首页 > 最新文献

International Journal on Information Technologies and Security最新文献

英文 中文
Software implementation of PSPISE-based models in the Python programming language 用Python编程语言实现基于pspise模型的软件实现
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.59035/lywq6789
Stoyan Popov, N. Hinov
The manuscript presents the software implementation of Pspise-based models in the Python programming language. To demonstrate the model transformation process, examples of electrical circuits that present current and voltage resonance are considered. The implementation experiments were conducted based on models implemented in LTspice. Simulation results using Python are obtained that are similar to those from other software environments specialized for modelling electrical and electronic circuits.
该手稿介绍了在Python编程语言中基于pspise的模型的软件实现。为了演示模型转换过程,考虑了存在电流和电压共振的电路实例。基于LTspice中实现的模型进行了实现实验。使用Python获得的仿真结果与其他专门用于电气和电子电路建模的软件环境相似。
{"title":"Software implementation of PSPISE-based models in the Python programming language","authors":"Stoyan Popov, N. Hinov","doi":"10.59035/lywq6789","DOIUrl":"https://doi.org/10.59035/lywq6789","url":null,"abstract":"The manuscript presents the software implementation of Pspise-based models in the Python programming language. To demonstrate the model transformation process, examples of electrical circuits that present current and voltage resonance are considered. The implementation experiments were conducted based on models implemented in LTspice. Simulation results using Python are obtained that are similar to those from other software environments specialized for modelling electrical and electronic circuits.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"130 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76153146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approach in installing and configuring general program monitoring client devise for IPTV monitoring of A1 and Vivacom A1和Vivacom IPTV监控通用程序监控客户端的安装与配置方法
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.59035/bieh5951
H. Hristov, Angel Ignatov, Jan Latal
In the article, we address the issue of automated initialization, installation, and configuration of the General Program Monitoring, version 3 application with minimal human involvement and manipulation. General Program Monitoring is Internet Protocol TV monitoring software built from scratch. It is used to monitor the viewing behaviour of customers of the television operators A1 and Vivacom. The purpose of the article is to present an approach for an automated installation and configuration process. To achieve this goal, we review the design and implementation of the software as well as the client application. The novelty of the approach is realized in a fully automated integration of the monitoring software and the procedures for its installation and configuration on the client device and the network, in the conditions of independence from the architecture of the network infrastructure and other accompanying hardware and software limitations.
在本文中,我们将讨论在人工参与和操作最少的情况下,自动初始化、安装和配置通用程序监控第3版应用程序的问题。通用程序监控是从头开始构建的互联网协议电视监控软件。它被用来监控电视运营商A1和Vivacom客户的观看行为。本文的目的是介绍一种自动化安装和配置过程的方法。为了实现这一目标,我们回顾了软件以及客户端应用程序的设计和实现。该方法的新颖性体现在监控软件及其在客户端设备和网络上的安装和配置程序的完全自动化集成中,并且独立于网络基础设施的体系结构和其他伴随的硬件和软件限制。
{"title":"Approach in installing and configuring general program monitoring client devise for IPTV monitoring of A1 and Vivacom","authors":"H. Hristov, Angel Ignatov, Jan Latal","doi":"10.59035/bieh5951","DOIUrl":"https://doi.org/10.59035/bieh5951","url":null,"abstract":"In the article, we address the issue of automated initialization, installation, and configuration of the General Program Monitoring, version 3 application with minimal human involvement and manipulation. General Program Monitoring is Internet Protocol TV monitoring software built from scratch. It is used to monitor the viewing behaviour of customers of the television operators A1 and Vivacom. The purpose of the article is to present an approach for an automated installation and configuration process. To achieve this goal, we review the design and implementation of the software as well as the client application. The novelty of the approach is realized in a fully automated integration of the monitoring software and the procedures for its installation and configuration on the client device and the network, in the conditions of independence from the architecture of the network infrastructure and other accompanying hardware and software limitations.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"14 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80619152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent surveillance systems on the Internet of Things based on secure applications with the IBM cloud platform 基于IBM云平台的物联网智能监控系统安全应用
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.59035/xvrs3592
Ioannis Adamopoulos, A. Ilias, C. Makris, Y. Stamatiou
The Internet of Things (IoT) is one of the most fast-evolving and most pervasive technological advancements of the last decade. Driven by IoT’s promise for an interconnected world for all people, through a shared Internet-based infrastructure, more and more businesses expand their activities to embrace, competitively, this new concept. More importantly, the ubiquitous, highly granular, and of increasing interconnection and computational capabilities nature of the IoT fabric creates a unique ecosystem for developing powerful, intelligent applications not limited to simply gathering and analyzing environmental and people data. This potential combines the IoT’s physical capabilities with the achievements of the more mature discipline of Artificial Intelligence (AI). However, there is still a large number of businesses with no clear plans of investing in the IoT-plus-AI potential, citing multiple obstacles mainly related to the difficulty of understanding, adapting, and developing advanced AI techniques. Our goal is to show that advanced AI functionalities can, now, be easily implemented and operated through existing IoT platforms, by developing an intelligent, remote, surveillance application based on IBM’s Cloud and Watson platforms as well as the Raspberry Zero W low-cost IoT device.
