№ 110(6), June, 2015
Public date: 30.06.2015
Archive of journal: Articles count 121, 265 kb
-
MODEL OF INFORMATION EXPOSURE IN SOCIAL NETWORKS
Description
On the basis of hydrodynamic analogy between turbulent transport of momentum, heat and mass transfer, and information in the conditions of modern electronic social networks, we consider a model of informational influence. The flow of information is represented as a stream of random events with simplest flow properties. In addition to the flow of information impact there were introduced the concepts of density, velocity and viscosity of the information flow. These parameters had been derived from the construction of dimensionless criteria characterizing the balance between inertia and viscosity of the information flow of information influence. This criterion serves as a numeric parameter determining the boundary of the transition from low-intensity to high intensity of information influence the turbulent nature of the attack. We have also analyzed the ranges of changes and the meaning of the entered parameters from the point of the organized network information inserts. The existence of the information in time and procedural nature of the concept of information allow us to focus on the properties of information flow as inertia, dynamics and relaxation
-
MODEL OF INFORMATION SECURITY FOR CONTROL PROCESSES OF COMPUTER NETWORKS
Description
In order to improve the security of information transfer we have offered one of the possible approaches to modeling process control computer networks with elements of intelligent decision support. We proceed from the graph model of network nodes which are network devices with software control agents, and arcs are logical channels of information exchange between the equipment computer systems. We built an addressless sensing technology which ensures the completeness of monitoring of all network equipment. To classify the computer networks state we provided a method for calculating the values of reliability. Development of signal mismatch triggers the control cycle as a result of which the adjustment of the state of network equipment. For existing tools we proposed adding network control expert system consists of a knowledge base, inference mechanism and means of description and fill in the knowledge base
-
PROVIDING INFORMATION SECURITY OF DATA-PROCESSING NETWORK WITH USE OF INTELLIGENT SYSTEM
Description
The article is devoted to creation of intelligent management system of complex data-processing network. This is caused by the fact that modern telecommunication hardware generates growing amount of statistic information. Expert system is offered to be used in management of networks for the purpose of information security
-
USING TECHNOLOGIES OF EXPERT SYSTEMS FOR SECURITY IN INFORMATION SYSTEMS
Description
The article is devoted to the expert systems technology using to monitor the correct operation of the software and databases. It is noted that the main issues of security management in critical information systems is a process of observation and collection of information in a computing environment. Observation results should be evaluated and processed by an expert on security and then recorded in the database of expert systems. One of the possible options for security management of distributed computing network - creating a security machine. It will ensure: minimum response time to external perturbations; the accuracy of the audit protected by S-interface and independent decision-making process of the state of the controlled elements of information systems. After that, the agent is completely worn out; it is destroyed and replaced by a new one. This aging mechanism protects agent from analyzing and from external attacks
-
DIAGNOSTIC OF ANOMALIES IN DATA-PROCESSING NETWORKS WITH USE OF VARIETY OF INFORMATION EXCHANGE
Description
The work is devoted to searching efficient detection methods of anomalous state in data networks. There is a structure of modern informational attacks detecting system. There are short review and analysis of information system network security facilities. Two main technologies of attack detection are described: anomaly detection and misuse detection. It is shown that every detection of anomalies is based on assumption that anomalous behavior is deflection from normal profile of behavior. It is hard to implement this technology, although there is some progress when expert system, fuzzy logic and so on are used for this purpose. Action patterns or symbols assets which describe anomaly activity are used as attack signature in misuse detection method. Author offers to use benefits of both methods for solving the problem
-
SYSTEMS OF REMOVING NETWORK ANOMALIES AND METHODS OF CREATION THEIR ARCHITECTURE
Description
Different stages of designing architecture of detection systems and opposition to network anomalies are analyzed in this article. It is pointed that common classification can be to determine state of network: “normal”, “critical”, “faulted”. Bases for building architecture of detection and removing anomalies are offered
