protection and evaluation to system software. CODESSEAL was designed to protect embedded systems with sufficient expertise and resources to capture attack equipment and manipulator, not only to protect software but also to protect hardware. By using the reconfigurable hardware allows CODESSEAL to provide confidentiality, integrity of security services and a platform-independent program flow without having to redesign the processor. System uses software and data protection technology and designs cycle simulation methods for data analysis. Experimental results show that the protected instructions and data with a high level of safety can be realized a low, which in most cases the performance loss can be reduced to below 10%, so the research of software protection methods of the embedded operating system of hardware compiler has important practical significance.
APA, Harvard, Vancouver, ISO, and other styles
2

Mamarajabov Odil Elmurzayevich. "Cloud technology to ensure the protection of fundamental methods and use of information." International Journal on Integrated Education 3, no. 10 (October 30, 2020): 313–15. http://dx.doi.org/10.31149/ijie.v3i10.780.

Full text
Abstract:
A comparative analysis of attacks carried out in cloud technologies, the main methods and methods of information protection, the possibilities of using hardware and software, and methods to combat threats when eliminating them, ensuring data protection were carried out
APA, Harvard, Vancouver, ISO, and other styles
3

Sidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (August 10, 2019): 42. http://dx.doi.org/10.3390/jsan8030042.

Full text
Abstract:
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security. A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware. This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough. These devices must be protected against sophisticated attacks, especially if the groundwork for the attacks is already laid in devices during design or manufacturing process, such as with HTs. This paper will discuss the stealthy nature of these HT, highlight HT taxonomy and insertion methods, and provide countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
4

Bawane, Manjiri R., Madhavi S. Borkar, Payal R. Wawarkar, Sanika M. Shende, Heena K. Chandel, and Ketki R. Bhakare. "USB Key Based Antipiracy Solution." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 2 (February 28, 2015): 12–17. http://dx.doi.org/10.53555/nncse.v2i2.507.

Full text
Abstract:
USBkey is a new kind of intelligent security product that comprises microprocessor and operation system. Computer software is intellectual property, and is protected by copyright law. This paper proposes a software protection method that utilizes efficient calculation ability and security space of USB key in environment, which combines protection methods, identity authentication and trusted computing technology. In this project we proposed to develop a hardware based solution to prevent software piracy. A hardware based system consist of physical device and hence cannot be shared over the internet and hence eliminates the flaws of conventional mechanisms discussed above.
APA, Harvard, Vancouver, ISO, and other styles
5

Borovikov, Aleksey, Oleg Maslov, Stepan Mordvinov, and Andrei Esafiev. "Increasing Hardware-Software Platforms Trust Levels to Prevent Exploiting BIOS Vulnerabilities." Voprosy kiberbezopasnosti, no. 6(46) (2021): 68–77. http://dx.doi.org/10.21681/2311-3456-2021-6-68-77.

Full text
Abstract:
Abstract: in this publicaton, a technique to increase trust levels of foreign and domestic-made hardware-software platforms, which are used to create specialised devices and computing facilities, which are meeting safety requirements and protected from BIOS vulnerabilities, to work with classified information, was made. Problems, which developer might encounter, were listed; methods of troubleshooting were proposed, and conclusions were made. The purpose of research is to investigate an ability of designing trusted foreign and domestic-made hardwaresoftware platforms, protected from exploiting BIOS vulnerabilities. Research methods: in order to achieve the purpose of research, an analysis of Russian’s industrial-grade PC modules was made in order to choose PC module that will be used for designing trusted hardware-software platform, an analysis of known BIOS vulnerabilities was made; proprietary BIOS replacement in a form of domestic-made Horizon bootloader, which includes unauthorised access to information protection measures, was made and possibilty of practical use of trusted hardware-software platform with Horizon bootloader was overviewed. Obtained result: PC module for trusted hardware-software platform was selected, proprietary BIOS replacement in a form of domestic-made Horizon bootloader, which includes unauthorized access to information protection measures, was made; technique to increase trust levels of foreign and domestic-made hardware-software platforms, which are used to create specialized devices and computing facilities, which are meeting safety requirements and protected from BIOS vulnerabilities, to work with classified information, was made; an approach to create trusted hardware-software platform design requirements and conditions was made; needs to exclude potentially dangerous Intel Management Engine controller’s functionality were justified and proposal to use trusted hardware-software platform with Horizon bootloader was made.
APA, Harvard, Vancouver, ISO, and other styles
6

Alekseev, V. V., V. A. Gridnev, A. V. Yakovlev, O. S. Mashkova, U. A. Savilova, D. A. Shibkov, and D. A. Yakovleva. "A System Approach to the Construction of the Software and Hardware Complex for Training Information Security Specialists." Vestnik Tambovskogo gosudarstvennogo tehnicheskogo universiteta 27, no. 1 (2021): 020–30. http://dx.doi.org/10.17277/vestnik.2021.01.pp.020-030.

Full text
Abstract:
In order to train specialists in information security (IS), a software and hardware complex “Means of protecting information from leakage through technical channels” has been developed; it provides an opportunity to study the process of information leakage through technical channels and methods of its protection, as well as apply various modules and additional software (software) that clearly demonstrate the features of various methods of information security. The composition of this complex is shown: laboratory stands simulating acoustic, vibroacoustic, acoustoelectric channels and a channel of side electromagnetic radiation and interference. At each of the stands there are information security means (ISMs) that prevent the leakage of confidential information through the corresponding technical channel. To adjust the ISMs for acoustic and vibroacoustic channels, the ISIDORA software has been developed; it allows adjusting the level of the generated acoustic interference to meet the requirements of the security of the room and at the same time to have a comfortable conversation in this room.
APA, Harvard, Vancouver, ISO, and other styles
7

Lobyzov, Viktor, and Vadim Shevtsov. "The concept of a Hardware-Software System for Protecting IIoT Devices." NBI Technologies, no. 2 (October 2021): 16–21. http://dx.doi.org/10.15688/nbit.jvolsu.2021.2.3.

Full text
Abstract:
The Internet of Things is a new trend in the development of information technologies, actively spreading as interconnected functional nodes that by default have the means to ensure interaction directly with each other, or with the external environment. The development of such networks is a phenomenon that can radically change the world economy, as well as social processes. As a result of the application of this layer of information technologies, the need for direct human control over actions and operations will be eliminated. One of the most common household examples is a “smart home” – a computer network of interconnected devices using various data transfer protocols with the ability to access this network from an external network. So, thanks to IoT, it is possible to configure devices in the house by remote access. The paper deals with the main security methods against attacks and threats of IIoT devices. The information infrastructure was analyzed, an idea of the architecture of IIoT systems was obtained, and the information transmission path was identified. An analysis of the IIoT regulatory framework governing security, architecture and data exchange in IIoT systems has been carried out, documents governing the Industrial Internet of Things have been identified. The best communication protocol has been identified. Subsequently, the threats of the protocol were selected, and possible means and methods of protection were identified. For IIoT gateways, the concept of a hardware-software complex was presented as a prototype, and a comparison was made with existing solutions.
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Zongbo, Wenhui Xiao, Han Deng, and Lan Yang. "Research on data privacy protection methods based on genome-wide association study." International Journal of Embedded Systems 15, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijes.2022.122105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Deng, Han, Lan Yang, Zongbo Wu, and Wenhui Xiao. "Research on data privacy protection methods based on genome-wide association study." International Journal of Embedded Systems 15, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijes.2022.10046007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tian, Hong Lei, Jian Feng Liu, Yong Kuan Liu, Yuan Fang, Wen Huai Chen, and Liang Gao. "The Research on Relay Protection Settings On-Line Verification System Application in Smart Grid." Advanced Materials Research 1070-1072 (December 2014): 1378–83. http://dx.doi.org/10.4028/www.scientific.net/amr.1070-1072.1378.

