Survey on Security Systems in Underwater Communications Systems

Author(s):  
S. Prem Kumar Deepak ◽  
M. B. Mukesh Krishnan
Author(s):  
D. J. Sullivan ◽  
S. Labby ◽  
A. Koptelov ◽  
S. L. Sullivan

The purpose of this mixed methods study was to determine the barriers that special educator teachers encounter when using iPads within the Life Skills classroom. The research investigates the experiences, frustrations, and barriers through educators’ perceptions of iPad implementation. The influence of these issues suggests why iPad usage is not a device that special education classrooms are using in a widespread daily manner. Exploration of iPads as an educational tool and as a communication device is also discussed, along with considerations of other communications systems such as Picture Exchange Communication Systems and Alternative and Augmented Communication Devices is considered. Recommendations for further possible research are also discussed.


2017 ◽  
Vol 5 (1) ◽  
pp. 8-15
Author(s):  
Sergii Hilgurt ◽  

The multi-pattern matching is a fundamental technique found in applications like a network intrusion detection system, anti-virus, anti-worms and other signature- based information security tools. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore’s law, traditional software solutions can no longer keep up. Therefore, hardware approaches are frequently being used by developers to accelerate pattern matching. Reconfigurable FPGA-based devices, providing the flexibility of software and the near-ASIC performance, have become increasingly popular for this purpose. Hence, increasing the efficiency of reconfigurable information security tools is a scientific issue now. Many different approaches to constructing hardware matching circuits on FPGAs are known. The most widely used of them are based on discrete comparators, hash-functions and finite automata. Each approach possesses its own pros and cons. None of them still became the leading one. In this paper, a method to combine several different approaches to enforce their advantages has been developed. An analytical technique to quickly advance estimate the resource costs of each matching scheme without need to compile FPGA project has been proposed. It allows to apply optimization procedures to near-optimally split the set of pattern between different approaches in acceptable time.


2020 ◽  
Vol 16 (6) ◽  
pp. 998-1012
Author(s):  
G.V. Fedotova ◽  
D.D. Tkachenko

Subject. The article discusses the modeling of preventive protection of IT systems and evaluates their cyber resilience. Objectives. The study evaluates the existing threats and determines how informatization processes may unfold in the credit segment. Methods. Research is based on methods of regulatory and legislative analysis. We evaluate today’s public administration of cybersecurity in the financial and credit sector. To give a view of the existing situation and sum up the sector’s performance for the recent years, we performed the content analysis of statistics on data hacking and leakages. Results. The article highlights new trends in the financial and credit sector and the growing complexity of data security systems. As proposed by the Bank of Russia, the integration of smart technologies is showed to reinforce the cybersecurity of banking systems. Conclusions and Relevance. The informatization of all banking operation systems, growing complexity of procedures and work logs require new robust resources to be integrated into financial technologies. Stronger cybersecurity should lay a trend in the financial and credit sector in the nearest future. The findings can be used to flag strategic milestones of the banking development in the information-driven society.


1980 ◽  
Author(s):  
M. ROSS ◽  
J. WOLF ◽  
R. LINFORD ◽  
J. ABERNATHY

Sign in / Sign up

Export Citation Format

Share Document