{"title":"A computer system for searching and evaluating thermal anomalies in volcano images","authors":"I. Urmanov, S. Korolev, A. Kamaev","doi":"10.18127/j20729472-202104-04","DOIUrl":"https://doi.org/10.18127/j20729472-202104-04","url":null,"abstract":"The article discusses the analysis of images obtained from video cameras shooting in a wide range, including visible and near-infrared wavelengths. The problem of identification of thermal anomalies in the images of volcanoes obtained with such cameras is solved. The introduction contains a brief review of methods and approaches to the solution of the problem. Section 1 is devoted to the description of the developed algorithm of thermal anomalies detection. At the beginning of the section, the procedure of data sampling preparation is described and the details of thermal anomalies display on the images are shown. Then a description of all the stages of the algorithm is given, including finding the centers of potential anomalies, calculating the area and determining the features of the anomalies with further classification of the obtained data into classes of \"thermal\" anomaly and \"non-thermal\" anomaly. In Section 2, the description of the computer system for automated image analysis is given. At the beginning, the implementation of the developed algorithm in the form of a console application is shown. Then its integration into the computer system for the automated analysis of images of the system of continuous video observation of volcanoes of Kamchatka is considered. Also is given a description of all capabilities of the obtained system, a scheme of its work and examples of developed interfaces. In the conclusion of the article summarized the results of the work and the prospects for further research.","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115715322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keysystems in large systems implementing distributed data processing and storage technologies","authors":"V. Belenkov, V. Korolev, V. Budzko, D. Melnikov","doi":"10.18127/j20729472-202103-01","DOIUrl":"https://doi.org/10.18127/j20729472-202103-01","url":null,"abstract":"The article discusses the features of the use of the cryptographic information protection means (CIPM)in the environment of distributed processing and storage of data of large information and telecommunication systems (LITS).A brief characteristic is given of the properties of the cryptographic protection control subsystem - the key system (CS). A description is given of symmetric and asymmetric cryptographic systems, required to describe the problem of using KS in LITS.Functional and structural models of the use of KS and CIPM in LITS, are described. Generalized information about the features of using KS in LITS is given. The obtained results form the basis for further work on the development of the architecture and principles of KS construction in LITS that implement distributed data processing and storage technologies. They can be used both as a methodological guide, and when carrying out specific work on the creation and development of systems that implement these technologies, as well as when forming technical specifications for the implementation of work on the creation of such systems.","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116081547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Konashenkova, I. Sinitsyn, V. Sinitsyn, E. Korepanov
{"title":"Software tools for analysis and synthesis of stochastic systems with high availability (XII)","authors":"T. Konashenkova, I. Sinitsyn, V. Sinitsyn, E. Korepanov","doi":"10.18127/j20729472-202102-03","DOIUrl":"https://doi.org/10.18127/j20729472-202102-03","url":null,"abstract":"The article proceeds the thematic cycle dedicated to analysis and synthesis for mean square criteria software tools for vector nonstationary (e.g. shock disturbances) linear stochastic systems with high availability (StSHA). Methodological support is based on Haar wavelet expansions (WLE) and wavelet canonical expansions (WLCE). Sect.1 is dedicated to problems statements. General basic algorithm is given in Sect. 2. Algorithms for StSHA with linear parameters and additive noises based on WLE and WLCE are described in Sect.3. Software tools in MATLAB are considered in Sect. 4. For typical shock disturbances bank of algorithms is developed. Complex of examples is given in Sect.5. Some generalizations are presented.","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"About the problem of trust in verification centers in Russian Federation","authors":"D. Melnikov","doi":"10.18127/j20729472-202201-01","DOIUrl":"https://doi.org/10.18127/j20729472-202201-01","url":null,"abstract":"","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129895647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of the timing covert channel capacity considering packet transfer time distribution","authors":"A. Belozubova, A. Epishkina, K. Kogos","doi":"10.18127/j20729472-202101-04","DOIUrl":"https://doi.org/10.18127/j20729472-202101-04","url":null,"abstract":"Lampson was the first to introduce a covert channel as a channel that was not designed for information transmission. The problem of information leakage via network covert channels has a large scale due to the facts that IP protocol is widely used and has a lot of features to use it for hidden information transmission. Usually covert channels are divided into two groups by transmission technic: storage and timing covert channels. In the paper authors provide brief survey for network timing and storage covert channels as well as methods of information leakage counteraction. According to best practices, information systems and infrastructure have an information security policy with the requirements about allowable level of covert channel capacity. However, to take a decision about any method activation it is important not to allow underestimation of covert channel capacity. For the effective prevention of information leakage via network covert channels authors suggest a way to assess timing covert channel capacity. Two binary timing channels have been investigated: on/off and channel based on inter packet intervals modulation. In on/off covert channel the sender sends a packet during a preliminarily agreed time interval to transmit the bit «1» and does not send to transmit the bit «0». In a covert channel based on inter packet intervals modulation the sender sends packets with different time intervals defining different bits. The scientific novelty consists in taking into account network load conditions while assessing maximum amount of information that can be stealthily transmitted from secure infrastructure to an illegitimate receiver beyond secure perimeter. Authors investigated cases when packet transfer time from the sender to the receiver in the network (PTT) is defined by normal and exponential distribution – the most common distribution according to current research. Covert channel capacity is evaluated as a function of covert channel parameters and parameters of the PTT distribution (DPTT). Conducted research shows that in case when secure officer does not take into account typical load for the network and DPTT type maximum covert channel capacity will most likely be underestimated. If allowable level of covert channel capacity is set up, obtained results allow to take right decision about activation of countermeasures to prevent information leakage.","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E.A. Rakshin, A. Timofeev, A. Kolesnikov, L. V. Podkolzina
{"title":"Coordination of mechanisms pickup-docking device","authors":"E.A. Rakshin, A. Timofeev, A. Kolesnikov, L. V. Podkolzina","doi":"10.18127/j19997493-202202-01","DOIUrl":"https://doi.org/10.18127/j19997493-202202-01","url":null,"abstract":"","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Class of quantum cryptographic systems AKM2021 based on the use of singlet states of multicubic quantum systems","authors":"F. Aliev, A. Korolkov, E. A. Matveev","doi":"10.18127/j20729472-202203-01","DOIUrl":"https://doi.org/10.18127/j20729472-202203-01","url":null,"abstract":"","PeriodicalId":156447,"journal":{"name":"Highly available systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121908178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}