Full text
Abstract:
The intelligrid-oriented on-line relay settings verification system based on EMS real-time data are discussed, with related software system designed and fulfilled. Firstly, the research background and current situation of on-line relay settings verification system are summarized. Secondly, the on-line relay settings verification system's general principle, hardware and software design are mainly discussed. And this paper shows the designed hardware structure diagram, the software structure diagram. And the flowchart of main procedure is given. Thirdly, the methods of dealing with EMS real-time data of the on-line verification system are discussed in detail. The verifying principles of sensitivity & selectivity of relay protection are given definitely. It is able to simulate two simultaneous faults, faults in network oscillation, and faults during auto-reclosing. It checks reliability & sensitivity of relay settings under these circumstances. Finally, considering substation-area and wide-area relay protections, this paper points out some key problems of on-line relay settings verification system to be resolved, and its application prospect.
APA, Harvard, Vancouver, ISO, and other styles
11

STETSIUK, MYKOLA, and ANTONINA KASHTALIAN. "THE METHODS OF ENSURING FAULT TOLERANCE, SURVIVABILITY AND PROTECTION OF INFORMATION OF SPECIALIZED INFORMATION TECHNOLOGIES UNDER THE INFLUENCE OF MALICIOUS SOFTWARE." Computer systems and information technologies, no. 1 (April 14, 2022): 36–44. http://dx.doi.org/10.31891/csit-2022-1-5.

Full text
Abstract:
The paper examines the provision of fault tolerance, survivability and protection of IT information on the impact of malicious software and computer attacks. Each method is presented separately by its steps. The states of hardware and software on which the implemented methods are impelled in the corresponding systems are investigated. The common states are singled out and on the basis of them and together with the steps of the methods the synthesis of the method of ensuring fault tolerance, survivability and protection of IT information is carried out. It combines three developed methods. This method is represented by four generalized steps. All representations of the models are made by graphs with weight vertices, which specify either the states or steps of the methods. This representation made it possible to connect common vertices.Some methods of ensuring resilience, survivability and protection of IT information under the influence of malicious software were compared with one integrated method. Experimental studies confirm the effectiveness of both the proposed solution to ensure fault tolerance, survivability and protection of IT information and the effectiveness of the method, which combines the provision of fault tolerance, survivability and protection of IT information.
APA, Harvard, Vancouver, ISO, and other styles
12

Tsmots, I. G., V. M. Teslyuk, Yu V. Opotiak, R. V. Parcei, and R. V. Zinko. "The basic architecture of mobile robotic platform with intelligent motion control system and data transmission protection." Ukrainian Journal of Information Technology 3, no. 2 (November 23, 2021): 74–80. http://dx.doi.org/10.23939/ujit2021.02.074.

Full text
Abstract:
The requirements for a mobile robotic platform (MRP) with an intelligent traffic control system and data transmission protection are determined. Main requirements are the reduction of dimensions, energy consumption, and cost; remote and intelligent autonomous traffic control; real-time cryptographic data protection; preservation of working capacity in the conditions of action of external factors; adaptation to customer requirements; ability to perform tasks independently in conditions of uncertainty of the external environment. It is proposed to develop a mobile robotic platform based on an integrated approach including: navigation methods, methods of pre-processing and image recognition; modern methods and algorithms of intelligent control, artificial neural networks, and fuzzy logic; neuro-like methods of cryptographic data transmission protection; modern components and modern element base; methods of intellectual processing and evaluation of data from sensors in the conditions of interference and incomplete information; methods and means of automated design of MRP hardware and software. The following principles were chosen for the development of a mobile robotic platform with an intelligent control system and cryptographic protection of data transmission: hierarchical construction of an intelligent control system; systematicity; variable composition of equipment; modularity; software openness; compatibility; specialization and adaptation of hardware and software to the structure of algorithms for data processing and protection; use of a set of basic design solutions. The basic architecture of a mobile robotic platform with an intelligent traffic control system and data transmission protection has been developed, which is the basis for the construction of mobile robotic platforms with specified technical and operational parameters. To implement neuro-like tools, the method of tabular-algorithmic calculation of the scalar product was improved, which due to the simultaneous formation of k macroparticle products provides k times reduction of the time of the scalar product calculation. Keywords: mobile robotic platform; intelligent processing; architecture; neural network; autonomous control; sensors; data protection.
APA, Harvard, Vancouver, ISO, and other styles
13

Kubkina, O. V., and V. G. Lysenko. "Automation of ac electric-traction NetWare digital protective relay operational control." Journal of Physics: Conference Series 2131, no. 4 (December 1, 2021): 042066. http://dx.doi.org/10.1088/1742-6596/2131/4/042066.

Full text
Abstract:
Abstract The widespread use of microprocessor-based digital protective relay from various manufacturers, the expansion of the programmable protective relay terminals’ functional composition, the lack of hardware, software and algorithmic support unification, problems of electromagnetic protection necessitate consideration of the issues of digital protective relay operational control automation [1-3]. The authors believe that the attention paid by operating services to the means and methods of the AC electric-traction netware protective relay Functional check is insufficient. Monitoring the correct protection functioning in real time when it is triggered by a short circuit makes it possible to identify all types of incorrect actions of the instrument units until the failure of the entire protection as a whole. The most common failures, such as “false response” and “unnecessary operation”, are detected with a probability close to unity [4-6]. The article discusses the principles of building a system of protective relay Functional check, applicable for all types of electric-traction netware protection that are currently in operation. Logical equations are given to identify incorrect actions of protective relay.
APA, Harvard, Vancouver, ISO, and other styles
14

Novash, I. V. "MODELING OF POWER SYSTEMS AND TESTING OF RELAY PROTECTION DEVICES IN REAL AND MODEL TIME." ENERGETIKA. Proceedings of CIS higher education institutions and power engineering associations 60, no. 3 (May 17, 2017): 198–210. http://dx.doi.org/10.21122/1029-7448-2017-60-3-198-210.

Full text
Abstract:
The methods of modelling of power system modes and of testing of relay protection devices with the aid the simulation complexes in real time and with the help of computer software systems that enables the simulation of virtual time scale are considered. Information input protection signals in the simulation of the virtual model time are being obtained in the computational experiment, whereas the tests of protective devices are carried out with the help of hardware and software test systems with the use of estimated input signals. Study of power system stability when modes of generating and consuming electrical equipment and conditions of devices of relay protection are being changed requires testing with the use of digital simulators in a mode of a closed loop. Herewith feedbacks between a model of the power system operating in a real time and external devices or their models must be determined (modelled). Modelling in real time and the analysis of international experience in the use of digital simulation power systems for real-time simulation (RTDS simulator) have been fulfilled. Examples are given of the use of RTDS systems by foreign energy companies to test relay protection systems and control, to test the equipment and devices of automatic control, analysis of cyber security and evaluation of the operation of energy systems under different scenarios of occurrence of emergency situations. Some quantitative data on the distribution of RTDS in different countries and Russia are presented. It is noted that the leading energy universities of Russia use the real-time simulation not only to solve scientific and technical problems, but also to conduct training and laboratory classes on modelling of electric networks and anti-emergency automatic equipment with the students. In order to check serviceability of devices of relay protection without taking into account the reaction of the power system tests can be performed in an open loop mode with the use of hardware and software test systems. Testing methods for relay protection and their models in open-loop mode have been proposed.
APA, Harvard, Vancouver, ISO, and other styles
15

Vitomsky, E. V., and D. N. Somov. "Methods for protecting local wireless network aimed at providing temporary silency of signals and information interaction structure." Issues of radio electronics, no. 3 (April 26, 2020): 35–40. http://dx.doi.org/10.21778/2218-5453-2020-3-35-40.

Full text
Abstract:
This work is devoted to the security problem of wireless local area networks. It is known that against a number of typical attacks, the most common IEEE802.11 networks are poorly protected. Existing ways of solving this problem with the help of regular wireless device software are not effective enough, and against some attacks, it is even not possible. One of the reasons, which complicates the solution of this problem, is low level of temporal and spatial security of modern wireless network. Based on the analysis of common attacks on Wi-Fi networks, original protection methods have been developed to consider this aspect. These methods were embodied in a real device. Protection methods are implemented by slightly modifying the standard software of the device having an open hardware platform. An experiment was carried out using this device, which confirmed the possibility of deploying a local wireless network which security was enhanced using the methods proposed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
16

Qian, Han Ming, Ping Sun, and Hong Tao Zhao. "A Design Proposal of Integrated PC-Architecture Embedded Control System for Remotely Operated Weapon Station." Advanced Materials Research 424-425 (January 2012): 881–84. http://dx.doi.org/10.4028/www.scientific.net/amr.424-425.881.

