№ 110(6), June, 2015
Public date: 30.06.2015
Archive of journal: Articles count 121, 265 kb
-
MODEL OF INFORMATION EXPOSURE IN SOCIAL NETWORKS
DescriptionOn the basis of hydrodynamic analogy between turbulent transport of momentum, heat and mass transfer, and information in the conditions of modern electronic social networks, we consider a model of informational influence. The flow of information is represented as a stream of random events with simplest flow properties. In addition to the flow of information impact there were introduced the concepts of density, velocity and viscosity of the information flow. These parameters had been derived from the construction of dimensionless criteria characterizing the balance between inertia and viscosity of the information flow of information influence. This criterion serves as a numeric parameter determining the boundary of the transition from low-intensity to high intensity of information influence the turbulent nature of the attack. We have also analyzed the ranges of changes and the meaning of the entered parameters from the point of the organized network information inserts. The existence of the information in time and procedural nature of the concept of information allow us to focus on the properties of information flow as inertia, dynamics and relaxation
-
MODEL OF INFORMATION SECURITY FOR CONTROL PROCESSES OF COMPUTER NETWORKS
DescriptionIn order to improve the security of information transfer we have offered one of the possible approaches to modeling process control computer networks with elements of intelligent decision support. We proceed from the graph model of network nodes which are network devices with software control agents, and arcs are logical channels of information exchange between the equipment computer systems. We built an addressless sensing technology which ensures the completeness of monitoring of all network equipment. To classify the computer networks state we provided a method for calculating the values of reliability. Development of signal mismatch triggers the control cycle as a result of which the adjustment of the state of network equipment. For existing tools we proposed adding network control expert system consists of a knowledge base, inference mechanism and means of description and fill in the knowledge base
-
PROVIDING INFORMATION SECURITY OF DATA-PROCESSING NETWORK WITH USE OF INTELLIGENT SYSTEM
DescriptionThe article is devoted to creation of intelligent management system of complex data-processing network. This is caused by the fact that modern telecommunication hardware generates growing amount of statistic information. Expert system is offered to be used in management of networks for the purpose of information security
-
USING TECHNOLOGIES OF EXPERT SYSTEMS FOR SECURITY IN INFORMATION SYSTEMS
DescriptionThe article is devoted to the expert systems technology using to monitor the correct operation of the software and databases. It is noted that the main issues of security management in critical information systems is a process of observation and collection of information in a computing environment. Observation results should be evaluated and processed by an expert on security and then recorded in the database of expert systems. One of the possible options for security management of distributed computing network - creating a security machine. It will ensure: minimum response time to external perturbations; the accuracy of the audit protected by S-interface and independent decision-making process of the state of the controlled elements of information systems. After that, the agent is completely worn out; it is destroyed and replaced by a new one. This aging mechanism protects agent from analyzing and from external attacks
-
DIAGNOSTIC OF ANOMALIES IN DATA-PROCESSING NETWORKS WITH USE OF VARIETY OF INFORMATION EXCHANGE
DescriptionThe work is devoted to searching efficient detection methods of anomalous state in data networks. There is a structure of modern informational attacks detecting system. There are short review and analysis of information system network security facilities. Two main technologies of attack detection are described: anomaly detection and misuse detection. It is shown that every detection of anomalies is based on assumption that anomalous behavior is deflection from normal profile of behavior. It is hard to implement this technology, although there is some progress when expert system, fuzzy logic and so on are used for this purpose. Action patterns or symbols assets which describe anomaly activity are used as attack signature in misuse detection method. Author offers to use benefits of both methods for solving the problem
-
SYSTEMS OF REMOVING NETWORK ANOMALIES AND METHODS OF CREATION THEIR ARCHITECTURE
DescriptionDifferent stages of designing architecture of detection systems and opposition to network anomalies are analyzed in this article. It is pointed that common classification can be to determine state of network: “normal”, “critical”, “faulted”. Bases for building architecture of detection and removing anomalies are offered
-
Description
The article deals with the historical aspect of the formation of microbial-plant relationships. We study the details of the way the separate form components of the system "Microorganisms-plant" in the course of evolution. The research is based on the historical analysis of the interactions between microorganisms and plants. As a result of interactions a microbial-plant complex is formed. The article describes some types of interactions between microorganisms and plants. In general, various forms of symbiosis are components of a single evolutionary continuum
-
MICROBIAL COMMUNITIES OF KARPOSPHAERA AND PHILLOPLAN OF SOME PLANTS OF GROSSULARIACEAE FAMILY
DescriptionThe article presents the results of the research of microflora composition of the leaf surface, the surface of fruit and flowers of Ribes nigrum, R. niveum, R . rubrum and Grossularia reclinata. The research was carried out in the seasonal dynamics from 2007 to 2014. The authors used the method of print for isolating microorganisms from plants. For convenience of calculations and contamination comparison of different environmental niches of plants the number of selected microorganisms was counted on the surface of 1 cm2. It was found out in the article that microorganisms on the surface of lamina are distributed unequally. The number of microorganisms on the bottom surface of the foliage in all periods turned out to be higher. The greatest number of microorganisms was recorded in autumn and reaches the highest value in October. The number of microorganisms on fruit surface increased with ripening and was the highest in July. The quantity on the flowers varies considerably throughout the flowering and is represented minimally compared to other plants niches. The study revealed species-specificity of microorganisms and the host plants. At the same time, long-term study of the microflora of plants belonging to one family made it possible to reveal species that are typical epiphytes
-
SOIL DEGRADATION AND THE ROLE OF FOREST BELTS IN LAND MELIORATION
DescriptionSoil degradation (erodere – eat away, lat.) - a process when pieces of rocks and soil are separated from their initial location. Then transferred and deposited in some new place. The factors of erosion are water, wind, landslides, rock particles and etc. Erosion is the process of destruction and demolition of the soil cover (or parent rocks) by flows of water or wind which causes depletion of fertile top soil layer. The destruction of this layer occurs quickly, and for its restoration thousand years are required. Reduction of soil fertility is one of the main problems that are associated with its pollution. Erosion is a natural process that occurs very slowly ever since the Earth was formed (about 45-50 billion years ago). Realistically, mountains, valleys, plains and deltas on the Earth's surface have been created by water and wind erosion as a result of their joint action over a long period of time. Geological erosion was acted at a slow pace for hundreds of years. When humans appeared it occurred to be an invasion of species which could transform their natural environment. An artificial type of erosion, which acts much faster than the natural erosion, was formed because of human
-
Description
At present, the cultivation of agricultural products is on a level where the growth of productivity and quality is only possible by using the latest achievements of science. Scientists have been developing elements of agro-technologies of complex applications of growth regulators, fungicides and fertilizers in growing winter wheat, providing a significant increase in productivity and quality of agricultural products, reduction of labor costs, energy and all kinds of resources, sustainable harvesting, even in the zone of risky agriculture. Plant growth regulators have multifunctional properties, which are expressed in the regulation of plant growth and development, and in increasing their resilience to adverse weather conditions and many diseases. However, despite the fact that there are many examples of extremely high economic efficiency of plant growth regulators, in terms of production and use of pesticides are much inferior. Retardants and defoliants are used more widely. However, low rates of regulators and elicitors, the ability to manage with their help the growth and development of plants; change the resistance of plants to various external factors determines their prospects. We propose to apply the "agrochemical cocktails." It will induce the systemic plant resistance to the whole growing season, which is not possible in the case of using only one of the fungicides and bactericides. It is necessary to take into account the features of the functioning of the immune system of plants and to develop technological methods of influence on the key stages of the immune response of plants