Highly available systems最新文献

筛选
英文 中文
A computer system for searching and evaluating thermal anomalies in volcano images 搜索和评价火山图像热异常的计算机系统
Highly available systems Pub Date : 1900-01-01 DOI: 10.18127/j20729472-202104-04
I. Urmanov, S. Korolev, A. Kamaev
{"title":"A computer system for searching and evaluating thermal anomalies in volcano images","authors":"I. Urmanov, S. Korolev, A. Kamaev","doi":"10.18127/j20729472-202104-04","DOIUrl":"https://doi.org/10.18127/j20729472-202104-04","url":null,"abstract":"The article discusses the analysis of images obtained from video cameras shooting in a wide range, including visible and near-infrared wavelengths. The problem of identification of thermal anomalies in the images of volcanoes obtained with such cameras is solved. The introduction contains a brief review of methods and approaches to the solution of the problem. Section 1 is devoted to the description of the developed algorithm of thermal anomalies detection. At the beginning of the section, the procedure of data sampling preparation is described and the details of thermal anomalies display on the images are shown. Then a description of all the stages of the algorithm is given, including finding the centers of potential anomalies, calculating the area and determining the features of the anomalies with further classification of the obtained data into classes of \"thermal\" anomaly and \"non-thermal\" anomaly. In Section 2, the description of the computer system for automated image analysis is given. At the beginning, the implementation of the developed algorithm in the form of a console application is shown. Then its integration into the computer system for the automated analysis of images of the system of continuous video observation of volcanoes of Kamchatka is considered. Also is given a description of all capabilities of the obtained system, a scheme of its work and examples of developed interfaces. In the conclusion of the article summarized the results of the work and the prospects for further research.","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115715322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keysystems in large systems implementing distributed data processing and storage technologies 实现分布式数据处理和存储技术的大型系统中的关键系统
Highly available systems Pub Date : 1900-01-01 DOI: 10.18127/j20729472-202103-01
V. Belenkov, V. Korolev, V. Budzko, D. Melnikov
{"title":"Keysystems in large systems implementing distributed data processing and storage technologies","authors":"V. Belenkov, V. Korolev, V. Budzko, D. Melnikov","doi":"10.18127/j20729472-202103-01","DOIUrl":"https://doi.org/10.18127/j20729472-202103-01","url":null,"abstract":"The article discusses the features of the use of the cryptographic information protection means (CIPM)in the environment of distributed processing and storage of data of large information and telecommunication systems (LITS).A brief characteristic is given of the properties of the cryptographic protection control subsystem - the key system (CS). A description is given of symmetric and asymmetric cryptographic systems, required to describe the problem of using KS in LITS.Functional and structural models of the use of KS and CIPM in LITS, are described. Generalized information about the features of using KS in LITS is given. The obtained results form the basis for further work on the development of the architecture and principles of KS construction in LITS that implement distributed data processing and storage technologies. They can be used both as a methodological guide, and when carrying out specific work on the creation and development of systems that implement these technologies, as well as when forming technical specifications for the implementation of work on the creation of such systems.","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116081547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software tools for analysis and synthesis of stochastic systems with high availability (XII) 高可用性随机系统分析与综合的软件工具(XII)
Highly available systems Pub Date : 1900-01-01 DOI: 10.18127/j20729472-202102-03
T. Konashenkova, I. Sinitsyn, V. Sinitsyn, E. Korepanov
{"title":"Software tools for analysis and synthesis of stochastic systems with high availability (XII)","authors":"T. Konashenkova, I. Sinitsyn, V. Sinitsyn, E. Korepanov","doi":"10.18127/j20729472-202102-03","DOIUrl":"https://doi.org/10.18127/j20729472-202102-03","url":null,"abstract":"The article proceeds the thematic cycle dedicated to analysis and synthesis for mean square criteria software tools for vector nonstationary (e.g. shock disturbances) linear stochastic systems with high availability (StSHA). Methodological support is based on Haar wavelet expansions (WLE) and wavelet canonical expansions (WLCE). Sect.1 is dedicated to problems statements. General basic algorithm is given in Sect. 2. Algorithms for StSHA with linear parameters and additive noises based on WLE and WLCE are described in Sect.3. Software tools in MATLAB are considered in Sect. 4. For typical shock disturbances bank of algorithms is developed. Complex of examples is given in Sect.5. Some generalizations are presented.","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