Full text
Abstract:
Modern warfare has led the concept of remotely operated weapon station for increasing force protection while maintaining lethality. There is a need for an efficient embedded control system for certain kind of system. A design proposal of an integrated PC-architecture embedded control system for remotely operated weapon station is presented. The hardware of the system is based on the 486DX2 processor running at 100MHz with coprocessor, which is a Pentium class platform. Hardware/software co-design methods and tools have been discussed after the system configuration is decided. The software design consideration for the control system has been presented according to multi-task programming of VxWorks
APA, Harvard, Vancouver, ISO, and other styles
17

Sharif, Uzair, Daniel Mueller-Gritschneder, and Ulf Schlichtmann. "REPAIR: Control Flow Protection based on Register Pairing Updates for SW-Implemented HW Fault Tolerance." ACM Transactions on Embedded Computing Systems 20, no. 5s (October 31, 2021): 1–22. http://dx.doi.org/10.1145/3477001.

Full text
Abstract:
Safety-critical embedded systems may either use specialized hardware or rely on Software-Implemented Hardware Fault Tolerance (SIHFT) to meet soft error resilience requirements. SIHFT has the advantage that it can be used with low-cost, off-the-shelf components such as standard Micro-Controller Units. For this, SIHFT methods apply redundancy in software computation and special checker codes to detect transient errors, so called soft errors, that either corrupt the data flow or the control flow of the software and may lead to Silent Data Corruption (SDC). So far, this is done by applying separate SIHFT methods for the data and control flow protection, which leads to large overheads in computation time. This work in contrast presents REPAIR, a method that exploits the checks of the SIHFT data flow protection to also detect control flow errors as well, thereby, yielding higher SDC resilience with less computational overhead. For this, the data flow protection methods entail duplicating the computation with subsequent checks placed strategically throughout the program. These checks assure that the two redundant computation paths, which work on two different parts of the register file, yield the same result. By updating the pairing between the registers used in the primary computation path and the registers in the duplicated computation path using the REPAIR method, these checks also fail with high coverage when a control flow error, which leads to an illegal jumps, occurs. Extensive RTL fault injection simulations are carried out to accurately quantify soft error resilience while evaluating Mibench programs along with an embedded case-study running on an OpenRISC processor. Our method performs slightly better on average in terms of soft error resilience compared to the best state-of-the-art method but requiring significantly lower overheads. These results show that REPAIR is a valuable addition to the set of known SIHFT methods.
APA, Harvard, Vancouver, ISO, and other styles
18

Mirzabaev, Alisher, and Alexander Samonov. "Control Method of the Correct Execution of Programs by Monitoring and Analyzing the Route-Time Parameters of the Computing Process." Voprosy kiberbezopasnosti, no. 2(48) (2022): 63–71. http://dx.doi.org/10.21681/2311-3456-2022-2-63-71.

Full text
Abstract:
Objective: develop a method and means to ensure sustainable functioning of the software mission-critical information systems under impact malicious software. Methods: analysis and classification of malicious software and means of protection against it, synthesis and modeling of correct behavior of programs, temporary automata. Study results: the characteristic of methods and means of detecting malware, which using masking methods, rootkit mechanisms and hardware virtualization technologies is given. A methodology for constructing profiles of the correct functioning of controlled programs in the form of a set of permissible execution routes has been developed. A method for monitoring and controlling the correctness of the current state of the computing process by comparing it with reference profiles has been developed. The method allows real-time detection and counteraction of malicious programs, which using various techniques of implementation and masking, including rootkit mechanisms, hypervisors based on hardware virtualization technology, interception and introduction in system functions in RAM.
APA, Harvard, Vancouver, ISO, and other styles
19

Rumapea, Mazmur Septian. "Perlindungan Hukum Terhadap Penggelapan Uang Elektronik Dalam Transaksi Elektronik." Jurnal Hukum Kaidah: Media Komunikasi dan Informasi Hukum dan Masyarakat 18, no. 3 (April 15, 2019): 27–39. http://dx.doi.org/10.30743/jhk.v18i3.1185.

Full text
Abstract:
The development of payment methods in electronic transactions, has recently developed and is very advanced, namely by using technology that is fast and up-to-date, so that it can be done more easily and flexibly. The implementation of electronic payment systems must be safe and protected physically (hardware / software) and non-physical (communication), have the ability in accordance with the specifications, and there are legal subjects who are legally responsible for the operation of the electronic system. Legal protection for consumers of online applications for electronic transactions cannot be fulfilled in the Consumer Protection Act.Keywords : Legal, Consumer, Electronic Transaction Protection
APA, Harvard, Vancouver, ISO, and other styles
20

Tolіupa, Serhii, Oleksandr Pliushch, and Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.

Full text
Abstract:
Systems for detecting network intrusions and detecting signs of attacks on information systems have long been used as one of the necessary lines of defense of information systems. Today, intrusion and attack detection systems are usually software or hardware-software solutions that automate the process of monitoring events occurring in an information system or network, as well as independently analyze these events in search of signs of security problems. As the number of different types and ways of organizing unauthorized intrusions into foreign networks has increased significantly in recent years, attack detection systems (ATS) have become a necessary component of the security infrastructure of most organizations. The article proposes a software prototype of a network attack detection system based on selected methods of data mining and neural network structures. The conducted experimental researches confirm efficiency of the created model of detection for protection of an information network. Experiments with a software prototype showed high quality detection of network attacks based on neural network structures and methods of intelligent data distribution. The state of protection of information systems to counter cyber attacks is analyzed, which made it possible to draw conclusions that to ensure the security of cyberspace it is necessary to implement a set of systems and protection mechanisms, namely systems: delimitation of user access; firewall; cryptographic protection of information; virtual private networks; anti-virus protection of ITS elements; detection and prevention of intrusions; authentication, authorization and audit; data loss prevention; security and event management; security management.
APA, Harvard, Vancouver, ISO, and other styles
21

Yu, Qiang, Peng Fei Yu, Hui Huang, Wei Chen, Jie Ren, and Zhi Huang. "Design of Dual PON-MAC ONU Dedicated for Communication System of Power Distribution and Utilization." Applied Mechanics and Materials 391 (September 2013): 528–31. http://dx.doi.org/10.4028/www.scientific.net/amm.391.528.

Full text
Abstract:
With the development of smart power grid technology, EPON has become a popular communications technology both in power distribution and utilization automation. The article analyses several communication path protection methods of EPON system, then introduces the development of a dual PON-MAC ONU for such application, both hardware and software design are discussed. At last, A group of test data which verify the performance of fast protect switchover is given..
APA, Harvard, Vancouver, ISO, and other styles
22

Niu, Xiao Peng, Qing Bao Li, and Xiao Dong Xie. "The Research of Hiding Technology of Hardware Trojan in Chip." Applied Mechanics and Materials 446-447 (November 2013): 876–81. http://dx.doi.org/10.4028/www.scientific.net/amm.446-447.876.

Full text
Abstract:
To solve the hiding problem of hardware Trojan in chip, we first analyzed the self-protection technology of malicious software, and then proposed a trigger mechanism that base on timing finite state machine (TFSM), energy flow, and distributed Trojan design method. As for the trigger mechanism that based on TFSM, one must enter the right pattern on the correct time to activate the Trojan. The mechanism based on energy flow can make the hardware Trojan keep hiding in the RTL code logical analysis. The distributed hardware Trojan design is to divide a complete Trojan into several components, and the Trojan will keep silent if all the components are not in order. The design methods of hardware Trojan have been verified in our self-made hardware threat simulate platform, it can reduce the rate of been detected out, and the possibility of been triggered out by random operations.
APA, Harvard, Vancouver, ISO, and other styles
23

Desnitsky, V., and A. Meleshko. "SECURITY ANALYSIS OF SOFTWARE AND HARDWARE COMPONENTS IN WIRELESS SENSOR NETWORKS." Telecom IT 7, no. 1 (2019): 75–83. http://dx.doi.org/10.31854/2307-1303-2019-7-1-75-83.