物联网(IoT)是过去十年中发展最快、最普及的技术进步之一。在物联网承诺为所有人创造一个互联世界的推动下,通过共享的基于互联网的基础设施,越来越多的企业扩展了他们的活动,以竞争的方式拥抱这一新概念。更重要的是,物联网结构无处不在、高度细化、互联和计算能力不断增强的特性,为开发功能强大的智能应用创造了一个独特的生态系统,而不仅仅是简单地收集和分析环境和人员数据。这种潜力将物联网的物理能力与更成熟的人工智能(AI)学科的成就结合起来。然而,仍有大量企业没有明确的投资物联网+人工智能潜力的计划,理由是存在多种障碍,主要与难以理解、适应和开发先进的人工智能技术有关。我们的目标是通过开发基于IBM云和沃森平台以及树莓Zero W低成本物联网设备的智能远程监控应用程序,展示先进的人工智能功能现在可以通过现有的物联网平台轻松实现和操作。
{"title":"Intelligent surveillance systems on the Internet of Things based on secure applications with the IBM cloud platform","authors":"Ioannis Adamopoulos, A. Ilias, C. Makris, Y. Stamatiou","doi":"10.59035/xvrs3592","DOIUrl":"https://doi.org/10.59035/xvrs3592","url":null,"abstract":"The Internet of Things (IoT) is one of the most fast-evolving and most pervasive technological advancements of the last decade. Driven by IoT’s promise for an interconnected world for all people, through a shared Internet-based infrastructure, more and more businesses expand their activities to embrace, competitively, this new concept. More importantly, the ubiquitous, highly granular, and of increasing interconnection and computational capabilities nature of the IoT fabric creates a unique ecosystem for developing powerful, intelligent applications not limited to simply gathering and analyzing environmental and people data. This potential combines the IoT’s physical capabilities with the achievements of the more mature discipline of Artificial Intelligence (AI). However, there is still a large number of businesses with no clear plans of investing in the IoT-plus-AI potential, citing multiple obstacles mainly related to the difficulty of understanding, adapting, and developing advanced AI techniques. Our goal is to show that advanced AI functionalities can, now, be easily implemented and operated through existing IoT platforms, by developing an intelligent, remote, surveillance application based on IBM’s Cloud and Watson platforms as well as the Raspberry Zero W low-cost IoT device.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"25 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78674884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Blockchain enabled dual level security scheme with spiral shuffling and hashing technique for secret video transmission 区块链支持双级安全方案,采用螺旋洗牌和哈希技术进行秘密视频传输
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.59035/ubsn9044
PL. Chithra, R. Aparna
In the modern digital era, data is considered to be the most valuable asset. Multimedia data includes audio, image and video forms which grabs attention and vulnerable for hacking. Transmission of multimedia data in open network is always unsecure. In this research paper, a novel method to transmit secret video is proposed. First, keyframes are detected by processing the ROI (region of interest) to classify segments. Spiral Shuffling and SHA512 hashing technique are applied to build the cipher blocks. Blockchain technique enhances strength of the Dual Level (Crypto-Stegano) Security Scheme. Discrete cosine transformation with normalization is applied to embed cipher blocks in audio files without any traces of hidden data. Combining the major security techniques such as Cryptography, Steganography and Blockchain enhances the strength of the proposed BDLSS (Blockchain enabled Dual Level Security Scheme). Experimental analysis is carried out with PSNR, SSIM, MSE, NPCR and Correlation coefficient values to prove the efficiency and the proposed method outperforms well over existing methods.
