International Journal on Information Technologies and Security最新文献

筛选
英文 中文
Approach in installing and configuring general program monitoring client devise for IPTV monitoring of A1 and Vivacom A1和Vivacom IPTV监控通用程序监控客户端的安装与配置方法
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-09-01 DOI: 10.59035/bieh5951
H. Hristov, Angel Ignatov, Jan Latal
{"title":"Approach in installing and configuring general program monitoring client devise for IPTV monitoring of A1 and Vivacom","authors":"H. Hristov, Angel Ignatov, Jan Latal","doi":"10.59035/bieh5951","DOIUrl":"https://doi.org/10.59035/bieh5951","url":null,"abstract":"In the article, we address the issue of automated initialization, installation, and configuration of the General Program Monitoring, version 3 application with minimal human involvement and manipulation. General Program Monitoring is Internet Protocol TV monitoring software built from scratch. It is used to monitor the viewing behaviour of customers of the television operators A1 and Vivacom. The purpose of the article is to present an approach for an automated installation and configuration process. To achieve this goal, we review the design and implementation of the software as well as the client application. The novelty of the approach is realized in a fully automated integration of the monitoring software and the procedures for its installation and configuration on the client device and the network, in the conditions of independence from the architecture of the network infrastructure and other accompanying hardware and software limitations.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80619152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent surveillance systems on the Internet of Things based on secure applications with the IBM cloud platform 基于IBM云平台的物联网智能监控系统安全应用
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-06-01 DOI: 10.59035/xvrs3592
Ioannis Adamopoulos, A. Ilias, C. Makris, Y. Stamatiou
{"title":"Intelligent surveillance systems on the Internet of Things based on secure applications with the IBM cloud platform","authors":"Ioannis Adamopoulos, A. Ilias, C. Makris, Y. Stamatiou","doi":"10.59035/xvrs3592","DOIUrl":"https://doi.org/10.59035/xvrs3592","url":null,"abstract":"The Internet of Things (IoT) is one of the most fast-evolving and most pervasive technological advancements of the last decade. Driven by IoT’s promise for an interconnected world for all people, through a shared Internet-based infrastructure, more and more businesses expand their activities to embrace, competitively, this new concept. More importantly, the ubiquitous, highly granular, and of increasing interconnection and computational capabilities nature of the IoT fabric creates a unique ecosystem for developing powerful, intelligent applications not limited to simply gathering and analyzing environmental and people data. This potential combines the IoT’s physical capabilities with the achievements of the more mature discipline of Artificial Intelligence (AI). However, there is still a large number of businesses with no clear plans of investing in the IoT-plus-AI potential, citing multiple obstacles mainly related to the difficulty of understanding, adapting, and developing advanced AI techniques. Our goal is to show that advanced AI functionalities can, now, be easily implemented and operated through existing IoT platforms, by developing an intelligent, remote, surveillance application based on IBM’s Cloud and Watson platforms as well as the Raspberry Zero W low-cost IoT device.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78674884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Blockchain enabled dual level security scheme with spiral shuffling and hashing technique for secret video transmission 区块链支持双级安全方案,采用螺旋洗牌和哈希技术进行秘密视频传输
International Journal on Information Technologies and Security Pub Date : 2023-06-01 DOI: 10.59035/ubsn9044
PL. Chithra, R. Aparna
{"title":"Blockchain enabled dual level security scheme with spiral shuffling and hashing technique for secret video transmission","authors":"PL. Chithra, R. Aparna","doi":"10.59035/ubsn9044","DOIUrl":"https://doi.org/10.59035/ubsn9044","url":null,"abstract":"In the modern digital era, data is considered to be the most valuable asset. Multimedia data includes audio, image and video forms which grabs attention and vulnerable for hacking. Transmission of multimedia data in open network is always unsecure. In this research paper, a novel method to transmit secret video is proposed. First, keyframes are detected by processing the ROI (region of interest) to classify segments. Spiral Shuffling and SHA512 hashing technique are applied to build the cipher blocks. Blockchain technique enhances strength of the Dual Level (Crypto-Stegano) Security Scheme. Discrete cosine transformation with normalization is applied to embed cipher blocks in audio files without any traces of hidden data. Combining the major security techniques such as Cryptography, Steganography and Blockchain enhances the strength of the proposed BDLSS (Blockchain enabled Dual Level Security Scheme). Experimental analysis is carried out with PSNR, SSIM, MSE, NPCR and Correlation coefficient values to prove the efficiency and the proposed method outperforms well over existing methods.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136027422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges of Electronic Data Interchange in the digital age 数字时代电子数据交换的挑战
International Journal on Information Technologies and Security Pub Date : 2023-06-01 DOI: 10.59035/sjre5572
Gerrit Janssens, Ludo Cuyvers
{"title":"Challenges of Electronic Data Interchange in the digital age","authors":"Gerrit Janssens, Ludo Cuyvers","doi":"10.59035/sjre5572","DOIUrl":"https://doi.org/10.59035/sjre5572","url":null,"abstract":"Electronic Data Interchange (EDI) became popular to facilitate international business transactions in the 1990s, but, even today, it can be seen that its use is not introduced everywhere. This article reviews some statements on the adoption of EDI in companies and integration into other IT systems. Furthermore, it looks at situations in specific countries. Statements are made how to integrate Electronic Data Interchange in cloud-based systems.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136027461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Star-Galaxy classification using machine learning algorithms and deep learning 使用机器学习算法和深度学习的恒星-星系分类
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-06-01 DOI: 10.59035/vvlr5284
A. Savyanavar, Nikhil C. Mhala, Shiv H. Sutar