Full text
Abstract:
The paper comprises a review of approaches to security analysis of software and hardware components in wireless sensor networks. Research subject. The subject of the research is existing approaches to security analysis. Method. The methods of system analysis are applied in the work. Core results. A detailed analysis of existing threats and attacks on wireless sensor networks as well as an analysis of vulnerabilities and data transfer protocols between nodes of such systems has been performed. The main directions to ensure security of the wireless sensor networks are identified. Practical significance. The results obtained in this paper can be used to improve the means of protecting the wireless sensor networks from various cyber-physical attacks.
APA, Harvard, Vancouver, ISO, and other styles
24

Zhang, Jing Jing. "Research and Summary on Reliability of Relay Protection System." Advanced Materials Research 433-440 (January 2012): 6755–59. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.6755.

Full text
Abstract:
In electric power system, relay protection system can powerfully safeguard secure and stable operation of the first circuit equipment; it’s an important task to ensure reliable operation of protection system. Research on reliability of it now arises much attention at home and abroad. The paper carries out detailed research survey on reliability of relay protection system, which contains AC input circuit, digital relay protection equipment and operation output circuit. In general it also contains automatic equipment and telecommunication network etc. It belongs to repairable system; state-space method and fault-tree method are main analysis methods. Each protection has its own principle and structure, the modeling of which is different. The paper discusses the reliability modeling and index system of protection system from three aspects, whose failure models are hardware and software construction, main protection and backup protection construction and construction with relation to operation mode of power system. With the vigorous development of DG in smart grid, the prospects of reliability evaluation of wide area adaptive protection system are presented.
APA, Harvard, Vancouver, ISO, and other styles
25

Golovacheva, Natalia. "Methods of Developing Recommendations for Improving the Security of Information Systems." NBI Technologies, no. 3 (March 2021): 18–22. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.3.

Full text
Abstract:
With the advent of information technologies, information systems have been widely used in organizations and enterprises. The use of information systems allows optimizing the workforce, automating all or part of business processes. However, the use of information systems requires the development of an information security system to minimize malicious attacks. To reduce the likelihood of malicious attacks, there are a large number of software and hardware-based information security tools. The complexity of computing the distribution of the components of information systems complicates the process of creating and configuring protection systems, the number of threats to security are increasing every year. For a timely response to information security incidents, including attacks, it is necessary to use information system security assessment tools to reduce the risks of security breaches. InfoWath statistics show the growth trend of various types of attacks, both from an external attacker and from an internal one. Therefore, one of the most important tasks is to correctly determine the security of information systems. The paper implements a mathematical model for assessing the security of an information system based on the selected methods. The architecture of the software package for assessing the security of the information system is formed.
APA, Harvard, Vancouver, ISO, and other styles
26

Dongak, B. S., A. S. Shatohin, and R. V. Meshcheryakov. "The effectiveness of the Centralized Use of Digital Technologies, Information Resources and Information Protection Tools in Government by the Example of the Republic of Tyva." Proceedings of the Southwest State University 23, no. 6 (February 23, 2020): 99–114. http://dx.doi.org/10.21869/2223-1560-2019-23-6-99-114.

Full text
Abstract:
Purpose of research. The purpose of this study is to assess the possibility of applying the methodology for centralized management of systems and information risks using the example of informatization of public departments of Republic of Tyva in order to optimize the cost of purchasing technical, software and hardware-software means of protecting information, as well as the payroll of maintenance technical personnel.Methods. One of the main research methods is the creation of an experimental model of the mechanism of a single information and computing network, combining various government departments located within the same administrative building, which allows working simultaneously with distributed or centralized applications, databases and other services, as well as centralized information risk management security. The next research method is the analysis and study of the principle of operation of information resources, information systems, databases, and the increase in the number of domain users if they are combined into a single data transfer network. The interaction and effectiveness of personnel, a specialized unit based on one government agency, ensuring the regular functioning of the network and the necessary level of information security for all government departments.Results. As a result, an economic effect is achieved by eliminating the acquisition of duplicate software and hardware information protection, increasing the efficiency of using unified information services, and creating a centralized structural unit that uses risk management tools and makes information security management decisions based on the principles of system analysis , structuring method and expert survey methods. The results of the study have been used in solving problems of improving the information security management system of the authorities of Republic of Tyva.Conclusion. We have developed the original information technology architecture of the information security management system and centralized use of information technologies for the government of Republic of Tyva. The distinctive features of the structure of software tools for the centralized approach are the multi-agent implementation of the control elements of the decision support system and the integration of various types of security management models into a single complex.
APA, Harvard, Vancouver, ISO, and other styles
27

Surinsky, Dmitry, and Ilya Shchinnikov. "Trends in the development of the direction of electroderatization." АгроЭкоИнфо 7, Special (November 24, 2021): 2. http://dx.doi.org/10.51419/20217002.

Full text
Abstract:
The article discusses the existing methods of deratization based on the electrophysical principle. The advantages and disadvantages of these methods are analyzed; therefore, theoretical options for improving these systems are proposed. A little-studied promising direction in electroderatization, treatment of premises with ozone, generated under the influence of an electric discharge, is highlighted. The prospect of this direction is indicated, in addition to the direct deratization properties, but also other positive factors that result from ozone treatment. It is proposed to use the hardware and software complex of the automated process control system when carrying out deratization measures. Keywords: CONTROL METHODS, PESTS IN AGROINDUSTRIAL COMPLEX, ELECTROPHYSICAL METHOD OF PROTECTION, ELECTRODERATIZATION, RODENTS, ULTRASONIC DETERRENT, BARRIER ELECTRODERATIZER, OZONATION, APCS
APA, Harvard, Vancouver, ISO, and other styles
28

Dergachov, Konstantin, Leonid Krasnov, Vladislav Bilozerskyi, and Anatoly Zymovin. "Methods and algorithms for protecting information in optical text recognition systems." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 1 (February 23, 2022): 154–69. http://dx.doi.org/10.32620/reks.2022.1.12.

Full text
Abstract:
The subject of the study. A concept of OCR systems performance improvement is proposed, which is achieved through the integrated use of special algorithms for preliminary processing of documents picture, an extended set of service functions, and advanced techniques for information protection. Study objectives: development of algorithms that compensate for the influence of the unfavorable points like imperfect lighting conditions overshooting, images geometric deformation, noises, etc., which corrupt the pictured text, on the efficiency of that text recognition. It is needed to provide for a series of service procedures that would ensure adequate data handling while viewing, converting, and storing in standard formats the results, and ensuring the possibility to exchange data in open communication networks. Additionally, it is necessary to ensure the information protection against unauthorized use at the stage of data processing and provide secretiveness of their transmission through the communication channels. Investigation methods and research results: developed and tested algorithms for preliminary picture data processing, namely, for the captured image geometry transformation, picture noise correction with different filters, image binarization when using the adaptive thresholds reduced the negative influence of irregular image portions illumination; in the software, the special services ensure the data processing ease and information protection are affected. In particular, the interactive procedure for text segmentation is proposed, which implies the possibility of anonymizing its fragments and contributes to collecting confidentiality for documents treated. The package for processing document shots contains the face detection algorithm bringing the identification of such information features; it can be used further in the task of face recognition. After the textual doc is recognized, the received data encryption is provided by generating a QR-code and the steganography methods can deliver the privacy of this information transmission. The algorithms' structures are described in detail and the stability of their work under various conditions is investigated. Focused on the case study, docs' text recognition software was developed with the usage of Tesseract version 4.0 optical character recognition program. The program named "HQ Scanner" is written in Python using the present resources of the OpenCV library. An original technique for evaluating the efficiency of algorithms using the criterion of the maximum probability of correct text recognition is implemented in the software. Conclusions. The study results can constitute the basis for developing advanced specialized software for easy-to-use commercial OCR systems.
APA, Harvard, Vancouver, ISO, and other styles
29

M., Vardhana, and Anil Kumar Bhat. "VLSI Implementation and Software Co-Simulation of Digital Image Watermarking with Increased Security." International Journal of Sensors, Wireless Communications and Control 10, no. 4 (December 18, 2020): 634–38. http://dx.doi.org/10.2174/2210327909666190319150314.

Full text
Abstract:
Background: Security is one of the fundamental and essential factors, which has to be addressed in the field of communication. Communication refers to the exchange of useful information between two or more nodes. Sometimes it is required to exchange some of the confidential information such as a company’s logo, which needs to be hidden from the third person. The data that is being exchanged between these nodes has to be kept confidential and secured from unintended users. The three fundamental components of security are confidentiality, integrity and authentication. The data that is being exchanged has to be confidential, and only the authorized party should have access to the information that is being exchanged. One of the key methods for securing the data is encryption. Objective: The main objective of this paper was to address the problem of data hiding and security in communication systems. There is a need for having hardware resources for having high speed data security and protection. Methods: In this paper, we implemented image watermarking using LSB technique to hide a secret image, and employed encryption using Advanced Encryption Standard, to enhance the security of the image. An image is a two dimensional signal, with each pixel value representing the intensity level. The secure transmission of the image along the channel is a challenging task, because of the reason that, any individual can access it, if no security measures are taken. Conclusion: An efficient method of digital watermarking has been implemented with increased security and performance parameters are presented. Results: In this paper, hardware realization of image watermarking/encryption and dewatermarking/ decryption is implemented using Very Large Scale Integration. The design is verified by means of co-simulation using MATLAB and Xilinx. The paper also presents the performance parameters of the design, with respect to speed, area and power.
APA, Harvard, Vancouver, ISO, and other styles
30

Chugunov, Mikhail V., Irina N. Polunina, Alexander G. Divin, Aleksandra A. Generalova, Artem A. Nikulin, and Dmitriy S. Bychkov. "Integrated Mobile Robotic Platform Model." Engineering Technologies and Systems 31, no. 4 (December 30, 2021): 609–27. http://dx.doi.org/10.15507/2658-4123.031.202104.609-627.

Full text
Abstract:
Introduction. The “Smart Agroˮ committee of Research and Education Center “Engineering of the Future” has identified a number of tasks relevant for improving the efficiency of precision, soil-protecting and conservation agriculture. One of these tasks is the development of a digital multi-agent system, which provides a number of services for agricultural enterprises, developers and manufacturers of agricultural machinery. The purpose of the present study is to model an autonomous mobile robotic platform, including the development of software and hardware for trajectory control. Materials and Methods. To solve the problem, there are used modern CAx systems and their applications, the methods of 3D and full-body modeling, and the method of numerical solution of problems in solid mechanics. To expand and improve the standard functionality of CAx-systems (SolidWorks) in the software implementation of trajectory control algorithms, the methods and technologies of programming using API SolidWorks, VisualStudio C++ (MFC, ATL, COM) are used, and to build physical full-scale models ‒ Arduino and fischertechnik platforms. Results. The result of the study is a software and hardware module of trajectory control for an integrated (physical and virtual) model of a mobile robotic platform, which can be provided to the consumer as a service for technology autonomation. For the developed integrated model, control algorithms for various types of trajectories were tested. Discussion and Conclusion. The developed integrated software and hardware model of trajectory control can be used by developers and manufacturers of agricultural machinery, and directly by agro-enterprises for implementing typical technological processes. A feature of the implementation is an open hardware and software interface that provides the integration of mobile robotic platforms based on a digital multi-agent system.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Xin, Bo WAN, Wei Zhou, Huaitong Niu, and Sibo Feng. "Research on technical scheme for multi type load resource information access." Journal of Physics: Conference Series 2189, no. 1 (February 1, 2022): 012030. http://dx.doi.org/10.1088/1742-6596/2189/1/012030.

Full text
Abstract:
Abstract In order to improve the regulation ability of adjustable load resources, realize the aggregation, sharing and regulation of “source-load-storage” regulation resources in the region, and improve the adjustable load management ability, the criteria and methods for accessing the operation system of load resource aggregators to the regulation center are proposed according to the safety protection requirements of power monitoring system and the communication ability of multi type load resource aggregators. To meet the security access of multiple resources, combined with different access modes of load resources, a network security protection mechanism combining software and hardware is proposed. Digital certificate, data encryption, situation awareness, analysis and early warning and other technologies are used to build security protection strategies for private network and different access modes such as Internet, wireless and optical fiber, so as to adapt to the security access of multiple resources. An interaction mode based on standardized data format, using web services (restful HTTPS), file interaction and 104 protocol could be established to adapt multi type adjustable load resource model and safe interaction of real-time data..
APA, Harvard, Vancouver, ISO, and other styles
32

Linz, A., D. Brunner, J. Fehrmann, T. Herlitzius, R. Keicher, A. Ruckelshausen, and H. P. Schwarz. "Modelling environment for an electrical driven selective sprayer robot in orchards." Advances in Animal Biosciences 8, no. 2 (June 1, 2017): 848–53. http://dx.doi.org/10.1017/s2040470017000723.

Full text
Abstract:
Precise applying of PPP (Plant Protection Products) in orchards and vineyards requires new kinds of sprayer technologies and new methods of sensor data evaluation. In this paper a selective electrical driven sprayer, carried by the autonomous robotic platform elWObot, is introduced. A 3D-Simulation environment and the framework ROS (Robot Operating System) helps developing and testing the interaction between the sprayer and the robot. The calculated leaf wall area (LWA) and the distance from the sprayer to the leaves in the spray region, control the flow-rate and the air-assist of eight adjustable sprayers individually. First field trials showed that the adaption of the software from the simulation to the hardware worked as expected.
APA, Harvard, Vancouver, ISO, and other styles
33

Ivanov, Artem, Igor Kolosov, Vadim Danyk, Sergey Voronenko, Yurii Lebedenko, and Hanna Rudakova. "DESIGN OF MULTIFUNCTION SIMULATOR FOR ENGINE ROOM PERSONNEL TRAINING." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 10, no. 2 (June 30, 2020): 62–69. http://dx.doi.org/10.35784/iapgos.1617.

Full text
Abstract:
International requirements for improving energy efficiency and environmental protection and the necessary goals for their implementation in the marine industry are an actual problem. To integrate state-of-the-industry technologies and marine specialists education, the training complex is proposed. It is based on the platform of a hardware-software complex with the ability to integrate training equipment, simulators and software. That makes such a training complex multitask, universal, and flexible in achieving a variety of tasks and goals. The complex also implements high-quality education and training of marine specialists, conducting research after processing working out the results of engineering modelling of structural, thermal power, hydraulic, electrical, electronic, multi-physical and other solutions. The need to use the training complex allows us to form the necessary competence of the engine team personnel, develop methods and criteria for assessing competence, evaluate and demonstrate practical skills.
APA, Harvard, Vancouver, ISO, and other styles
34

Abubakar, M. A. T., A. Aloysius, Z. Umar, and M. Dauda. "Comparative Analysis of Some Efficient Data Security Methods among Cryptographic Techniques for Cloud Data Security." Nigerian Journal of Basic and Applied Sciences 27, no. 1 (May 26, 2020): 81–88. http://dx.doi.org/10.4314/njbas.v27i1.11.

Full text
Abstract:
The concept of cloud computing model is to grant users access to outsource data from the cloud server without them having to worry about aspects of the hardware and software management. The owner of the data encrypts it before outsourcing to a Cloud Service Provider (CSP) server for effective deployment of sensitive data. Data confidentiality is a demanding task of cloud data protection. Thus, to solve this problem, lots of techniques are needed to defend the shared data. We focus on cryptography to secure the data while transmitting in the network. We deployed Advanced Encryption Standard (AES) used as encryption method for cloud data security, to encrypt the sensitive data which is to be transmitted from sender to receiver in the network and to decrypt so that the receiver can view the original data. Arrays of encryption systems are being deployed in the world of Information Systems by various organizations. In this paper, comparative analysis of some various encryption algorithms in cryptography have been implemented by comparing their performance in terms of stimulated time during Encryption and decryption in the network. Keywords: AES, Data Control, Data Privacy, Data Storage, Encryption Algorithms, Verification.
APA, Harvard, Vancouver, ISO, and other styles
35

Nemchinov, S. G., V. A. Harevskiy, Yu I. Gorban, and S. G. Tsarichenko. "https://www.btpnadzor.ru/archive/protivopozharnaya-zashchita-mashinnykh-zalov-atomnykh-elektrostantsiy-s-ispolzovaniem-mnogofunktsionalnykh-robototekhnicheskikh-kompleksov." Occupational Safety in Industry, no. 2 (February 2022): 20–26. http://dx.doi.org/10.24000/0409-2961-2022-2-20-26.

