scholarly journals The possibilities of ensuring the security of the software product in the conditions of unauthorized access

2021 ◽  
Vol 189 (5-6(1)) ◽  
pp. 90-100
Author(s):  
Anton Dziatkovskii ◽  
◽  
Uladzimir Hryneuski ◽  

Ensuring the security of a software product in the conditions of large companies, taking into account confidential financial and corporate data, is quite an urgent topic in 2021-2023. Over the past year, the number of leaks of confidential information reached a historic peak, together with cyber attacks, and amounts to 114 identified cases. In modern conditions, software security testing is aimed at identifying security errors and design flaws at all stages of the software development lifecycle. At the same time, at the design stage, this type of work should be provided in order to facilitate the implementation of these characteristics in the final version of the security-related system. Research has shown that there is a wide range of opportunities for developing and using security testing software. These options may differ in implementation technologies, cost and other tactical and technical indicators, characteristics of individual elements, and so on. The main task of developing a software security testing method is to develop, improve and select models, methods and tools that belong to a subset and provide maximum software security indicators. Our approach allows us to prevent any penetration into the information system, while maintaining 100% security of confidential files and the system as a whole. The threat prevention model works with the help of proactive technology, and if you calculate the economic effect of these measures, it can be different, depending on the value of the enterprise’s information itself, and can also be calculated in millions of US dollars. The reliability of the results of mathematical modelling of technologies for creating and implementing «penetration testing» tools is evaluated. The experimental results showed that for all the studied data types, the confidence probability that the value of the statistical value «does not deviate» from the mathematical expectation by more than 1 is 0.94.

Author(s):  
N.G. Evdokimova ◽  
◽  
N.N. Luneva ◽  
T.M. Levina ◽  
M.E. Luneva ◽  
...  

The economic basis of market relations between business entities and objects is the planning of activities, which provides the necessary balance between production and consumption of products, demand for goods and supply volumes by the enterprise at the macroeconomic level. At the enterprise, playing acts as an optimizer for the production of high-quality products based on efficient and rational use of resources. In management practice, a special place is occupied by internal planning, which is considered as a system of interconnected long-term, medium-term and short-term plans that determine the strategy of the company as a whole, as well as the goals of functioning, the forecast of the development of internal and external factors and resources of the enterprise. One of the main types of planning in the organization is production planning, which is widely used at petrochemical and oil refining enterprises and, in particular, at Gazprom Neftekhim Salavat LLC. The technological features of oil refining and petrochemical enterprises have a great influence on the process of production planning: the multivariance and complexity of technological processes, a wide range of products; large production capacities and technological installations; high material and energy intensity; a significant share of raw materials in the cost of production. Therefore, the processes of modeling and optimization in internal planning are impossible without the effective use of software and information support. This justifies the relevance and need to optimize production planning and increase the effectiveness of its management. The article discusses the practice of production planning at LLC Gazprom Neftekhim Salavat. At the enterprise, the planning process for the processing of raw materials and production is carried out using the Aspen PIMS software product, which allows us to calculate the optimal version of the production plan and ensures the maximum marginal profit of the enterprise. The principles of operation of the Aspen PIMS module are considered; production tasks solved with the help of this software. The basic structure of the construction of the planning process at LLC Gazprom Neftekhim Salavat is given. The use of a specialized planning software product in combination with production modeling tools allows to obtain a significant economic effect.


2021 ◽  
Vol 11 (18) ◽  
pp. 8383 ◽  
Author(s):  
Muaadh A. Alsoufi ◽  
Shukor Razak ◽  
Maheyzah Md Siraj ◽  
Ibtehal Nafea ◽  
Fuad A. Ghaleb ◽  
...  

The Internet of Things (IoT) concept has emerged to improve people’s lives by providing a wide range of smart and connected devices and applications in several domains, such as green IoT-based agriculture, smart farming, smart homes, smart transportation, smart health, smart grid, smart cities, and smart environment. However, IoT devices are at risk of cyber attacks. The use of deep learning techniques has been adequately adopted by researchers as a solution in securing the IoT environment. Deep learning has also successfully been implemented in various fields, proving its superiority in tackling intrusion detection attacks. Due to the limitation of signature-based detection for unknown attacks, the anomaly-based Intrusion Detection System (IDS) gains advantages to detect zero-day attacks. In this paper, a systematic literature review (SLR) is presented to analyze the existing published literature regarding anomaly-based intrusion detection, using deep learning techniques in securing IoT environments. Data from the published studies were retrieved from five databases (IEEE Xplore, Scopus, Web of Science, Science Direct, and MDPI). Out of 2116 identified records, 26 relevant studies were selected to answer the research questions. This review has explored seven deep learning techniques practiced in IoT security, and the results showed their effectiveness in dealing with security challenges in the IoT ecosystem. It is also found that supervised deep learning techniques offer better performance, compared to unsupervised and semi-supervised learning. This analysis provides an insight into how the use of data types and learning methods will affect the performance of deep learning techniques for further contribution to enhancing a novel model for anomaly intrusion detection and prediction.


