The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Use of the well-developed existing railway network of the European territory of Russia to create a viable transport link between Europe and Asia in order to increase the competitiveness of the Euro-Asian Railway Transport Corridors (EARTC).
This article contains information about the ability to authenticate a user on the movements of the smartphone in his hand during user interaction with the screen. Currently, user authentication based on their individual characteristics is very popular. The article considers one of the methods of authentication based on behavioral biometrics. Using the proposed model of the application The possibility...
The article raises the issues of improving the quality of servicing microprocessor systems of railway automatics and telemechanics. The analysis of algorithms and schemes of interaction between the operational state of the STC divisions and the MPC Ebilock 950 service centers showed the existence of some shortcomings that hamper improving the quality of servicing microprocessor devices. The alternative...
The article is devoted to the study of the method of self-learning of an artificial intelligence, based on the use of software tools for collecting information from various Internet resources. There is developed a web crawler that analyzes Internet resources for the presence of false articles by data mining methods based on an artificial intelligence and by self-learning through the mechanism of neural...
Modern approaches to the creation of expert systems were considered. Also, the main prospects for the development of expert systems that work on the basis of neural networks were considered.
A technique and algorithms for early detection of the started attack and subsequent blocking of malicious traffic are proposed. The primary separation of mixed traffic into trustworthy and malicious traffic was carried out using cluster analysis. Classification of newly arrived requests was done using different classifiers with the help of received training samples and developed success criteria.
The current state of the problem of distributed attacks aimed at denial of service is investigated, the last DDoS attacks are monitored. The most popular type of DDoS attacks continues to be httpflood. The modern methods of diagnosing DDoS-attacks are investigated. Positive and negative aspects of these methods were identified.
Visual analytics is an actively developing multidisciplinary research area which can be successfully used in the field of information security management. The visual analytics techniques are used to monitor information security level of the information system and form situation awareness of the security officer. However, there are still some open issues in visual analytics tasks to be considered....
Mathematical models of the transport flow based on the equation of continuity of the transport stream are analyzed. A method for approximating the observational data on the relationship between the flow density and the velocity of motion based on the modification of the method of least squares is developed. A mathematical model of a diffusion-type traffic flow in stochastic conditions is proposed.
In today's economic conditions, engineers are faced with the problem of designing complex distributed computer systems under tight deadlines. Ensuring high reliability and robustness of such systems requires redundancy of their structure as well as the processes of data transmission and handling. The purpose of this study is to create simulation models and means to support computer-aided design of...
The article considers issues of assessment of security threats to information systems. The analysis of existing approaches to the problem and requirements of the national standards. Noted the disadvantage of the classical approach to the assessment of possible threats. Proposed an alternative approach based on the use of statistics of incidents, in particular, proposed the creation of a single database...
The main formal tasks of the information security risk management process using functional and contextual models reflecting the basic concepts and basic functions of information security risk management systems.
In the article the questions of application of the so-called technology of “Internet of things”. Analysis of the content and prospects of the development. Systematized and generalized information security of this technology, feasible solutions to existing problems. Detailed considered the triad of information security — confidentiality, integrity, availability.
The basic stages of transport system of the country and transport services development. Necessity of amplification (strengthening) of coordination and development of researches is shown in the field of transport construction with maintenance of his(its) normative equipment with duly entering into norms and rules of building manufacture of achievements of adjacent fields of knowledge and the approved...
The aim of this work is to develop an authentication method using keyboard typing based on fuzzy logic. The paper considers a function that takes into account the minimum and maximum limits of biometric characteristics and the dependence of the stability of keyboard typing on its stability. As a result, a deviation factor is introduced to determine how much the biometric characteristic of the user...
This article contains information about the ability to authenticate a user based on the underscore of finger movement over the touch screen. Currently, users authentication based on their individual characteristics is very popular. The article considers one of the methods of authentication based on behavioral biometrics. Using the proposed model of the application the possibility of recognizing the...
The article presents an approach for the building of institutional and organizational fundamentals of a regional marine transportation system strategic development by means of adaptation of a modern vision of the cluster functional purpose and formalization of a structural and logical model of the regional marine transport and logistics cluster model.
The analysis of transport indicators of the region is carried out. The structure of the model is given. An algorithm of iterative parameters is described. General conclusions and suggestions are made. They make it possible to outline the prospects of the innovative growth by the relevant directions (power and transport complexes, social sphere, tourism and recreation, agriculture). In order to forecast...
To improve safety in transport, exact mathematical models of transport systems are required. The technique of simulation of exact differential equations of mechanical systems is considered, which makes it possible to compile mathematical models of both systems of transportable bodies and transport objects whose motion is determined and depends on wearable systems moving in a certain prescribed manner...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.