Full text
Abstract:
The problematic issues of the organization of fire extinguishing process in the engine rooms of nuclear power plants are considered. The need of prompt response to the occurrence of combustion source at the initial stage is substantiated. With the existing methods of ensuring fire safety, it is not always possible to achieve this goal. A conceptual approach is proposed concerning the construction of a system using robotic fire extinguishing installations, the hardware-software control complex of which allows to prevent the development of a fire. This is ensured by monitoring and analysis of the facility state, development of the control commands for the multifunctional fire protection complex. The innovative system for monitoring fire situation and fire extinguishing was created, which adapts in accordance with the dynamics of the development of a fire and a change in the situation. It is based on the software and digital solutions for ensuring comprehensive full-scale protection of the facilities from fires, accidents, and explosions. The risks to the life and health of the facility personnel and firefighters involved in extinguishing were minimized due to the absence of exposure to hazardous fire factors and their consequences. As a result, an unacceptable economic damage is prevented in case of fires and emergencies at the protected objects. Proposed complex with separate systems included in it differs from the traditional methods of fire protection. It is fully adapted to the likely scenarios for the development of the situation at the facility. As a result, the fire protection system is formed, which is based not on the general requirements (standards), but on the realistically possible emergency events. This approach not only ensures the efficiency of fire detection and elimination, but also reduces the cost of equipment operation.
APA, Harvard, Vancouver, ISO, and other styles
36

Rani, Rajneesh, and Harpreet Singh. "Fingerprint Presentation Attack Detection Using Transfer Learning Approach." International Journal of Intelligent Information Technologies 17, no. 1 (January 2021): 53–67. http://dx.doi.org/10.4018/ijiit.2021010104.

Full text
Abstract:
In this busy world, biometric authentication methods are serving as fast authentication means. But with growing dependencies on these systems, attackers have tried to exploit these systems through various attacks; thus, there is a strong need to protect authentication systems. Many software and hardware methods have been proposed in the past to make existing authentication systems more robust. Liveness detection/presentation attack detection is one such method that provides protection against malicious agents by detecting fake samples of biometric traits. This paper has worked on fingerprint liveness detection/presentation attack detection using transfer learning for which the authors have used a pre-trained NASNetMobile model. The experiments are performed on publicly available liveness datasets LivDet 2011 and LivDet 2013 and have obtained good results as compared to state of art techniques in terms of ACE(average classification error).
APA, Harvard, Vancouver, ISO, and other styles
37

Anfinogenov, M. V., and I. S. Antyasov. "EVOLUTION OF INFORMATION SECURITY SYSTEMS IN VIDEO GAMES." Journal of the Ural Federal District. Information security 20, no. 3 (2020): 59–68. http://dx.doi.org/10.14529/secur200307.

Full text
Abstract:
This article covers the video games as a unique phenomenon in the information environ-ment, the development of security technologies and unauthorized access methods since the first video game release until the position of the video game industry in our time. Represented a step change in the interaction systems, the technical features of both hardware and software security which were used by video game developers and companies producing platforms. The analysis of the hacking techniques and methods intended for these protection systems and re-lated global incidents is made. Illustrated the formation and development of security systems of the video game consoles of subsequent generations under the influence of the mistakes and shortcomings in the data security of the prior console generations. The process of centralization and generalization of the user data integrity systems in the modern world is considere
APA, Harvard, Vancouver, ISO, and other styles
38

Jones, Michael, Matthew Johnson, Mark Shervey, Joel T. Dudley, and Noah Zimmerman. "Privacy-Preserving Methods for Feature Engineering Using Blockchain: Review, Evaluation, and Proof of Concept." Journal of Medical Internet Research 21, no. 8 (August 14, 2019): e13600. http://dx.doi.org/10.2196/13600.

Full text
Abstract:
Background The protection of private data is a key responsibility for research studies that collect identifiable information from study participants. Limiting the scope of data collection and preventing secondary use of the data are effective strategies for managing these risks. An ideal framework for data collection would incorporate feature engineering, a process where secondary features are derived from sensitive raw data in a secure environment without a trusted third party. Objective This study aimed to compare current approaches based on how they maintain data privacy and the practicality of their implementations. These approaches include traditional approaches that rely on trusted third parties, and cryptographic, secure hardware, and blockchain-based techniques. Methods A set of properties were defined for evaluating each approach. A qualitative comparison was presented based on these properties. The evaluation of each approach was framed with a use case of sharing geolocation data for biomedical research. Results We found that approaches that rely on a trusted third party for preserving participant privacy do not provide sufficiently strong guarantees that sensitive data will not be exposed in modern data ecosystems. Cryptographic techniques incorporate strong privacy-preserving paradigms but are appropriate only for select use cases or are currently limited because of computational complexity. Blockchain smart contracts alone are insufficient to provide data privacy because transactional data are public. Trusted execution environments (TEEs) may have hardware vulnerabilities and lack visibility into how data are processed. Hybrid approaches combining blockchain and cryptographic techniques or blockchain and TEEs provide promising frameworks for privacy preservation. For reference, we provide a software implementation where users can privately share features of their geolocation data using the hybrid approach combining blockchain with TEEs as a supplement. Conclusions Blockchain technology and smart contracts enable the development of new privacy-preserving feature engineering methods by obviating dependence on trusted parties and providing immutable, auditable data processing workflows. The overlap between blockchain and cryptographic techniques or blockchain and secure hardware technologies are promising fields for addressing important data privacy needs. Hybrid blockchain and TEE frameworks currently provide practical tools for implementing experimental privacy-preserving applications.
APA, Harvard, Vancouver, ISO, and other styles
39

Петручук, Е., Evgeniy Petruchuk, Д. Иванов, and Donat Ivanov. "ORGANIZATION OF INFORMATION EXCHANGE IN DECENTRALIZED SWARM CONTROL SYSTEMS OF MULTI-ROBOTIC COMPLEXES USING ZIGBEE." Bulletin of Belgorod State Technological University named after. V. G. Shukhov 4, no. 7 (July 21, 2019): 140–57. http://dx.doi.org/10.34031/article_5d35d0b6de2bb4.43911446.

Full text
Abstract:
The article considers the single-minded, hierarchical, collective, flock and swarm-based methods of managing groups of robots. In extreme robotics, it is preferable to use a decentralized swarm control method, since the network is easily scalable, allowing to cover a large area. There is no need in op-timization of collective movement, excluding the Central control device from the network, which makes the network independent of the control center and resistant to external sources of influence. The implementation of this method requires a good and stable communication between the network participants, which allows making a constant exchange and processing of information in real time. The ZigBee information exchange standard (IEEE 802.15.4) is suitable for solving this scientific and technical problem. It’s hardware implementation and components are more cost-effective, frequency ranges are less loaded, the standard involves low power consumption, which is another advantage for small-sized robots with a small supply of energy. In spite of this, using a wireless communication line there are risks of covert receipt of information, unauthorized access and discredit of information. For protection, it is proposed to use the software encryption instead of the hardware, which reduces the weight and price of a small-sized robot. The algorithm of the DES family is presented. It allows to see the visual advantages of software encryption.
APA, Harvard, Vancouver, ISO, and other styles
40

Al-Mohair, Hani K., and Hussien A. Alhadadd. "Design an Improved System to Control the Computer Temperature." International Journal of Systems Applications, Engineering & Development 15 (December 29, 2021): 234–39. http://dx.doi.org/10.46300/91015.2021.15.35.

Full text
Abstract:
Temperature is one of the most significant problems that computer users face, especially the users who deal with works that required high-performance processing such as gamers and designers. The traditional PC heat detection methods depend on the information of the CPU and the user should go through a long procedure to check the heat or by installing some third-party programs and in the end, he has to take the action manually. Although some researchers have been talked about the temperature controllers, no system used both software and hardware to control the PC temperature, also there is no consensus on the quick and efficient methods to protect the PC from the overheating problem. The proposed system improved the current solutions by providing better performance in terms of quick responses for safety protection. This paper proposes a novel system for controlling the PC's temperature to increase the safety of computer users.
APA, Harvard, Vancouver, ISO, and other styles
41

KOHDA, TAKEHISA, and KOICHI INOUE. "SAFETY ASSESSMENT MODEL OF SOFTWARE FOR FAILURE DIAGNOSIS SYSTEMS." International Journal of Reliability, Quality and Safety Engineering 06, no. 01 (March 1999): 81–89. http://dx.doi.org/10.1142/s0218539399000097.