-
06.00.00 Agricultural sciences
UTILIZATION OF THE WORLD TOBACCO COLLECTION’S GENETIC RESOURCES FOR BREEDING
06.00.00 Agricultural sciences
Description
Tobacco collection of All-Russian research institute of tobacco, makhorka and tobacco products is unique and only in the world because of its quantity and composition. It has 4500 foreign and national sorts of tobacco, Nicotiana Rustica and wild species of Nicotiana variety from 70 countries around the world. According to sort breeding aims, compliant with agricultural demands for 20 year period (1994-2014), 15 000 sorts of tobacco, Nicotiana Rustica and wild species of Nicotiana variety were analyzed. 820 donor sorts with valuable properties were defined and the best of them were involved in breeding process. During national selection history on the base of institute’s world tobacco collection over 180 sorts and hybrids of tobacco were created by our breeders. In recent years the interest from farmers and other small plant growers in tobacco production is constantly raising. As some of them are from northern non-traditional for Russia tobacco growing regions there is necessity for more intense utilization of the world collection’s genetic resources
-
06.00.00 Agricultural sciences
Description
The article discusses the influence of conventional technology and the technology of direct seeding at different doses of mineral fertilizers on the growth, development, productivity and economic efficiency of winter wheat cultivation on the leached black soil of the Central Caucasus. It is established that the cultivation of winter wheat without tillage its vegetative mass, leaf area and the efficiency of the assimilation apparatus is significantly less than for sowing the traditional tillage technology recommended by scientific institutions in the region. It is caused by excessive seal of leached black soil, which was used in the study. Such a density of addition of black soils adversely affects the growth, development and yield of crops. As a result, the yield of winter wheat on the technology of direct seeding without fertilizers was 2.46 t / ha, which was significantly lower than for conventional technology, which received 3.21 t / ha. Adding fertilizers increased crop yield for both technologies, but it was significantly higher on the traditional technology. Despite the decline in production costs for the cultivation of winter wheat without tillage, higher profits and profitability were obtained using traditional technology
-
06.00.00 Agricultural sciences
Description
The article presents the results of diagnosis of soybean plants with sulfur, molybdenum and boron in a Western Ciscaucasia on leached chernozem (black soil). The soil testing has shown that the availability of sulfur in the experimental plots is low (2,10-7,02 mg / kg), molybdenum - average (0,20-0,28 mg / kg), boron - low to high (0, 22-0,63 mg / kg). The sulfur content was optimal in 2013 (2309 mg / kg), molybdenum - 2013 and 2014 (1.11 and 0.94 mg / kg) and the boron content was high (65,2-94, 1 mg / kg) in soybean plants. The soybean plants needed sulfur fertilizer in 2012 and 2014, molybdenum - in 2014, and boron fertilizers are not needed, according to the functional diagnosis. The results of various methods of diagnosis coincided with the response of soybean plants for foliar application: sulfur fertilizer increases the yield in 2012 and 2014 by 7.1 and 8.9 %, molybdenum also in 2012 and 2014 - by 6.0 and 10.0 %. Boron fertilizers in 2014 increased soybean yields (17.1%), despite the lack of need for soybean plants in Bor. So, the method of functional diagnostics is more accurate than chemical soil and plant diagnostics
-
BIOLOGICAL ACTIVITY OF DIFFERENT SORTS OF HUMIC COMPLEX AND ITS INFLUENCE ON THE GROWTH OF PLANTS
06.00.00 Agricultural sciences
Description
The article represents the results of the experiments on biological activity of humits of different sorts. The object of research was humic preparation called Vermistar, which was obtained by vermiculturing, on the basis of brown coal. Humics are group of high-molecular substances which have high physiological activity. Humic substances stimulate all biochemical processes on all the stages of plant growth. They change the permeability of the cell membranes, increase activity of ferments, amount of chlorophyll and productivity of photosynthesis. Also humits are not toxic; they don’t have carcinogen and mutagenic effects, so we have a chance of getting environmentally friendly products. The experiment results show high biological activity of humic preparations. Usage of humic stimulates germination, the accumulation of vegetative mass, weight gain. The frequency of shoot has been increased by 17-32%. Height of shoots, roots and vegetative mass has also been increased