The manuscript presents the software implementation of Pspise-based models in the Python programming language. To demonstrate the model transformation process, examples of electrical circuits that present current and voltage resonance are considered. The implementation experiments were conducted based on models implemented in LTspice. Simulation results using Python are obtained that are similar to those from other software environments specialized for modelling electrical and electronic circuits.
{"title":"Software implementation of PSPISE-based models in the Python programming language","authors":"Stoyan Popov, N. Hinov","doi":"10.59035/lywq6789","DOIUrl":"https://doi.org/10.59035/lywq6789","url":null,"abstract":"The manuscript presents the software implementation of Pspise-based models in the Python programming language. To demonstrate the model transformation process, examples of electrical circuits that present current and voltage resonance are considered. The implementation experiments were conducted based on models implemented in LTspice. Simulation results using Python are obtained that are similar to those from other software environments specialized for modelling electrical and electronic circuits.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"130 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76153146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the article, we address the issue of automated initialization, installation, and configuration of the General Program Monitoring, version 3 application with minimal human involvement and manipulation. General Program Monitoring is Internet Protocol TV monitoring software built from scratch. It is used to monitor the viewing behaviour of customers of the television operators A1 and Vivacom. The purpose of the article is to present an approach for an automated installation and configuration process. To achieve this goal, we review the design and implementation of the software as well as the client application. The novelty of the approach is realized in a fully automated integration of the monitoring software and the procedures for its installation and configuration on the client device and the network, in the conditions of independence from the architecture of the network infrastructure and other accompanying hardware and software limitations.
{"title":"Approach in installing and configuring general program monitoring client devise for IPTV monitoring of A1 and Vivacom","authors":"H. Hristov, Angel Ignatov, Jan Latal","doi":"10.59035/bieh5951","DOIUrl":"https://doi.org/10.59035/bieh5951","url":null,"abstract":"In the article, we address the issue of automated initialization, installation, and configuration of the General Program Monitoring, version 3 application with minimal human involvement and manipulation. General Program Monitoring is Internet Protocol TV monitoring software built from scratch. It is used to monitor the viewing behaviour of customers of the television operators A1 and Vivacom. The purpose of the article is to present an approach for an automated installation and configuration process. To achieve this goal, we review the design and implementation of the software as well as the client application. The novelty of the approach is realized in a fully automated integration of the monitoring software and the procedures for its installation and configuration on the client device and the network, in the conditions of independence from the architecture of the network infrastructure and other accompanying hardware and software limitations.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"14 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80619152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ioannis Adamopoulos, A. Ilias, C. Makris, Y. Stamatiou
The Internet of Things (IoT) is one of the most fast-evolving and most pervasive technological advancements of the last decade. Driven by IoT’s promise for an interconnected world for all people, through a shared Internet-based infrastructure, more and more businesses expand their activities to embrace, competitively, this new concept. More importantly, the ubiquitous, highly granular, and of increasing interconnection and computational capabilities nature of the IoT fabric creates a unique ecosystem for developing powerful, intelligent applications not limited to simply gathering and analyzing environmental and people data. This potential combines the IoT’s physical capabilities with the achievements of the more mature discipline of Artificial Intelligence (AI). However, there is still a large number of businesses with no clear plans of investing in the IoT-plus-AI potential, citing multiple obstacles mainly related to the difficulty of understanding, adapting, and developing advanced AI techniques. Our goal is to show that advanced AI functionalities can, now, be easily implemented and operated through existing IoT platforms, by developing an intelligent, remote, surveillance application based on IBM’s Cloud and Watson platforms as well as the Raspberry Zero W low-cost IoT device.
