Increasing information security of a communication system with OFDM based on a discrete-nonlinear Duffing system with dynamic chaos

Author(s):  
Ilyas Gainutdinov ◽  
Sergey Loginov
2012 ◽  
Vol 160 ◽  
pp. 297-300
Author(s):  
Cong Chen

The ubiquitous network and it provides the high quality wireless service, all depends on the wireless communication system network security level. Safety algorithm for wireless communication system constructed in different network reliability. In this paper, based on the wireless communication system to study on information security technology, as the development of information security provides a theoretical basis.


2021 ◽  
Author(s):  
Lenin Leines-Vite ◽  
Juan Carlos Pérez-Arriaga ◽  
Xavier Limón

The microservices architecture tries to deal with the challenges posed by distributed systems, such as scalability, availability, and system deployment; by means of highly cohesive, heterogeneous, and independent microservices. However, this architecture also brings new security challenges related to communication, system design, development, and operation. The literature contains spread information regarding security related solutions for microservicesbased systems, but this spread makes difficult for practitioners to adopt novel security related solutions. In this study, we aim to present a catalogue of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, also considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 71 security solutions for the communication of microservices.


Author(s):  
Albert Malikov ◽  
Vladimir Avramenko ◽  
Igor Saenko

Introduction: Models and methods for diagnosing computer incidents recorded in information and communication systems are the most important components in mathematical support of information security systems. The main requirement for the diagnostics is prompt identification of security violation characteristics. This problem is complicated due to the amount and variability of the initial data on information security violation. Purpose: Development of a model for diagnosing a computer incident, along with a method which would allow you to quickly determine the characteristics of a security violation. Results: Security breach characteristics important for making a decision about responding to an identified computer incident can be determined via deep artificial neural networks. A structural feature of the proposed deep artificial neural network is combining the coding part of the autoencoder and a multilayer perceptron. In addition, the method implements a parallel mode of processing information events which have occurred in the information and communication system before the incident was detected, by using a separate proposed artificial neural network for each secondary characteristic of the security breach. The method of determining the values of these secondary characteristics allows you to greatly improve the diagnostics efficiency, having acceptable values of precision and recall for the security violation characteristics to determine. The dependence has been studied of the completeness and classification accuracy on the number of neurons in the hidden layer. A sufficient number of neurons in the hidden layer for achieving the required training efficiency is experimentally determined. Practical relevance: The developed model and method can be implemented using standard software and hardware (servers) of an information and communication system. Their combined use with the existing models and methods of monitoring and diagnostics can significantly improve the efficiency of an information security system.


Author(s):  
Sergei Morozov

Introduction. The article represents the author’s interpretation of the actor composition of implementing information policy in modern Russia. Special attention is paid to the analysis of the main conditions of interaction between state and non-state structures of the Russian Federation in the process of determining priorities and strategies for ensuring information security in Russia. The problem of this research is actualized by increasing dependence of the mass communication domestic system on modern global geopolitical threats and foreign policy challenges. Russia and Russian society need a set of effective tools and methods to ensure the security and stability of the mass communication system. Methodology and methods. The main methodology of this study is the principles of the communicative approach (N. Wiener, C. Deutsch). Besides, the ideas about the technological core of political communication find their scientific and practical application (S.V. Volodenkov, M. Castells, S.V. Schwarzenberg). The analysis of the combination of public political communication and the processes of administrative-state management is based on the conclusions, which are contained in the articles of G. Lassuela and O.F. Shabrov. The empirical basis of the research is the public opinion polls of “Levada Center”. Analysis. The modern world is increasingly differentiated by the degree of information richness: the more the country is informationally open, the faster the production of new ideas, their inclusion in political decisions. The modern process of political communication has shifted to greater interactivity. Information policy, political regulation of the mass communication system becomes the leading sphere of management activities of state and non-state structures. Discussion. The indicative model development of politicalcommunicative interaction of information policy actors in the Russian Federation is hampered by a number of problems. Some of them are associated with established practices of political administration by state institutions of information processes. Other problems come from the unwillingness of civil structures to carry out the functions of public political management in the field of information security. The result is a decline in public confidence in political information and the Russian media. Results. The author proposes the main forms of coordinated interaction of state and non-state actors in the field of information regulation, ensuring the information security of the Russian Federation. The researcher substantiates the idea of the relationship of the mass communication system development with the formation of information and communication competencies of the Russian Federation population.


2014 ◽  
Vol 23 (2) ◽  
pp. 104-111 ◽  
Author(s):  
Mary Ann Abbott ◽  
Debby McBride

The purpose of this article is to outline a decision-making process and highlight which portions of the augmentative and alternative communication (AAC) evaluation process deserve special attention when deciding which features are required for a communication system in order to provide optimal benefit for the user. The clinician then will be able to use a feature-match approach as part of the decision-making process to determine whether mobile technology or a dedicated device is the best choice for communication. The term mobile technology will be used to describe off-the-shelf, commercially available, tablet-style devices like an iPhone®, iPod Touch®, iPad®, and Android® or Windows® tablet.


1982 ◽  
Vol 47 (4) ◽  
pp. 373-375 ◽  
Author(s):  
James L. Fitch ◽  
Thomas F. Williams ◽  
Josephine E. Etienne

The critical need to identify children with hearing loss and provide treatment at the earliest possible age has become increasingly apparent in recent years (Northern & Downs, 1978). Reduction of the auditory signal during the critical language-learning period can severely limit the child's potential for developing a complete, effective communication system. Identification and treatment of children having handicapping conditions at an early age has gained impetus through the Handicapped Children's Early Education Program (HCEEP) projects funded by the Bureau of Education for the Handicapped (BEH).


Sign in / Sign up

Export Citation Format

Share Document