在现代数字时代,数据被认为是最有价值的资产。多媒体数据包括音频、图像和视频等形式,容易引起人们的注意,容易被黑客攻击。在开放网络中传输多媒体数据是不安全的。本文提出了一种新的秘密视频传输方法。首先,通过处理感兴趣区域(ROI)来检测关键帧并对片段进行分类。采用螺旋洗牌和SHA512哈希技术构建密码块。区块链技术增强了双级(Crypto-Stegano)安全方案的强度。采用归一化离散余弦变换将密码块嵌入音频文件中,不留下任何隐藏数据的痕迹。结合主要的安全技术,如密码学、隐写术和区块链,增强了提议的BDLSS(区块链启用双级安全方案)的强度。用PSNR、SSIM、MSE、NPCR和相关系数值进行了实验分析,证明了该方法的有效性,并且优于现有方法。
{"title":"Blockchain enabled dual level security scheme with spiral shuffling and hashing technique for secret video transmission","authors":"PL. Chithra, R. Aparna","doi":"10.59035/ubsn9044","DOIUrl":"https://doi.org/10.59035/ubsn9044","url":null,"abstract":"In the modern digital era, data is considered to be the most valuable asset. Multimedia data includes audio, image and video forms which grabs attention and vulnerable for hacking. Transmission of multimedia data in open network is always unsecure. In this research paper, a novel method to transmit secret video is proposed. First, keyframes are detected by processing the ROI (region of interest) to classify segments. Spiral Shuffling and SHA512 hashing technique are applied to build the cipher blocks. Blockchain technique enhances strength of the Dual Level (Crypto-Stegano) Security Scheme. Discrete cosine transformation with normalization is applied to embed cipher blocks in audio files without any traces of hidden data. Combining the major security techniques such as Cryptography, Steganography and Blockchain enhances the strength of the proposed BDLSS (Blockchain enabled Dual Level Security Scheme). Experimental analysis is carried out with PSNR, SSIM, MSE, NPCR and Correlation coefficient values to prove the efficiency and the proposed method outperforms well over existing methods.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136027422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges of Electronic Data Interchange in the digital age 数字时代电子数据交换的挑战
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.59035/sjre5572
Gerrit Janssens, Ludo Cuyvers
Electronic Data Interchange (EDI) became popular to facilitate international business transactions in the 1990s, but, even today, it can be seen that its use is not introduced everywhere. This article reviews some statements on the adoption of EDI in companies and integration into other IT systems. Furthermore, it looks at situations in specific countries. Statements are made how to integrate Electronic Data Interchange in cloud-based systems.
电子数据交换(EDI)在20世纪90年代开始流行,以促进国际商业交易,但是,即使在今天,也可以看到它的使用并不是无处不在。本文回顾了一些关于在公司中采用EDI和集成到其他IT系统中的陈述。此外,它还着眼于具体国家的情况。阐述了如何在基于云的系统中集成电子数据交换。
{"title":"Challenges of Electronic Data Interchange in the digital age","authors":"Gerrit Janssens, Ludo Cuyvers","doi":"10.59035/sjre5572","DOIUrl":"https://doi.org/10.59035/sjre5572","url":null,"abstract":"Electronic Data Interchange (EDI) became popular to facilitate international business transactions in the 1990s, but, even today, it can be seen that its use is not introduced everywhere. This article reviews some statements on the adoption of EDI in companies and integration into other IT systems. Furthermore, it looks at situations in specific countries. Statements are made how to integrate Electronic Data Interchange in cloud-based systems.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136027461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software implementation of methods for optimal design of power electronic devices 电力电子器件优化设计方法的软件实现
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.59035/szak4809
B. Gilev, N. Hinov, Stanislav Stefanov
The manuscript presents a software implementation of methods for the optimal design of power electronic devices based on MATLAB. Model-based optimization is one of the effective approaches to guarantee the performance of power electronic devices and systems. Through its application, the efficiency of the conversion of electrical energy is increased when setting a certain target function. Several examples are presented to demonstrate the effectiveness of the proposed optimization.