{"title":"Intelligent surveillance systems on the Internet of Things based on secure applications with the IBM cloud platform","authors":"Ioannis Adamopoulos, A. Ilias, C. Makris, Y. Stamatiou","doi":"10.59035/xvrs3592","DOIUrl":"https://doi.org/10.59035/xvrs3592","url":null,"abstract":"The Internet of Things (IoT) is one of the most fast-evolving and most pervasive technological advancements of the last decade. Driven by IoT’s promise for an interconnected world for all people, through a shared Internet-based infrastructure, more and more businesses expand their activities to embrace, competitively, this new concept. More importantly, the ubiquitous, highly granular, and of increasing interconnection and computational capabilities nature of the IoT fabric creates a unique ecosystem for developing powerful, intelligent applications not limited to simply gathering and analyzing environmental and people data. This potential combines the IoT’s physical capabilities with the achievements of the more mature discipline of Artificial Intelligence (AI). However, there is still a large number of businesses with no clear plans of investing in the IoT-plus-AI potential, citing multiple obstacles mainly related to the difficulty of understanding, adapting, and developing advanced AI techniques. Our goal is to show that advanced AI functionalities can, now, be easily implemented and operated through existing IoT platforms, by developing an intelligent, remote, surveillance application based on IBM’s Cloud and Watson platforms as well as the Raspberry Zero W low-cost IoT device.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"25 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78674884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the modern digital era, data is considered to be the most valuable asset. Multimedia data includes audio, image and video forms which grabs attention and vulnerable for hacking. Transmission of multimedia data in open network is always unsecure. In this research paper, a novel method to transmit secret video is proposed. First, keyframes are detected by processing the ROI (region of interest) to classify segments. Spiral Shuffling and SHA512 hashing technique are applied to build the cipher blocks. Blockchain technique enhances strength of the Dual Level (Crypto-Stegano) Security Scheme. Discrete cosine transformation with normalization is applied to embed cipher blocks in audio files without any traces of hidden data. Combining the major security techniques such as Cryptography, Steganography and Blockchain enhances the strength of the proposed BDLSS (Blockchain enabled Dual Level Security Scheme). Experimental analysis is carried out with PSNR, SSIM, MSE, NPCR and Correlation coefficient values to prove the efficiency and the proposed method outperforms well over existing methods.
{"title":"Blockchain enabled dual level security scheme with spiral shuffling and hashing technique for secret video transmission","authors":"PL. Chithra, R. Aparna","doi":"10.59035/ubsn9044","DOIUrl":"https://doi.org/10.59035/ubsn9044","url":null,"abstract":"In the modern digital era, data is considered to be the most valuable asset. Multimedia data includes audio, image and video forms which grabs attention and vulnerable for hacking. Transmission of multimedia data in open network is always unsecure. In this research paper, a novel method to transmit secret video is proposed. First, keyframes are detected by processing the ROI (region of interest) to classify segments. Spiral Shuffling and SHA512 hashing technique are applied to build the cipher blocks. Blockchain technique enhances strength of the Dual Level (Crypto-Stegano) Security Scheme. Discrete cosine transformation with normalization is applied to embed cipher blocks in audio files without any traces of hidden data. Combining the major security techniques such as Cryptography, Steganography and Blockchain enhances the strength of the proposed BDLSS (Blockchain enabled Dual Level Security Scheme). Experimental analysis is carried out with PSNR, SSIM, MSE, NPCR and Correlation coefficient values to prove the efficiency and the proposed method outperforms well over existing methods.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136027422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Electronic Data Interchange (EDI) became popular to facilitate international business transactions in the 1990s, but, even today, it can be seen that its use is not introduced everywhere. This article reviews some statements on the adoption of EDI in companies and integration into other IT systems. Furthermore, it looks at situations in specific countries. Statements are made how to integrate Electronic Data Interchange in cloud-based systems.
{"title":"Challenges of Electronic Data Interchange in the digital age","authors":"Gerrit Janssens, Ludo Cuyvers","doi":"10.59035/sjre5572","DOIUrl":"https://doi.org/10.59035/sjre5572","url":null,"abstract":"Electronic Data Interchange (EDI) became popular to facilitate international business transactions in the 1990s, but, even today, it can be seen that its use is not introduced everywhere. This article reviews some statements on the adoption of EDI in companies and integration into other IT systems. Furthermore, it looks at situations in specific countries. Statements are made how to integrate Electronic Data Interchange in cloud-based systems.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136027461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The manuscript presents a software implementation of methods for the optimal design of power electronic devices based on MATLAB. Model-based optimization is one of the effective approaches to guarantee the performance of power electronic devices and systems. Through its application, the efficiency of the conversion of electrical energy is increased when setting a certain target function. Several examples are presented to demonstrate the effectiveness of the proposed optimization.
{"title":"Software implementation of methods for optimal design of power electronic devices","authors":"B. Gilev, N. Hinov, Stanislav Stefanov","doi":"10.59035/szak4809","DOIUrl":"https://doi.org/10.59035/szak4809","url":null,"abstract":"The manuscript presents a software implementation of methods for the optimal design of power electronic devices based on MATLAB. Model-based optimization is one of the effective approaches to guarantee the performance of power electronic devices and systems. Through its application, the efficiency of the conversion of electrical energy is increased when setting a certain target function. Several examples are presented to demonstrate the effectiveness of the proposed optimization.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"94 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76421698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cosmology is the study of the universe comprising stars and galaxies. Advancement in the telescope has made it possible to capture high-resolution images, which can be analyzed using machine learning (ML) algorithms. This paper classifies the star galaxy dataset into two classes: star and galaxy using ML algorithms and compares their classification performance. It is observed that random forest provides better accuracy of 78% as compared to other ML classifiers. Further to improve the classification accuracy, we proposed a CNN (Convolution Neural Network) model and achieved an accuracy of 92.44%. Since the CNN model itself extracts the characteristics, it exhibits superior classification accuracy.
