Propositions for ensuring the information security in the common ukrainian satellite system of information transmission

1998 ◽  
Vol 4 (5-6) ◽  
pp. 62-66
Author(s):  
I.D. Gorbenko ◽  
◽  
Yu.V. Stasev ◽  
A.V. Pot ◽  
A.M. Tkachev ◽  
...  
2017 ◽  
Vol 2017 ◽  
pp. 1-8 ◽  
Author(s):  
Silvia Battistoni ◽  
Victor Erokhin ◽  
Salvatore Iannotta

We explore and demonstrate the extension of the synapse-mimicking properties of memristive devices to a dysfunctional synapse as it occurs in the Alzheimer’s disease (AD) pathology. The ability of memristive devices to reproduce synapse properties such as LTP, LTD, and STDP has been already widely demonstrated, and moreover, they were used for developing artificial neuron networks (perceptrons) able to simulate the information transmission in a cell network. However, a major progress would be to extend the common sense of neuromorphic device even to the case of dysfunction of natural synapses. Can memristors efficiently simulate them? We provide here evidences of the ability of emulating the dysfunctional synaptic behavior typical of the AD pathology with organic memristive devices considering the effect of the disease not only on a single synapse but also in the case of a neural network, composed by numerous synapses.


Author(s):  
Randy L. Burkhead

In today's culture organizations have come to expect that information security incidents and breaches are no longer a matter of if but when. This shifting paradigm has brought increased attention, not to the defenses in place to prevent an incident but, to how companies manage the aftermath. Using a phenomenological model, organizations can reconstruct events focused on the human aspects of security with forensic technology providing supporting information. This can be achieved by conducting an after action review for incidents using a phenomenological model. Through this approach the researcher can discover the common incident management cycle attributes and how these attributes have been applied in the organization. An interview guide and six steps are presented to accomplish this type of review. By understanding what happened, how it happened, and why it happened during incident response, organizations can turn their moment of weakness into a pillar of strength.


Author(s):  
Randy L. Burkhead

In today's culture organizations have come to expect that information security incidents and breaches are no longer a matter of if but when. This shifting paradigm has brought increased attention, not to the defenses in place to prevent an incident but, to how companies manage the aftermath. Using a phenomenological model, organizations can reconstruct events focused on the human aspects of security with forensic technology providing supporting information. This can be achieved by conducting an after action review for incidents using a phenomenological model. Through this approach the researcher can discover the common incident management cycle attributes and how these attributes have been applied in the organization. An interview guide and six steps are presented to accomplish this type of review. By understanding what happened, how it happened, and why it happened during incident response, organizations can turn their moment of weakness into a pillar of strength.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2779 ◽  
Author(s):  
Jérôme Leclère ◽  
René Landry Jr. ◽  
Cyril Botteron

Nowadays, civil Global Navigation Satellite System (GNSS) signals are available in both L1 and L5 bands. A receiver does not need to acquire independently the signals in both bands coming from a same satellite, since their carrier Doppler and code delay are closely related. Therefore, the question of which one to acquire first rises naturally. Although the common thought would tell the L1 band signals which are narrowband, an accurate comparison has never been done, and the decision is not as easy as it seems. Indeed, L5 band signals have several advantages such as stronger power, lower carrier Doppler, or a pilot channel, unlike the Global Positioning System (GPS) L1 C/A signal. The goal of this paper is therefore to compare the acquisition of L1 and L5 bands signals (GPS L1 C/A and L5, Galileo E1 and E5a/b) to determine which one is more complex and by which factor, in terms of processing time and memory, considering hardware receivers and the parallel code search. The results show that overall the L5 band signals are more complex to acquire, but it depends strongly on the conditions. The E5 signal is always more complex to acquire than E1, while the L5 signal can have a complexity close to the L1 C/A in some cases. Moreover, precise assistance providing accurate Doppler could significantly reduce the L5 complexity below the L1 complexity.


2012 ◽  
Vol 532-533 ◽  
pp. 1230-1234 ◽  
Author(s):  
Xiao Le Li ◽  
Yong Jun Luo ◽  
Yu Liang ◽  
Ying Wen

This paper mainly studies application of formal design for security protocols in digital campus. With a comprehensive analysis on security requirements of information transmission in digital campus, an information transmission model is built from the viewpoint of information security. Based on this model, a new security protocol, called DCIT for short, is designed. The formal analysis shows that secrecy, integrity, availability, controllability, non-repudiation and identifiability of information during transmission could be insured by DCIT, which could be used as a direction for development of various application systems in digital campus, from the viewpoint of information security.