{"title":"Star-Galaxy classification using machine learning algorithms and deep learning","authors":"A. Savyanavar, Nikhil C. Mhala, Shiv H. Sutar","doi":"10.59035/vvlr5284","DOIUrl":"https://doi.org/10.59035/vvlr5284","url":null,"abstract":"Cosmology is the study of the universe comprising stars and galaxies. Advancement in the telescope has made it possible to capture high-resolution images, which can be analyzed using machine learning (ML) algorithms. This paper classifies the star galaxy dataset into two classes: star and galaxy using ML algorithms and compares their classification performance. It is observed that random forest provides better accuracy of 78% as compared to other ML classifiers. Further to improve the classification accuracy, we proposed a CNN (Convolution Neural Network) model and achieved an accuracy of 92.44%. Since the CNN model itself extracts the characteristics, it exhibits superior classification accuracy.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82082000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Software implementation of methods for optimal design of power electronic devices 电力电子器件优化设计方法的软件实现
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-06-01 DOI: 10.59035/szak4809
B. Gilev, N. Hinov, Stanislav Stefanov
{"title":"Software implementation of methods for optimal design of power electronic devices","authors":"B. Gilev, N. Hinov, Stanislav Stefanov","doi":"10.59035/szak4809","DOIUrl":"https://doi.org/10.59035/szak4809","url":null,"abstract":"The manuscript presents a software implementation of methods for the optimal design of power electronic devices based on MATLAB. Model-based optimization is one of the effective approaches to guarantee the performance of power electronic devices and systems. Through its application, the efficiency of the conversion of electrical energy is increased when setting a certain target function. Several examples are presented to demonstrate the effectiveness of the proposed optimization.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76421698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A model-based approach to enhancing web accessibility for individuals with special education needs 以模型为基础,为有特殊教育需要的人士提供无障碍网页服务
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-06-01 DOI: 10.59035/rxvf3370
Denislav Lefterov, H. Hristov, Svetoslav Enkov
{"title":"A model-based approach to enhancing web accessibility for individuals with special education needs","authors":"Denislav Lefterov, H. Hristov, Svetoslav Enkov","doi":"10.59035/rxvf3370","DOIUrl":"https://doi.org/10.59035/rxvf3370","url":null,"abstract":"An important aspect in software development nowadays is digital opportunities for meeting the needs of disadvantaged affected people with Special Education Needs (SEN). In this article, we consider the problem of identifying and improving the accessibility of web platforms designed for users who have SEN. To achieve this goal, a model was created and implemented in the web platform sopbg.org. The specialized website, which is maintained and developed by the authors of the publication, unites a community of several thousand users with SEN. The intensive consumption of the platform provided the authors with the opportunity to make a number of improvements to the applied model, some of which should be considered.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88214725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of communication parameters based on monitoring and statistical modelling 基于监测和统计建模的通信参数研究
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-06-01 DOI: 10.59035/kqeh1710
R. Romansky
{"title":"Investigation of communication parameters based on monitoring and statistical modelling","authors":"R. Romansky","doi":"10.59035/kqeh1710","DOIUrl":"https://doi.org/10.59035/kqeh1710","url":null,"abstract":"For the effective construction of a network infrastructure, it is recommended to carry out a preliminary investigation of communications and information processing by using suitable methods and tools. In this regard, the article deals with an approach applied in the investigation of network communications in a local network structure based on program monitoring and statistical analysis of the measured data. To specify the research object and the means used, the organization of the network structure is presented, and a brief discussion of sample monitoring programs is made. The organization for the conducted program monitoring is presented and main factors of network communications are defined. Statistical modelling approach is used to investigate selected parameters of communication in the network environment. Some obtained statistical assessments are presented which permit to make conclusions for access and communication organization.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82157324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operational control of probabilistic processes in a multi-stage specialized system 多阶段专用系统中概率过程的运行控制
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-06-01 DOI: 10.59035/kdzi3377
O. Kravets, I. Aksenov, P. Rahman, I. Atlasov, Yu. R. Redkin, O. Frantsisko, O. Zaslavskaya
{"title":"Operational control of probabilistic processes in a multi-stage specialized system","authors":"O. Kravets, I. Aksenov, P. Rahman, I. Atlasov, Yu. R. Redkin, O. Frantsisko, O. Zaslavskaya","doi":"10.59035/kdzi3377","DOIUrl":"https://doi.org/10.59035/kdzi3377","url":null,"abstract":"A process consisting of sequential operations is considered. For each operation, you can determine the currently available probability of its error-free (high-quality) execution. By the qualitative performance of the operation, we will understand the achievement of a given level of quality in quantitative proportion to the overall level. The purpose of the article is to build a quality management strategy in which a set of probabilities of quality levels not less than a certain threshold value is achieved, with minimal costs for carrying out appropriate measures. The article presents the decomposition of operations into activities; classification of activities into activities with conditionally linear or asymptotic response; quality assessment in a multi-level control system with response functions of various types; optimization problems and their algorithmic solutions.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78646174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the necessity of shaping Bulgarian national interests in terms of global uncertainty 关于在全球不确定的情况下塑造保加利亚国家利益的必要性
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-06-01 DOI: 10.59035/rdxf8060
Nikolay Tsonkov
{"title":"On the necessity of shaping Bulgarian national interests in terms of global uncertainty","authors":"Nikolay Tsonkov","doi":"10.59035/rdxf8060","DOIUrl":"https://doi.org/10.59035/rdxf8060","url":null,"abstract":"The global security system is undergoing a profound transformation. In this process, the international community is seeking the shape of a new security architecture and international order. At the same time, the Bulgarian state is characterised by a lack of clearly articulated strategic interests. This circumstance is reflected in the weak role of the Bulgarian state in regional and international affairs. In this regard, it is necessary to formulate Bulgaria's main foreign policy interests that will position the country in the new global system.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84432116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信