Full text
Abstract:
The software for a failure diagnosis system can be represented in terms of production rules; the condition part represents a system failure condition and the conclusion part corresponds to a cause of the system failure or an appropriate protective action to be taken. This paper proposes a safety assessment model of the software to evaluate its contribution to the risk caused by the entire failure diagnosis system. The proposed risk criterion considers not only the reliability of hardware components of the failure diagnosis system, but also the reliability characteristics of the system to be monitored. Conventional verification and validation methods of rule-based systems assume that the software reliability can be achieved by maintaining the consistent relation between condition parts and conclusion parts. However, the risk criterion derived in this paper shows that the software for a failure diagnosis system cannot be optimized without considering these environmental factors.
APA, Harvard, Vancouver, ISO, and other styles
42

Sowah, Robert A., Kwaku Apeadu, Francis Gatsi, Kwame O. Ampadu, and Baffour S. Mensah. "Hardware Module Design and Software Implementation of Multisensor Fire Detection and Notification System Using Fuzzy Logic and Convolutional Neural Networks (CNNs)." Journal of Engineering 2020 (February 1, 2020): 1–16. http://dx.doi.org/10.1155/2020/3645729.

Full text
Abstract:
This paper presents the design and development of a fuzzy logic-based multisensor fire detection and a web-based notification system with trained convolutional neural networks for both proximity and wide-area fire detection. Until recently, most consumer-grade fire detection systems relied solely on smoke detectors. These offer limited protection due to the type of fire present and the detection technology at use. To solve this problem, we present a multisensor data fusion with convolutional neural network (CNN) fire detection and notification technology. Convolutional Neural Networks are mainstream methods of deep learning due to their ability to perform feature extraction and classification in the same architecture. The system is designed to enable early detection of fire in residential, commercial, and industrial environments by using multiple fire signatures such as flames, smoke, and heat. The incorporation of the convolutional neural networks enables broader coverage of the area of interest, using visuals from surveillance cameras. With access granted to the web-based system, the fire and rescue crew gets notified in real-time with location information. The efficiency of the fire detection and notification system employed by standard fire detectors and the multisensor remote-based notification approach adopted in this paper showed significant improvements with timely fire detection, alerting, and response time for firefighting. The final experimental and performance evaluation results showed that the accuracy rate of CNN was 94% and that of the fuzzy logic unit is 90%.
APA, Harvard, Vancouver, ISO, and other styles
43

Ryzhkov, Igor Victorovych. "SECONDARY INFORMATION PROCESSING METHODS WHILE ESTIMATING THE SPATIAL ORIENTATION OF OBJECTS." Applied Aspects of Information Technology 3, no. 4 (November 20, 2020): 221–31. http://dx.doi.org/10.15276/aait.04.2020.1.

Full text
Abstract:
The study is devoted to solving the scientific problem of ensuring unbiasedness and increasing the efficiency of assessing the spatial orientation of objects by applying new methods of secondary information processing in software and hardware components of computer systems. The paper describes a developed method for compensating for magnetic anomalies that affect magnetically sensitive sensors of the inclinometer rotation angles. It is based on recording the inclinometer readings and the angle of rotation of the drill pipe as it rotates in the mouth of well in a range of 360 degrees. This makes it possible to determine and further take into account the value of the magnetic deviation from the drill string in the readings of the inclinometer. A method is described for determining the parameters of a magnetic anomaly from an external stationary source of a constant magnetic field by using redundant information from the readings of inclinometery transducers in the mouth of well and at the point of assessment. This allows to expand the boundaries and scope of magnetometric transducers in difficult conditions. Methods for calculating the desired azimuth, as well as the parameters of the intensity vector of the magnetic anomaly are proposed. The errors of inclinometers based on sensor devices of various physical nature (fluxgates, gyroscopes, accelerometers), both rigidly fixed and with the use of gimbals pendulum suspensions, are considered. The factors influencing the bias of the estimation of the angles of the spatial orientation of the drilling tool, expressed through the Euler angles, are analyzed. The analysis took into account the effect of various reasons: deviations of the transducers' sensitivity axes from mutual orthogonality and the reference trihedron of the axes associated with the body; changes in the zero signal and transfer ratios under the influence of temperature; non-identical electrical parameters; inaccurate installation of the pendulum gimbal sensor frames in the tilt plane and along the vertical of the place. The permissible boundary values of each of the given errors have been determined. Consideration of these errors can significantly increase the unbiasedness of the assessment of the position of the object in difficult conditions. The practical significance of the results presented in the paper is the development of software and hardware components for assessing the spatial orientation of objects on the basis of the designed inclinometers capable of operating in difficult operating conditions and having a small diameter of the protective casing. Similar software and hardware components for assessing the spatial orientation of objects can be used: for the construction of underground communications; for the assembly of large-sized and remote objects; for static sounding of soils; for monitoring the state of building structure elements during operation.
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Xing, Umit Ogras, and Chaitali Chakrabarti. "Probabilistic Risk-Aware Scheduling with Deadline Constraint for Heterogeneous SoCs." ACM Transactions on Embedded Computing Systems 21, no. 2 (March 31, 2022): 1–27. http://dx.doi.org/10.1145/3489409.

Full text
Abstract:
Hardware Trojans can compromise System-on-Chip (SoC) performance. Protection schemes implemented to combat these threats cannot guarantee 100% detection rate and may also introduce performance overhead. This paper defines the risk of running a job on an SoC as a function of the misdetection rate of the hardware Trojan detection methods implemented on the cores in the SoC. Given the user-defined deadlines of each job, our goal is to minimize the job-level risk as well as the deadline violation rate for both static and dynamic scheduling scenarios. We assume that there is no relationship between the execution time and risk of a task executed on a core. Our risk-aware scheduling algorithm first calculates the probability of possible task allocations and then uses it to derive the task-level deadlines. Each task is then allocated to the core with minimum risk that satisfies the task-level deadline. In addition, in dynamic scheduling, where multiple jobs are injected randomly, we propose to explicitly operate with a reduced virtual deadline to avoid possible future deadline violations. Simulations on randomly generated graphs show that our static scheduler has no deadline violations and achieves 5.1%–17.2% lower job-level risk than the popular Earliest Time First (ETF) algorithm when the deadline constraint is 1.2×–3.0× the makespan of ETF. In the dynamic case, the proposed algorithm achieves a violation rate comparable to that of Earliest Deadline First (EDF) , an algorithm optimized for dynamic scenarios. Even when the injection rate is high, it outperforms EDF with 8.4%–10% lower risk when the deadline is 1.5×–3.0× the makespan of ETF.
APA, Harvard, Vancouver, ISO, and other styles
45

Аdiljanova, S. A., G. A. Тulepberdinova, M. J. Sakypbekova, and N. A. Тekesbayeva. "ANALYSIS OF MATHEMATICAL METHODS OF MULTI-CRITERIA OPTIMIZATION AND DYNAMIC MANAGEMENT OF CYBERSECURITY RESOURCES OF INFORMATIZATION OBJECTS." BULLETIN Series of Physics & Mathematical Sciences 72, no. 4 (September 29, 2020): 162–67. http://dx.doi.org/10.51889/2020-4.1728-7901.25.