About the problem of trust in verification centers in Russian Federation 关于俄罗斯联邦核查中心的信任问题
Highly available systems Pub Date : 1900-01-01 DOI: 10.18127/j20729472-202201-01
D. Melnikov
{"title":"About the problem of trust in verification centers in Russian Federation","authors":"D. Melnikov","doi":"10.18127/j20729472-202201-01","DOIUrl":"https://doi.org/10.18127/j20729472-202201-01","url":null,"abstract":"","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129895647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Java code ergonomics certificate Java代码人机工程学证书
Highly available systems Pub Date : 1900-01-01 DOI: 10.18127/j19997493-202201-02
B. Goryachkin, S.V. Chernenkiy, M.S. Sarosek
{"title":"Java code ergonomics certificate","authors":"B. Goryachkin, S.V. Chernenkiy, M.S. Sarosek","doi":"10.18127/j19997493-202201-02","DOIUrl":"https://doi.org/10.18127/j19997493-202201-02","url":null,"abstract":"","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129909228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of the timing covert channel capacity considering packet transfer time distribution 考虑数据包传输时间分布的定时隐蔽信道容量评估
Highly available systems Pub Date : 1900-01-01 DOI: 10.18127/j20729472-202101-04
A. Belozubova, A. Epishkina, K. Kogos
{"title":"Evaluation of the timing covert channel capacity considering packet transfer time distribution","authors":"A. Belozubova, A. Epishkina, K. Kogos","doi":"10.18127/j20729472-202101-04","DOIUrl":"https://doi.org/10.18127/j20729472-202101-04","url":null,"abstract":"Lampson was the first to introduce a covert channel as a channel that was not designed for information transmission. The problem of information leakage via network covert channels has a large scale due to the facts that IP protocol is widely used and has a lot of features to use it for hidden information transmission. Usually covert channels are divided into two groups by transmission technic: storage and timing covert channels. In the paper authors provide brief survey for network timing and storage covert channels as well as methods of information leakage counteraction. According to best practices, information systems and infrastructure have an information security policy with the requirements about allowable level of covert channel capacity. However, to take a decision about any method activation it is important not to allow underestimation of covert channel capacity. For the effective prevention of information leakage via network covert channels authors suggest a way to assess timing covert channel capacity. Two binary timing channels have been investigated: on/off and channel based on inter packet intervals modulation. In on/off covert channel the sender sends a packet during a preliminarily agreed time interval to transmit the bit «1» and does not send to transmit the bit «0». In a covert channel based on inter packet intervals modulation the sender sends packets with different time intervals defining different bits. The scientific novelty consists in taking into account network load conditions while assessing maximum amount of information that can be stealthily transmitted from secure infrastructure to an illegitimate receiver beyond secure perimeter. Authors investigated cases when packet transfer time from the sender to the receiver in the network (PTT) is defined by normal and exponential distribution – the most common distribution according to current research. Covert channel capacity is evaluated as a function of covert channel parameters and parameters of the PTT distribution (DPTT). Conducted research shows that in case when secure officer does not take into account typical load for the network and DPTT type maximum covert channel capacity will most likely be underestimated. If allowable level of covert channel capacity is set up, obtained results allow to take right decision about activation of countermeasures to prevent information leakage.","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coordination of mechanisms pickup-docking device 协调机构的拾取-对接装置
Highly available systems Pub Date : 1900-01-01 DOI: 10.18127/j19997493-202202-01
E.A. Rakshin, A. Timofeev, A. Kolesnikov, L. V. Podkolzina
{"title":"Coordination of mechanisms pickup-docking device","authors":"E.A. Rakshin, A. Timofeev, A. Kolesnikov, L. V. Podkolzina","doi":"10.18127/j19997493-202202-01","DOIUrl":"https://doi.org/10.18127/j19997493-202202-01","url":null,"abstract":"","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Class of quantum cryptographic systems AKM2021 based on the use of singlet states of multicubic quantum systems 基于使用多立方量子系统的单重态的量子密码系统AKM2021
Highly available systems Pub Date : 1900-01-01 DOI: 10.18127/j20729472-202203-01
F. Aliev, A. Korolkov, E. A. Matveev
{"title":"Class of quantum cryptographic systems AKM2021 based on the use of singlet states of multicubic quantum systems","authors":"F. Aliev, A. Korolkov, E. A. Matveev","doi":"10.18127/j20729472-202203-01","DOIUrl":"https://doi.org/10.18127/j20729472-202203-01","url":null,"abstract":"","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121908178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信