本文介绍了一种基于MATLAB的电力电子器件优化设计方法的软件实现。基于模型的优化是保证电力电子设备和系统性能的有效途径之一。通过它的应用,在设定一定的目标函数时,提高了电能的转换效率。通过实例验证了所提优化方法的有效性。
{"title":"Software implementation of methods for optimal design of power electronic devices","authors":"B. Gilev, N. Hinov, Stanislav Stefanov","doi":"10.59035/szak4809","DOIUrl":"https://doi.org/10.59035/szak4809","url":null,"abstract":"The manuscript presents a software implementation of methods for the optimal design of power electronic devices based on MATLAB. Model-based optimization is one of the effective approaches to guarantee the performance of power electronic devices and systems. Through its application, the efficiency of the conversion of electrical energy is increased when setting a certain target function. Several examples are presented to demonstrate the effectiveness of the proposed optimization.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"94 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76421698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Star-Galaxy classification using machine learning algorithms and deep learning 使用机器学习算法和深度学习的恒星-星系分类
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.59035/vvlr5284
A. Savyanavar, Nikhil C. Mhala, Shiv H. Sutar
Cosmology is the study of the universe comprising stars and galaxies. Advancement in the telescope has made it possible to capture high-resolution images, which can be analyzed using machine learning (ML) algorithms. This paper classifies the star galaxy dataset into two classes: star and galaxy using ML algorithms and compares their classification performance. It is observed that random forest provides better accuracy of 78% as compared to other ML classifiers. Further to improve the classification accuracy, we proposed a CNN (Convolution Neural Network) model and achieved an accuracy of 92.44%. Since the CNN model itself extracts the characteristics, it exhibits superior classification accuracy.
宇宙学是研究由恒星和星系组成的宇宙的学科。望远镜的进步使得捕捉高分辨率图像成为可能,这些图像可以使用机器学习(ML)算法进行分析。本文利用ML算法将恒星星系数据集分为恒星和星系两类,并比较了它们的分类性能。观察到,与其他ML分类器相比,随机森林提供了78%的更好准确率。为了进一步提高分类精度,我们提出了CNN(卷积神经网络)模型,准确率达到92.44%。由于CNN模型本身提取了特征,因此具有较高的分类精度。
{"title":"Star-Galaxy classification using machine learning algorithms and deep learning","authors":"A. Savyanavar, Nikhil C. Mhala, Shiv H. Sutar","doi":"10.59035/vvlr5284","DOIUrl":"https://doi.org/10.59035/vvlr5284","url":null,"abstract":"Cosmology is the study of the universe comprising stars and galaxies. Advancement in the telescope has made it possible to capture high-resolution images, which can be analyzed using machine learning (ML) algorithms. This paper classifies the star galaxy dataset into two classes: star and galaxy using ML algorithms and compares their classification performance. It is observed that random forest provides better accuracy of 78% as compared to other ML classifiers. Further to improve the classification accuracy, we proposed a CNN (Convolution Neural Network) model and achieved an accuracy of 92.44%. Since the CNN model itself extracts the characteristics, it exhibits superior classification accuracy.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"96 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82082000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A model-based approach to enhancing web accessibility for individuals with special education needs 以模型为基础,为有特殊教育需要的人士提供无障碍网页服务
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.59035/rxvf3370
Denislav Lefterov, H. Hristov, Svetoslav Enkov
An important aspect in software development nowadays is digital opportunities for meeting the needs of disadvantaged affected people with Special Education Needs (SEN). In this article, we consider the problem of identifying and improving the accessibility of web platforms designed for users who have SEN. To achieve this goal, a model was created and implemented in the web platform sopbg.org. The specialized website, which is maintained and developed by the authors of the publication, unites a community of several thousand users with SEN. The intensive consumption of the platform provided the authors with the opportunity to make a number of improvements to the applied model, some of which should be considered.