2013 ◽  
Vol 30 (3) ◽  
pp. 199-209
Author(s):  
Begüm Serim-Yıldız ◽  
Özgür Erdur-Baker ◽  
Aslı Bugay

The present study aimed to investigate the common fears and their origins among children and adolescents from different age, gender, and socioeconomic levels (SES). The sample was comprised of 642 females (48.8%) and 673 males (51.2%) with a total of 1,315 participants aged between 8 and 18 (M = 13.15; SD = 3.18). The Fear interview was utilised to examine the common fears and the role of conditioning, modelling and negative information in the development of children's fears. The result showed that the most common fear in Turkey was ‘God’, followed by ‘losing my friends’ and ‘going to Hell’. In addition, the findings revealed that Turkish students are more likely to learn fears by modelling rather than negative information transmission and conditioning. The results also indicated that negative information transmission had a more intensifying effect on the children and adolescents’ existing fear rather than modelling and conditioning. Furthermore, multinomial logistic regression was conducted to examine the effects of age, gender and SES on the origins of fear. Results showed that age and gender were significant predictors of origins of fear.


Energies ◽  
2020 ◽  
Vol 13 (4) ◽  
pp. 881 ◽  
Author(s):  
Zilong Zeng ◽  
Yong Li ◽  
Yijia Cao ◽  
Yirui Zhao ◽  
Junjie Zhong ◽  
...  

In order to ensure the information security, most of the important information including the data of advanced metering infrastructure (AMI) in the energy internet is currently transmitted and exchanged through the intranet or the carrier communication. The former increases the cost of network construction, and the latter is susceptible to interference and attacks in the process of information dissemination. The blockchain is an emerging decentralized architecture and distributed computing paradigm. Under the premise that these nodes do not need mutual trust, the blockchain can implement trusted peer-to-peer communication for protecting the important information by adopting distributed consensus mechanisms, encryption algorithms, point-to-point transmission and smart contracts. In response to the above issues, this paper firstly analyzes the information security problems existing in the energy internet from the four perspectives of system control layer, device access, market transaction and user privacy. Then blockchain technology is introduced, and its working principles and technical characteristics are analyzed. Based on the technical characteristics, we propose the multilevel and multichain information transmission model for the weak centralization of scheduling and the decentralization of transaction. Furthermore, we discuss that the information transmission model helps solve some of the information security issues from the four perspectives of system control, device access, market transaction and user privacy. Application examples are used to illustrate the technical features that benefited from the blockchain for the information security of the energy internet.


Entropy ◽  
2021 ◽  
Vol 23 (6) ◽  
pp. 658
Author(s):  
Piotr Kiedrowski

Changing the construction of mart Meter (SM) devices, more specifically equipping them with more than one communication module, facilitates the elimination of a Transformer Station Data Concentrator (TSC) module, moving its function to one of the SMs. The opportunity to equip a chosen device in an additional communication module makes it possible to use it as an acquisition node. The introduction of this solution creates a problem with the optimum selection of the above-mentioned node out of all the nodes of the analyzed network. This paper suggests the criterion of its location and, as per the criterion, the way of conduct using the elements of the graph theory. The discussion is illustrated with the examples of the possibility to use the method for the optimization of the architecture of the network. The described method makes it possible to choose the location of a backup acquisition node as well as locate intermediary nodes (signal repeaters) in case of a failure (removal) of some SM devices. In the era of the common introduction of dispersed telemetric systems requiring an adequate level of performance and reliability of information transmission, the offered method can be used for the optimization of the structures of Smart Grids.


2014 ◽  
Vol 494-495 ◽  
pp. 210-213
Author(s):  
Zhi Peng Song

For the problem of the vehicle parts monitoring in the internet of vehicle, the service technology is proposed to access the detail components through the common gateway interface technology. The information transmission is managed using the common gateway interface and interface parts for docking, and the monitoring of detail parts is made by the bus integration monitoring. IPv6 virtual network address information transmission is used to avoid the hidden dangers of IPv4 address depletion, and the virtual and independent IPv6 address is transferred with the part number in the common gateway interface to achieve a wide geographical access. In order to achieve real-time information exchange and robustness, the real-time transport protocol and real-time transport control protocol is used to assure smaller transmission delay and less packet loss rate. The test results show that the average response time is no more than 85 nanoseconds and the accuracy of information transfer is not less than 98.2%, and the results meets the needs of the most environmental, and the program is viable in practice.


2021 ◽  
Vol 5 (1) ◽  
pp. 44-50
Author(s):  
N. V. Leonidov

The purpose of this article is to analyze the existing algorithms of autonomous control of the integrity of the navigation field of the GLONASS system. The analysis is based on domestic materials and official foreign applications. At the beginning of the article, the concept of the integrity of the global navigation satellite system is given in the form in which it is used in International Civil Aviation Organization and among the developers of such systems. The differences between the common types of control of the integrity of the navigation field are shown. The modeling of individual operational characteristics, including the average geometric factor, visibility, and accessibility for different angles of the site, is carried out. The main solutions to the problem of reduced tactical and technical characteristics of the system are compared. The existing prerequisites for the improvement of the GLONASS system and for the use of small navigation spacecraft to eliminate the gap between GLONASS and competing global navigation satellite systems are listed. As a result, a variant of improving the circumstances for the application of these algorithms in unfavorable conditions in relation to the GLONASS system is proposed. It is shown that the low-orbit addition to the GLONASS system can significantly improve the tactical and technical characteristics of the complex as a whole and provide higher reliability of the system as a whole due to the operational maintenance of the integrity of the navigation field.


Sign in / Sign up

Export Citation Format

Share Document