Author(s):  
Gary Sutlieff ◽  
Lucy Berthoud ◽  
Mark Stinchcombe

Abstract CBRN (Chemical, Biological, Radiological, and Nuclear) threats are becoming more prevalent, as more entities gain access to modern weapons and industrial technologies and chemicals. This has produced a need for improvements to modelling, detection, and monitoring of these events. While there are currently no dedicated satellites for CBRN purposes, there are a wide range of possibilities for satellite data to contribute to this field, from atmospheric composition and chemical detection to cloud cover, land mapping, and surface property measurements. This study looks at currently available satellite data, including meteorological data such as wind and cloud profiles, surface properties like temperature and humidity, chemical detection, and sounding. Results of this survey revealed several gaps in the available data, particularly concerning biological and radiological detection. The results also suggest that publicly available satellite data largely does not meet the requirements of spatial resolution, coverage, and latency that CBRN detection requires, outside of providing terrain use and building height data for constructing models. Lastly, the study evaluates upcoming instruments, platforms, and satellite technologies to gauge the impact these developments will have in the near future. Improvements in spatial and temporal resolution as well as latency are already becoming possible, and new instruments will fill in the gaps in detection by imaging a wider range of chemicals and other agents and by collecting new data types. This study shows that with developments coming within the next decade, satellites should begin to provide valuable augmentations to CBRN event detection and monitoring. Article Highlights There is a wide range of existing satellite data in fields that are of interest to CBRN detection and monitoring. The data is mostly of insufficient quality (resolution or latency) for the demanding requirements of CBRN modelling for incident control. Future technologies and platforms will improve resolution and latency, making satellite data more viable in the CBRN management field


Author(s):  
Michele Righi ◽  
Giacomo Moretti ◽  
David Forehand ◽  
Lorenzo Agostini ◽  
Rocco Vertechy ◽  
...  

AbstractDielectric elastomer generators (DEGs) are a promising option for the implementation of affordable and reliable sea wave energy converters (WECs), as they show considerable promise in replacing expensive and inefficient power take-off systems with cheap direct-drive generators. This paper introduces a concept of a pressure differential wave energy converter, equipped with a DEG power take-off operating in direct contact with sea water. The device consists of a closed submerged air chamber, with a fluid-directing duct and a deformable DEG power take-off mounted on its top surface. The DEG is cyclically deformed by wave-induced pressure, thus acting both as the power take-off and as a deformable interface with the waves. This layout allows the partial balancing of the stiffness due to the DEG’s elasticity with the negative hydrostatic stiffness contribution associated with the displacement of the water column on top of the DEG. This feature makes it possible to design devices in which the DEG exhibits large deformations over a wide range of excitation frequencies, potentially achieving large power capture in a wide range of sea states. We propose a modelling approach for the system that relies on potential-flow theory and electroelasticity theory. This model makes it possible to predict the system dynamic response in different operational conditions and it is computationally efficient to perform iterative and repeated simulations, which are required at the design stage of a new WEC. We performed tests on a small-scale prototype in a wave tank with the aim of investigating the fluid–structure interaction between the DEG membrane and the waves in dynamical conditions and validating the numerical model. The experimental results proved that the device exhibits large deformations of the DEG power take-off over a broad range of monochromatic and panchromatic sea states. The proposed model demonstrates good agreement with the experimental data, hence proving its suitability and effectiveness as a design and prediction tool.


Author(s):  
I Bridle ◽  
S R Woodhead

Degradation of bulk solid product during pneumatic conveying is of concern in a range of process industries. However, prediction of product degradation levels at the conveyor design stage has proved challenging. This paper presents a proposed prediction technique, based on the use of a pilot-sized test facility to provide relevant empirical data. The results of experiments undertaken using malted barley, basmati rice, and granulated sugar are reported. For each bulk solid material, a wide range of conveying conditions have been examined, consistent with common industrial practice. Correlations between predictions and experimental data obtained in an industrial-scale conveyor are presented and discussed.


Entropy ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. 854
Author(s):  
Nevena Rankovic ◽  
Dragica Rankovic ◽  
Mirjana Ivanovic ◽  
Ljubomir Lazic

Software estimation involves meeting a huge number of different requirements, such as resource allocation, cost estimation, effort estimation, time estimation, and the changing demands of software product customers. Numerous estimation models try to solve these problems. In our experiment, a clustering method of input values to mitigate the heterogeneous nature of selected projects was used. Additionally, homogeneity of the data was achieved with the fuzzification method, and we proposed two different activation functions inside a hidden layer, during the construction of artificial neural networks (ANNs). In this research, we present an experiment that uses two different architectures of ANNs, based on Taguchi’s orthogonal vector plans, to satisfy the set conditions, with additional methods and criteria for validation of the proposed model, in this approach. The aim of this paper is the comparative analysis of the obtained results of mean magnitude relative error (MMRE) values. At the same time, our goal is also to find a relatively simple architecture that minimizes the error value while covering a wide range of different software projects. For this purpose, six different datasets are divided into four chosen clusters. The obtained results show that the estimation of diverse projects by dividing them into clusters can contribute to an efficient, reliable, and accurate software product assessment. The contribution of this paper is in the discovered solution that enables the execution of a small number of iterations, which reduces the execution time and achieves the minimum error.


2020 ◽  
Vol 8 ◽  
Author(s):  
Devasis Bassu ◽  
Peter W. Jones ◽  
Linda Ness ◽  
David Shallcross

Abstract In this paper, we present a theoretical foundation for a representation of a data set as a measure in a very large hierarchically parametrized family of positive measures, whose parameters can be computed explicitly (rather than estimated by optimization), and illustrate its applicability to a wide range of data types. The preprocessing step then consists of representing data sets as simple measures. The theoretical foundation consists of a dyadic product formula representation lemma, and a visualization theorem. We also define an additive multiscale noise model that can be used to sample from dyadic measures and a more general multiplicative multiscale noise model that can be used to perturb continuous functions, Borel measures, and dyadic measures. The first two results are based on theorems in [15, 3, 1]. The representation uses the very simple concept of a dyadic tree and hence is widely applicable, easily understood, and easily computed. Since the data sample is represented as a measure, subsequent analysis can exploit statistical and measure theoretic concepts and theories. Because the representation uses the very simple concept of a dyadic tree defined on the universe of a data set, and the parameters are simply and explicitly computable and easily interpretable and visualizable, we hope that this approach will be broadly useful to mathematicians, statisticians, and computer scientists who are intrigued by or involved in data science, including its mathematical foundations.


2018 ◽  
Vol 20 (3(68)) ◽  
pp. 107-114
Author(s):  
К.O. KOSTETSKA

Topicality. All relationships in the field of nature use begin with the legislative framework on the protection of nature and its individual components, which defines the functions of the state regulating environmental activities, as well as defined rights and responsibilities of environmental users. In most developed countries, it is a law on nature conservation or environmental acts that establishes the general principles and objectives of a policy designed to ensure the conceptual uniformity and integrity of all legislative practice in the use, protection and restoration of natural resources. System and methods of administrative management in using natural resources are based on: system of legislative acts of the country and the region; a system of normative-directive and methodological (obligatory to use) documents of state bodies; system of plans, programs, projects, tasks; operational management system. Aim and tasks. The purpose of the article is to justify institutional reforms in order to ensure the implementation of environmental legislation, the division of powers of environmental authorities at the national, regional and municipal levels on the procedure for decision-making and its implementation. Research results. The lack of coordination control functions using natural resources, namely the lack of a horizontal connection between the supervisory authorities, leads to the fact that many bodies control the same natural resource. First of all, the uncontrolled tourism activity with the use of recreational resources is observed. Thus, the main task of the state administration should be to assess the quantitative and qualitative equivalents of existing and potential natural resources and determine the strategic directions of their management, their use and protection by business entities and households. In this case, it is necessary to determine with which mechanisms to achieve the optimal use of recreational and tourist resources while minimizing environmental damage, minimizing costs and maximizing the social, economic and environmental effects of their use.Conclusions. Taking into account the economic effect that the country can have, it is expedient to take into account not only the economic potential of the recreational and tourist territory, but also the development of alternative activities on it. Control the enterprises located in this territory and conduct their economic activity with the use or extraction and subsequent resale of the recreational resource. Principal is the redistribution of taxes from economic activity to the restoration of recreational resources at the urban level. It is necessary to provide methodological explanations regarding tax provisions and benefits to enterprises involved in this process, taking into account the status of the territory in which the recreation process has arisen, taking into account the medical characteristics of the territory and the extraction of natural resources in this territory.


Planta ◽  
2022 ◽  
Vol 255 (2) ◽  
Author(s):  
Nicholas Gladman ◽  
Andrew Olson ◽  
Sharon Wei ◽  
Kapeel Chougule ◽  
Zhenyuan Lu ◽  
...  

Abstract Main conclusion SorghumBase provides a community portal that integrates genetic, genomic, and breeding resources for sorghum germplasm improvement. Abstract Public research and development in agriculture rely on proper data and resource sharing within stakeholder communities. For plant breeders, agronomists, molecular biologists, geneticists, and bioinformaticians, centralizing desirable data into a user-friendly hub for crop systems is essential for successful collaborations and breakthroughs in germplasm development. Here, we present the SorghumBase web portal (https://www.sorghumbase.org), a resource for the sorghum research community. SorghumBase hosts a wide range of sorghum genomic information in a modular framework, built with open-source software, to provide a sustainable platform. This initial release of SorghumBase includes: (1) five sorghum reference genome assemblies in a pan-genome browser; (2) genetic variant information for natural diversity panels and ethyl methanesulfonate (EMS)-induced mutant populations; (3) search interface and integrated views of various data types; (4) links supporting interconnectivity with other repositories including genebank, QTL, and gene expression databases; and (5) a content management system to support access to community news and training materials. SorghumBase offers sorghum investigators improved data collation and access that will facilitate the growth of a robust research community to support genomics-assisted breeding.


Sign in / Sign up

Export Citation Format

Share Document