当今软件开发的一个重要方面是提供数码机会,以满足有特殊教育需要的弱势群体的需要。在本文中,我们考虑了识别和改进为sen用户设计的web平台的可访问性的问题。为了实现这一目标,我们在web平台sopbg.org中创建了一个模型并实现了该模型。该出版物的作者维护和开发了专门的网站,将数千名用户与sen联系在一起。该平台的密集使用为作者提供了对应用模型进行大量改进的机会,其中一些值得考虑。
{"title":"A model-based approach to enhancing web accessibility for individuals with special education needs","authors":"Denislav Lefterov, H. Hristov, Svetoslav Enkov","doi":"10.59035/rxvf3370","DOIUrl":"https://doi.org/10.59035/rxvf3370","url":null,"abstract":"An important aspect in software development nowadays is digital opportunities for meeting the needs of disadvantaged affected people with Special Education Needs (SEN). In this article, we consider the problem of identifying and improving the accessibility of web platforms designed for users who have SEN. To achieve this goal, a model was created and implemented in the web platform sopbg.org. The specialized website, which is maintained and developed by the authors of the publication, unites a community of several thousand users with SEN. The intensive consumption of the platform provided the authors with the opportunity to make a number of improvements to the applied model, some of which should be considered.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88214725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of communication parameters based on monitoring and statistical modelling 基于监测和统计建模的通信参数研究
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.59035/kqeh1710
R. Romansky
For the effective construction of a network infrastructure, it is recommended to carry out a preliminary investigation of communications and information processing by using suitable methods and tools. In this regard, the article deals with an approach applied in the investigation of network communications in a local network structure based on program monitoring and statistical analysis of the measured data. To specify the research object and the means used, the organization of the network structure is presented, and a brief discussion of sample monitoring programs is made. The organization for the conducted program monitoring is presented and main factors of network communications are defined. Statistical modelling approach is used to investigate selected parameters of communication in the network environment. Some obtained statistical assessments are presented which permit to make conclusions for access and communication organization.
为了有效地建设网络基础设施,建议使用合适的方法和工具对通信和信息处理进行初步调查。在这方面,本文讨论了一种基于程序监测和测量数据统计分析的方法在局域网络结构网络通信调查中的应用。为了明确研究对象和使用的方法,给出了网络结构的组织,并对样本监测程序进行了简要讨论。提出了实施程序监控的组织结构,确定了网络通信的主要因素。采用统计建模方法对网络环境中选定的通信参数进行了研究。提出了一些统计评估,以便为访问和传播组织作出结论。
{"title":"Investigation of communication parameters based on monitoring and statistical modelling","authors":"R. Romansky","doi":"10.59035/kqeh1710","DOIUrl":"https://doi.org/10.59035/kqeh1710","url":null,"abstract":"For the effective construction of a network infrastructure, it is recommended to carry out a preliminary investigation of communications and information processing by using suitable methods and tools. In this regard, the article deals with an approach applied in the investigation of network communications in a local network structure based on program monitoring and statistical analysis of the measured data. To specify the research object and the means used, the organization of the network structure is presented, and a brief discussion of sample monitoring programs is made. The organization for the conducted program monitoring is presented and main factors of network communications are defined. Statistical modelling approach is used to investigate selected parameters of communication in the network environment. Some obtained statistical assessments are presented which permit to make conclusions for access and communication organization.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"38 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82157324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the necessity of shaping Bulgarian national interests in terms of global uncertainty 关于在全球不确定的情况下塑造保加利亚国家利益的必要性
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.59035/rdxf8060
Nikolay Tsonkov
The global security system is undergoing a profound transformation. In this process, the international community is seeking the shape of a new security architecture and international order. At the same time, the Bulgarian state is characterised by a lack of clearly articulated strategic interests. This circumstance is reflected in the weak role of the Bulgarian state in regional and international affairs. In this regard, it is necessary to formulate Bulgaria's main foreign policy interests that will position the country in the new global system.
全球安全体系正在发生深刻变革。在这一进程中,国际社会正在寻求构建新的安全架构和国际秩序。与此同时,保加利亚的特点是缺乏明确的战略利益。这种情况反映在保加利亚国家在区域和国际事务中的薄弱作用上。在这方面,有必要制定保加利亚的主要外交政策利益,使该国在新的全球体系中处于有利地位。
{"title":"On the necessity of shaping Bulgarian national interests in terms of global uncertainty","authors":"Nikolay Tsonkov","doi":"10.59035/rdxf8060","DOIUrl":"https://doi.org/10.59035/rdxf8060","url":null,"abstract":"The global security system is undergoing a profound transformation. In this process, the international community is seeking the shape of a new security architecture and international order. At the same time, the Bulgarian state is characterised by a lack of clearly articulated strategic interests. This circumstance is reflected in the weak role of the Bulgarian state in regional and international affairs. In this regard, it is necessary to formulate Bulgaria's main foreign policy interests that will position the country in the new global system.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"12 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84432116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal on Information Technologies and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1