{"title":"Star-Galaxy classification using machine learning algorithms and deep learning","authors":"A. Savyanavar, Nikhil C. Mhala, Shiv H. Sutar","doi":"10.59035/vvlr5284","DOIUrl":"https://doi.org/10.59035/vvlr5284","url":null,"abstract":"Cosmology is the study of the universe comprising stars and galaxies. Advancement in the telescope has made it possible to capture high-resolution images, which can be analyzed using machine learning (ML) algorithms. This paper classifies the star galaxy dataset into two classes: star and galaxy using ML algorithms and compares their classification performance. It is observed that random forest provides better accuracy of 78% as compared to other ML classifiers. Further to improve the classification accuracy, we proposed a CNN (Convolution Neural Network) model and achieved an accuracy of 92.44%. Since the CNN model itself extracts the characteristics, it exhibits superior classification accuracy.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"96 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82082000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An important aspect in software development nowadays is digital opportunities for meeting the needs of disadvantaged affected people with Special Education Needs (SEN). In this article, we consider the problem of identifying and improving the accessibility of web platforms designed for users who have SEN. To achieve this goal, a model was created and implemented in the web platform sopbg.org. The specialized website, which is maintained and developed by the authors of the publication, unites a community of several thousand users with SEN. The intensive consumption of the platform provided the authors with the opportunity to make a number of improvements to the applied model, some of which should be considered.
{"title":"A model-based approach to enhancing web accessibility for individuals with special education needs","authors":"Denislav Lefterov, H. Hristov, Svetoslav Enkov","doi":"10.59035/rxvf3370","DOIUrl":"https://doi.org/10.59035/rxvf3370","url":null,"abstract":"An important aspect in software development nowadays is digital opportunities for meeting the needs of disadvantaged affected people with Special Education Needs (SEN). In this article, we consider the problem of identifying and improving the accessibility of web platforms designed for users who have SEN. To achieve this goal, a model was created and implemented in the web platform sopbg.org. The specialized website, which is maintained and developed by the authors of the publication, unites a community of several thousand users with SEN. The intensive consumption of the platform provided the authors with the opportunity to make a number of improvements to the applied model, some of which should be considered.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88214725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For the effective construction of a network infrastructure, it is recommended to carry out a preliminary investigation of communications and information processing by using suitable methods and tools. In this regard, the article deals with an approach applied in the investigation of network communications in a local network structure based on program monitoring and statistical analysis of the measured data. To specify the research object and the means used, the organization of the network structure is presented, and a brief discussion of sample monitoring programs is made. The organization for the conducted program monitoring is presented and main factors of network communications are defined. Statistical modelling approach is used to investigate selected parameters of communication in the network environment. Some obtained statistical assessments are presented which permit to make conclusions for access and communication organization.
{"title":"Investigation of communication parameters based on monitoring and statistical modelling","authors":"R. Romansky","doi":"10.59035/kqeh1710","DOIUrl":"https://doi.org/10.59035/kqeh1710","url":null,"abstract":"For the effective construction of a network infrastructure, it is recommended to carry out a preliminary investigation of communications and information processing by using suitable methods and tools. In this regard, the article deals with an approach applied in the investigation of network communications in a local network structure based on program monitoring and statistical analysis of the measured data. To specify the research object and the means used, the organization of the network structure is presented, and a brief discussion of sample monitoring programs is made. The organization for the conducted program monitoring is presented and main factors of network communications are defined. Statistical modelling approach is used to investigate selected parameters of communication in the network environment. Some obtained statistical assessments are presented which permit to make conclusions for access and communication organization.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"38 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82157324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The global security system is undergoing a profound transformation. In this process, the international community is seeking the shape of a new security architecture and international order. At the same time, the Bulgarian state is characterised by a lack of clearly articulated strategic interests. This circumstance is reflected in the weak role of the Bulgarian state in regional and international affairs. In this regard, it is necessary to formulate Bulgaria's main foreign policy interests that will position the country in the new global system.
{"title":"On the necessity of shaping Bulgarian national interests in terms of global uncertainty","authors":"Nikolay Tsonkov","doi":"10.59035/rdxf8060","DOIUrl":"https://doi.org/10.59035/rdxf8060","url":null,"abstract":"The global security system is undergoing a profound transformation. In this process, the international community is seeking the shape of a new security architecture and international order. At the same time, the Bulgarian state is characterised by a lack of clearly articulated strategic interests. This circumstance is reflected in the weak role of the Bulgarian state in regional and international affairs. In this regard, it is necessary to formulate Bulgaria's main foreign policy interests that will position the country in the new global system.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"12 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84432116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}