It is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow each voter to make sure that the vote secrecy and accuracy of vote counting are preserved. In developed democracies, this issue is resolved through a widely available audit of all procedures that may be mistrusted. Any voter can conduct such an audit. The anxiety of citizens of democratic countries is based on the idea that if electronic voting is introduced, it will be impossible to conduct such an audit. The article proposes principles of auditing all those software and hardware tools and processes of the online voting system that can generate voter distrust. This audit is carried out using a dedicated server open to voters and their fiduciaries. This server provides continuous monitoring of actions of the service staff in terms of possible interference in the operation of the voting system. Also, due to this server, auditors receive data on the integrity of the voting system hardware and software including its audit tools and an alarm signal in the event of a threat. It was possible to reduce the average time of processing the voter requests to two seconds. This means that processing a maximum of 2,500 voter requests at a vote station will take no more than two hours. Simultaneous access of 50 voters to the server will not make them wait in the queue for more than 2 minutes. Implementation results were described and links were given for conducting experimental voting on the Internet.
The article is devoted to the study of trends in cybercrime, which is a threat to the country's information security. The place and role of cybersecurity in the system of national security are determined. The state of the system of protection against cyber attacks in the developed countries of the world, such as France, Japan, China, South Korea and the United Kingdom, was analyzed. The main shortcomings and perspectives of protection of cyberspace are revealed. The use of modern information technologies in state structures, as well as in society in general, proposes solving information security problems as one of the main ones. The economy, logistics and security of the country increasingly depend on the technical infrastructure and its security. To improve the effectiveness of the fight against cybercrime, developed countries have long started the appropriate work needed to create their own cyber security strategy. Incidents in the field of cybersecurity affect the lives of consumers information and many other services and cyber attacks aimed at various objects of infrastructure of electronic communications systems or technological processes management. Modern world trends in the development of cybercrime and the strengthening of cyber attacks indicate an increase in the value of combating it for the further development of society, which in turn predetermines the assignment of certain groups of social relations of the cybersphere to the competence of legal regulation. The current situation with cybercrime requires constant improvement of methods the fight against cybercrime, the development of information systems and methods aimed at ensuring the cyber security of the country. Necessary tasks are the development of a national strategy on cybersecurity, which will include tactical and strategic priorities and tasks in this area for state bodies. So, the issue of cyberspace security, the fight against cybercrime is relevant both at the international level and at the level of the individual country, and therefore needs further consideration.
The rapid development of technology led to the need to keep pace with it, especially in the field of image processing, because of its importance in the need to get better results. In this paper, new discrete Chebyshev wavelet transforms (DChWT) derived from Chebyshev polynomials (ChP) were proposed and characterized. In terms of orthogonality and approximation (convergence) in the field of mathematics, (ChP) were qualified to transform into discrete wavelets called (DChWT), depending on the mother function with operators (s, r), and were used in image processing to analyze them in the low filter and the high filter so that the image is analyzed into coefficients. Proximity and detail coefficients, which lead to dividing the image into four parts, low left (LL), in which the proximity coefficients are concentrated while the rest of the parts are centered on the detail coefficients, which are high left (HL), low right (LR), and high right (HR), and image compression through the new filter, which has proven its efficiency at level (8) in our results. The results of the proposed wavelets in this work were reached in calculating quality standards in the image obtained after the compression process after comparing them with the results obtained using the standard wavelet used in HaarSymlet 2, Conflict 2, and Daubecheis 2. The most important of these standards is a mean square error (MSE), peak signal-to-noise ratio (PSNR), bit per pixel (BPP), compression ratio (CR), and table one. In this paper, the efficiency of the proposed new wavelets is explained after adding it to MATLAB and according to a specific program to drop in with the basic wavelets to take on their role in important tasks in the image processing area, like artificial intelligence
It is known that since the early 2000s there has been a rapid increase in data traffic and a significant increase in the need for information flows in the process of providing new types of telecommunications services. This has led to the fact that the existing telecommunications networks have failed or approached the limit of their ability to serve subscribers with specified quality of service. The problem of improving the network architecture of such networks and improving the quality of their operation based on the use of modern methods and principles has arisen and needs constant solution. In this paper the requirements to the bandwidth of the channels of the telecommunication network management system in modern conditions are analyzed and their formalized description is given. In order to assess the bandwidth of the channel of the control network of the telecommunications network on the indicators of the quality of its work in the transmission of various types of data in the work developed and submitted an appropriate methodology. The method is based on mathematical dependences that describe the process of functioning of the telecommunication network management system based on the application of the laws and rules of queuing theory.
UAVs or drones as an alternative solution to providing high-quality Internet service in difficult terrain are environmentally friendly and do not consume electricity during the day as is the case with communication towers. But the developers of the network face difficulties in the drone communication system associated with the need to take into consideration unpredictable weather conditions and terrain, as well as the short life of the drone's batteries. Therefore, the object of this study is the process of managing UAV traffic through the use of gNB-IoT in 5G. The possibility of using a mobile UAV repeater during traffic management using radio resources (RR), radio access network (RAN), the infrastructure with broadcasting tools and dynamic connection using MU-MIMO modulation is shown. The use of these tools makes it possible to connect the drone to the wired base network from the provider and then restore the radio frequency signal and broadcast to another coverage area where this subscriber does not have network coverage, use the channel quality indicator (CQI) representation as a QoE function. Undoubtedly, traffic management is the process of obtaining information about traffic control from one endpoint to another, which confirms the reliability and management of data transmission. Meanwhile, drone traffic management can be used to reduce time delays and remove network interference by relying on Internet of Things programs that use NB-5G technology. The UAV's traffic management improvement process uses a proposed algorithm to generate dynamic flow data management to enhance traffic processing of flow control in the IoT
В статті проаналізовано особливості організації науково-педагогічних експериментів у вищих військових навчальних закладах з підготовки ад’юнктів. Дослідження обумовлено недостатньою увагою вчених до обговорення питання реформування, модернізації системи підготовки наукових та науково-педагогічних кадрів для потреб Збройних Сил України через ад’юнктуру. Проаналізовано вищі навчальні закладі та визначено в яких здійснюється підготовка ад’юнктів за науковою спеціальністю 13.00.04 – «Теорія і методика професійної освіти». Проаналізовано вищі навчальні закладі за яким зареєстровано наукові журнали з метою з’ясування можливості апробації наукових результатів за напрямком педагогічні науки. В рекомендаціях надано пропозицію щодо доцільності у всіх фахових наукових журналах запровадити окрему рубрику дослідження в галузі військової освіти та зараховувати як фахову публікацію здобувачам вченого ступеня доктора філософії та доктора наук з галузі педагогічних наук. Привернуто увагу на показник рівень розвиненості методологічної культури ад’юнктів як кількісний показник коефіцієнта готовності ад’юнктів до організації професійної діяльності.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.