Full text
Abstract:
The article discusses the possibility of modifying the genetic algorithm (GA) to solve the problems of selection, optimization and management of the dynamic configuration of information security means for the security chain of information and communication systems (ICS). The scientific novelty of the work lies in the fact that GA recommends using the total cost of information loss risks, as well as cost indicators for each class of information security systems as a criterion for optimizing the composition of the information security system. The genetic algorithm is considered as a kind of problem associated with multiple choice when optimizing the choice of information content of information security and solving problems of dynamic management of cybersecurity resources. In this concept, the optimization of the placement of the information security system along the security chain is considered as a modification of the combined backpack problem. The proposed approach allows not only to quickly calculate various versions of software and hardware information systems and their combinations for ICS, but also to dynamically manage the proposed algorithm with existing models and algorithms to optimize the composition of ICS cybersecurity chains and cybersecurity resources of various information objects. It is possible that such a combination of models and algorithms will quickly restore ICS protection by configuring profiles in accordance with the classes of new threats and cyber attacks.
APA, Harvard, Vancouver, ISO, and other styles
46

KHISAMOV, A. Kh. "REMOTE CONFIRMATION OF IDENTITY TO PERFORM LEGALLY SIGNIFICANT ACTIONS IN PROCEDURAL RELATIONS." Herald of Civil Procedure 12, no. 1 (April 15, 2022): 236–47. http://dx.doi.org/10.24031/2226-0781-2022-12-1-236-247.

Full text
Abstract:
The article explores current conditions for ensuring the identification of the subjects of procedural relations in their application for judicial protection, participation in the consideration of the case, as well as trends to improve the system of identification confirmation of the persons concerned in order to comply with the procedural form and exclude the abuse of right in exercising the right to judicial protection. It was found that in modern conditions of expanding forms and methods of remote participation in court proceedings, there was a strong need to improve the process of identification of the subjects of civil proceedings by supplementing the existing system of authentication, which ensures the realization of the right to judicial protection and allows to identify remote identification with personal application for judicial protection to establish the real will of the subjects of procedural relations. At the same time, the author points out that the improvement of the system of confirmation of identity of the subjects of procedural relations does not involve the imposition of additional obligations on the court to establish the identity of the participants of the proceedings, but it should be implemented by software and hardware, identifying users of information systems of electronic document management participants of legal proceedings, including through biometric personal data. At the same time, there is a need to develop regulations for the activities of court employees when using information technology in order to implement the objectives of court proceedings in the current conditions of digitalization, excluding the manifestation of contempt of court as a form of abuse of procedural rights.
APA, Harvard, Vancouver, ISO, and other styles
47

Gordova, Yuliana, Olga Herzen, Andrey Herzen, and Silvia Kostovska. "Usage of cartographic methods in place-name study (history of the problem and actual research)." InterCarto. InterGIS 27, no. 4 (2021): 520–36. http://dx.doi.org/10.35595/2414-9179-2021-4-27-520-536.

Full text
Abstract:
Cartographic methods have been used in toponymic research for many decades. The importance of these methods was noted by the founders of fundamental place-name study. This field keeps developing actively despite the considerable methodological complexity and labor intensity. Modern technologies in cartography make it possible to bring the scale and intensity of toponymic research to a new level, to solve problems that have long been identified in science. This further increases the relevance of toponymic mapping and the active introduction of other techniques into the practice of both local and regional toponymic research. The article presents the experience of creating regional toponymic maps and atlases, the general methodology and specific methodological developments of the authors in this field. The article provides examples of the latest practices of applying cartographic methods in domestic onomastics. The article presents the results of a poly-scale toponymic research in historical geography, based on the techniques of toponymic mapping in order to solve historic-geographical problems, and historic-cartographical analysis, aimed at solving toponymic problems. The geographical names of the Russian Plain and the Black Sea region serves as a rich factual data for the analysis of specific toponyms evolution. Historic-cartographical research provides invaluable data for place-name study, contributing to scientific advancement in related disciplines. Old maps serve as the most important sources of knowledge about toponymy and the formation of geographical representations in different eras. Place names are an integral part of the intangible cultural heritage, one of the most enduring and at the same time fragile. The modern desire to standardize toponymy at the national and international levels comes into conflict with the tasks of its preservation in the context of the protection of ethnocultural diversity.
APA, Harvard, Vancouver, ISO, and other styles
48

Moskovchenko, Valeriy, Mikhail Gudkov, and Oleg Lauta. "Robotechnical System for Analyzing Cyber-Security of Information Communication Systems and Networks." NBI Technologies, no. 2 (February 2018): 30–38. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.5.

Full text
Abstract:
The paper deals with the various aspects of cybernetic confrontation. The authors substantiate the urgency of creating a proactive protection management system and propose hardware and software solutions based on the development of a mobile robotic system. The paper describes the system designed to audit the stability of the network infrastructure to existing and prospective cyber threats, to its architecture and functionality. Cyber warfare marks a new level of armed confrontation. An urgent requirement of the time, taking into account the robotization of weapons and military equipment, is the revision of the principles of building automated control systems, information systems and communication networks from the viewpoint of ensuring cybersecurity. The co-evolution of the cybersecurity system should provide: the detection of new, previously unknown cyber threats (cyber attacks) during the monitoring (exploration) of cyberspace; the automatic selection of the parameters of the functioning of information systems and communication networks under the conditions of destructive effects without deterioration of their main characteristics (cognitive platforms for building information and telecommunication networks). Intelligence in cyberspace requires digital penetration into the network and control systems of a potential enemy and involves the use of completely new sources, forms and methods of data and information collection, development of new intelligence tools and technologies, tactical and technical techniques. Thus, the system of cyber security should be provided for the possibility of pre-emptive hardware and software effects (pre-emptive attacks) and active attacks on information systems and resources of the opposing side, as well as the ability to misinformation by the opposing side of the true properties and parameters of information systems and communication networks.
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Han, Krishnamurty Muralidhar, Rathindra Sarathy, and Xin (Robert) Luo. "Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation." Journal of Database Management 25, no. 2 (April 2014): 52–74. http://dx.doi.org/10.4018/jdm.2014040103.

Full text
Abstract:
Commercial organizations and government agencies that gather, store, share and disseminate data are facing increasing concerns over individual privacy and confidentiality. Confidential data is often masked in the database or prior to release to a third party, through methods such as data perturbation. In this study, re-identification risks of three major additive data perturbation techniques were compared using two different record linkage techniques. The results suggest that re-identification risk of Kim's multivariate noise addition method is similar to that of simple noise addition method. The general additive perturbation method (GADP) has the lowest re-identification risk and therefore provides the highest level of protection. The study also suggests that Fuller's method of assessing re-identification risk may be better suited than the probabilistic record-linkage method of Winkler, for numeric data. The results of this study should be help organizations and government agencies choose an appropriate additive perturbation technique.
APA, Harvard, Vancouver, ISO, and other styles
50

Haggag, Said. "Vibration analysis for predictive maintenance and improved reliability of rotating machines in ETRR-2 research reactor." Kerntechnik 87, no. 1 (February 1, 2022): 125–34. http://dx.doi.org/10.1515/kern-2020-0036.

Full text
Abstract:
Abstract In this work, both hardware and software modifications in a typical research reactor protection system (RPS) is proposed. The reactor cooling pumps are tripped based on vibrations safety signals of the pumps while the reactor SCRAM signal is initiated based on low flow rate and pressure drop across the reactor core which is a direct result of pumps trip. The main objective of this work is to develop reactor SCRAM signal based of core cooling pumps vibration signals. The early shutdown of the reactor based on pumps vibration signals is of significant importance not only in cooling the decay power of the reactor core after shutdown but also to prevent pumps failure. In the hardware model, the core cooling pumps vibration signals are feed to RPS to initiate reactor SCRAM signal. In the software model, a modular artificial neural network (ANN) is used in modeling the vibration monitoring of the research reactor (ETRR-2). The input and the output signals of the vibration transducer are used as a source data for training the neural network model. The type of the network used in this methodology is the supervised Multilayer Feed-Forward Neural Networks with the back-propagation (BP) algorithm. Vibration analysis programs are used in research reactors (RRs) to identify faults in machinery, plan machinery repairs, and keep machinery functioning for as long as possible without failure. The vibration severity limits are determined based on the International Organization for Standardization (ISO) 10816. The ANNs were designed using two different methods; one is by using hardware application contained two out of three voting and dynamic modules for trip signal by using ANNs. The current model classifies the vibration signals into five ranges low, good, satisfactory, unsatisfactory, and unacceptable vibration. The ANN is trained to detect the signal and vote to take the correct and safe action. The results demonstrate that the ANN can help in taking predictive actions for the safe core coolant pumps operation.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography