Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Information Network" wg kryterium: Temat


Wyświetlanie 1-8 z 8
Tytuł:
MoveSteg : A Method of Network Steganography Detection
Autorzy:
Szczypiorski, K.
Tyl, T.
Powiązania:
https://bibliotekanauki.pl/articles/226603.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network steganography
information
hiding network
detection of new attacks
Opis:
This article presents a new method for detecting a source point of time based network steganography - MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography stream in network that is under our management.
Źródło:
International Journal of Electronics and Telecommunications; 2016, 62, 4; 335-341
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cognitive Modeling and Formation of the Knowledge Base of the Information System for Assessing the Rating of Enterprises
Autorzy:
Kryvoruchko, Olena
Desiatko, Alona
Karpunin, Igor
Hnatchenko, Dmytro
Lakhno, Myroslav
Malikova, Feruza
Turdaliev, Ayezhan
Powiązania:
https://bibliotekanauki.pl/articles/27311936.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
information security
audit
Bayesian network
artificial neural networks
Opis:
A mathematical model is proposed that makes it possible to describe in a conceptual and functional aspect the formation and application of a knowledge base (KB) for an intelligent information system (IIS). This IIS is developed to assess the financial condition (FC) of the company. Moreover, for circumstances related to the identification of individual weakly structured factors (signs). The proposed model makes it possible to increase the understanding of the analyzed economic processes related to the company's financial system. An iterative algorithm for IIS has been developed that implements a model of cognitive modeling. The scientific novelty of the proposed approach lies in the fact that, unlike existing solutions, it is possible to adjust the structure of the algorithm depending on the characteristics of a particular company, as well as form the information basis for the process of assessing the company's FC and the parameters of the cognitive model.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 4; 697--705
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Automation of Information Security Risk Assessment
Autorzy:
Akhmetov, Berik
Lakhno, Valerii
Chubaievskyi, Vitalyi
Kaminskyi, Serhii
Adilzhanova, Saltanat
Ydyryshbayeva, Moldir
Powiązania:
https://bibliotekanauki.pl/articles/2124744.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
information security
audit
Bayesian network
artificial neural networks
Opis:
An information security audit method (ISA) for a distributed computer network (DCN) of an informatization object (OBI) has been developed. Proposed method is based on the ISA procedures automation by using Bayesian networks (BN) and artificial neural networks (ANN) to assess the risks. It was shown that such a combination of BN and ANN makes it possible to quickly determine the actual risks for OBI information security (IS). At the same time, data from sensors of various hardware and software information security means (ISM) in the OBI DCS segments are used as the initial information. It was shown that the automation of ISA procedures based on the use of BN and ANN allows the DCN IS administrator to respond dynamically to threats in a real time manner, to promptly select effective countermeasures to protect the DCS.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 3; 549--555
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Grid Fault Diagnosis Based on Information Entropy and Multi-source Information Fusion
Autorzy:
Zeng, Xin
Xiong, Xingzhong
Luo, Zhongqiang
Powiązania:
https://bibliotekanauki.pl/articles/1844639.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
information entropy
Bayesian network
multi-source information fusion
D-S evidence theory
fault diagnosis
Opis:
In order to solve the problem of misjudgment caused by the traditional power grid fault diagnosis methods, a new fusion diagnosis method is proposed based on the theory of multi-source information fusion. In this method, the fault degree of the power element is deduced by using the Bayesian network. Then, the time-domain singular spectrum entropy, frequency-domain power spectrum entropy and wavelet packet energy spectrum entropy of the electrical signals of each circuit after the failure are extracted, and these three characteristic quantities are taken as the fault support degree of the power components. Finally, the four fault degrees are normalized and classified as four evidence bodies in the D-S evidence theory for multi-feature fusion, which reduces the uncertainty brought by a single feature body. Simulation results show that the proposed method can obtain more reliable diagnosis results compared with the traditional methods.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 2; 143-148
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Detecting objects using Rolling Convolution and Recurrent Neural Network
Autorzy:
Huang, WenQing
Huang, MingZhu
Wang, YaMing
Powiązania:
https://bibliotekanauki.pl/articles/226942.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
multi-scale features
global context information
rolling convolution
recurrent neural network
Opis:
At present, most of the existing target detection algorithms use the method of region proposal to search for the target in the image. The most effective regional proposal method usually requires thousands of target prediction areas to achieve high recall rate.This lowers the detection efficiency. Even though recent region proposal network approach have yielded good results by using hundreds of proposals, it still faces the challenge when applied to small objects and precise locations. This is mainly because these approaches use coarse feature. Therefore, we propose a new method for extracting more efficient global features and multi-scale features to provide target detection performance. Given that feature maps under continuous convolution lose the resolution required to detect small objects when obtaining deeper semantic information; hence, we use rolling convolution (RC) to maintain the high resolution of low-level feature maps to explore objects in greater detail, even if there is no structure dedicated to combining the features of multiple convolutional layers. Furthermore, we use a recurrent neural network of multiple gated recurrent units (GRUs) at the top of the convolutional layer to highlight useful global context locations for assisting in the detection of objects. Through experiments in the benchmark data set, our proposed method achieved 78.2% mAP in PASCAL VOC 2007 and 72.3% mAP in PASCAL VOC 2012 dataset. It has been verified through many experiments that this method has reached a more advanced level of detection.
Źródło:
International Journal of Electronics and Telecommunications; 2019, 65, 2; 293-301
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Network Information Hiding and Science 2.0 : Can it be a Match?
Autorzy:
Wendzel, S.
Caviglione, L.
Mazurczyk, W.
Lalande, J. F.
Powiązania:
https://bibliotekanauki.pl/articles/226567.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network steganography
information hiding
steganography
Science 2.0
open science
covert channel
Opis:
Science 2.0 aims at using the information sharing and collaborative features of the Internet to offer new features to the research community. Science 2.0 has been already applied to computer sciences, especially bioinformatics. For network information hiding, a field studying the possibility of concealing a communication in networks, the application of Science 2.0 is still a rather uncovered territory. To foster the discussion of potential benefits for network information hiding, we provide a disquisition for six different Science 2.0 aspects when applied to this domain.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 2; 217-222
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object
Autorzy:
Lakhno, Valerii
Alimseitova, Zhuldyz
Kalaman, Yerbolat
Kryvoruchko, Olena
Desiatko, Alona
Kaminskyi, Serhii
Powiązania:
https://bibliotekanauki.pl/articles/27311974.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
information security
informatization object
distributed computing network
mathematical model
vulnerability coefficient
virtualization
IDS
SIEM
Opis:
A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology. In particular, a mathematical model was presented based on the use of the apparatus of probability theory to calculate the vulnerability coefficient. This coefficient allows one to assess the level of information security of the OBI network. Criteria for assessing the acceptable and critical level of risks for information security were proposed as well. At the second stage of the methodology development of the IS DCN system, methods of simulation and virtualization of the components of the IS DCN were used. In the course of experimental studies, a model of a protected DCN has been built. In the experimental model, network devices and DCN IS components were emulated on virtual machines (VMs). The DCN resources were reproduced using the Proxmox VE virtualization system. IPS Suricata was deployed on RCS hosts running PVE. Splunk was used as SIEM. It has been shown that the proposed methodology for the formation of the IS system for DCN and the model of the vulnerability coefficient makes it possible to obtain a quantitative assessment of the levels of vulnerability of DCN OBI.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 3; 475--483
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Fading Channel Prediction for 5G and 6G Mobile Communication Systems
Autorzy:
Soszka, Maciej
Powiązania:
https://bibliotekanauki.pl/articles/2055227.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
5G
6G
channel prediction
channel state information
sub-6 GHz
millimetre-wave
neural network
artificial intelligence
narrowband
wide band
ultra wide band
Opis:
Nowadays, there is a trend to employ adaptive solutions in mobile communication. The adaptive transmission systems seem to answer the need for highly reliable communication that serves high data rates. For efficient adaptive transmission, the future Channel State Information (CSI) has to be known. The various prediction methods can be applied to estimate the future CSI. However, each method has its bottlenecks. The task is even more challenging while considering the future 5G/6G communication where the employment of sub-6 GHz and millimetre waves (mmWaves) in narrow-band, wide-band and ultra-wide-band transmission is considered. Thus, author describes the differences between sub-6 GHz/mmWave and narrow-band/wide-band/ultra-wide-band channel prediction, provide a comprehensive overview of available prediction methods, discuss its performance and analyse the opportunity to use them in sub-6 GHz and mmWave systems. We select Long Short-Term Memory Recurrent Neural Network (RNN) as the most promising technique for future CSI prediction and propose optimising two of its parameters - the number of input features, which was not yet considered as an opportunity to improve the performance of CSI prediction, and the number of hidden layers.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 1; 153--160
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-8 z 8

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies