Physics, mathematics, and technology

Physics, mathematics, and technology

Mathematics and computer science

Analysis of Algo­rithms for Computing in Jacobian of a Picard Curve

Abstract

In this article a representation of the elements of the Jacobian of a Picard curve is considered, which allows us to construct an algorithm for the reduc­tion of divisors with complexity O(deg(D)). Addition of divisors can be per­formed using the reduction algorithm.

Download the article

Acceleration of Computations in Jacobian Hyperelliptic Curve

Abstract

In article is stated the method of acceleration of procedures of addition and doubling points Jacobian of a hyperelliptic curve in affine and projective coordinates. Corresponding modified Miller algorithms are developed. In af­fine coordinates an expense for group operation of doubling there are more than expenses for group operation of addition, therefore it is more favorable to realize consistently two additions, than doubling and addition. Estimations of efficiency of the modified algorithms are received.

Download the article

Using Python Libraries for Analysis of the Customer Churn Rate of a Bank

Abstract

At the present time, competition for customers among banks is escalat­ing. The indicator of customer churn is very important for the analysis and planning bank work. Five algorithms for calculating the outflow of bank cus­tomers are used in this article. Program codes are written in Python.

Download the article

Development of a Method of Optimal Design of Structure and Pa­rameters of Technical Means of Information Protection

Abstract

Based on the specific features of technical means of information protection as a special class of complex systems, it is proposed the problem of synthesis of structure of means of protection to decide as a multicriterion optimization problem taking into account the influence of structure and performance on se­lected quality indicators.

Download the article

Information Support of Retraining Programs for In­formation Security Specialists in Regional Educational and Research Centers

Abstract

The article proposes ways to eliminate ambiguity in the conduct of re­training of information security specialists in training centers of enterprises and organizations, through the development and application of automated in­formation systems in the form of training programs and software simulators.

Download the article

Training of Students of Nautical Directions in the Field of In­formation Security

Abstract

The article analyzes the system of training students of Maritime Univer­sity in the field of information security. Determination of the content of com­petence of graduates of the Maritime University in the field of protection of information flows on the ship-to preserve and ensure the integrity and confi­dentiality of information. Formulation of tasks, the solution of which is aimed at achieving the goal.

Download the article

Investigation of Criminal Cases Done in the Field of Cir­culation of Digital Financial Assets

Abstract

The authors highlight the latest trends in the legal regulation of crypto­currencies in the Russian Federation, identify difficulties associated with the investigation of the theft of crypto assets. On the example of practical situa­tions, the authors propose a set of possible actions that need to be carried out by the bodies conducting the preliminary investigation or by the body con­ducting operational-search activities in the investigation of the theft of crypto­currency. Mainly, the article focuses on the evidence aspect related to the col­lection, analysis and fixing of evidence obtained at the pre-trial stages of crim­inal proceedings. The main result of scientific research is the development of a methodology for investigating crimes in which crypto assets are the subject of a criminal attack.

Download the article

Using Gaming Technologies in the Education of In­formation Security Specialists

Abstract

The paper analyzes the basic gaming technologies that are possible for useful use in the process of education information security specialists. The game processes and tools that allow students to acquire the necessary profes­sional skills are considered. A comprehensive course on the application of gaming technologies is proposed that simulates the activities of specialists of building information systems, protection and security monitoring.

Download the article

ASTP Information Security Audit Issue

Abstract

The problems that arose during the formulation of tasks and during the audit of information security of automated process control systems at the enterprise were studied. Features of the audit of automated process control systems during their joint work with other systems are indicated. Safety criteria relevant to the process control system are considered. The types of audit of multi-level information systems with integrated process control systems are presented and characterized, their suitability for various classes of checks is analyzed.

Download the article

Cloud Service Analysis of Opera­ting Systems and Applications

Abstract

The presence of a large number of vulnerabilities in modern operating systems and software that pose a threat to information security determines the need to study them when training specialists in the field of information securi­ty. The article discusses the principles of building a software and hardware complex based on the joint use of cloud and virtualization technologies; de­scribes the assembly method of the OpenStarck operating system; examples are given that confirm the operability of the chosen approach.

Download the article

Ill Posed Problems and Information Security

Abstract

Well posed (by Hadamard) problem has properties of existence, unique­ness and stability of its solution. Ill posed problems do not have at least one of the above properties, often this is the stability property of the solution with re­spect to initial conditions. The solution of such problems is sensitive even to a small change in the values of the input data, and so we do not guarantee an acceptable approximation to the answer at the level of the existing error in the measurement of initial values. The paper discusses the use of the instability ef­fect for the synthesis of cryptographic transformations using natural noise in radio channels.

Download the article

Design and Calculation of a Scalable Infocommuni­cation Network for a Shopping Center

Abstract

Paper is devoted to the development of model project of scalable infocommu­ni­cation infrastructure for shopping centers using the example of the «Z-FORT» shopping center. The analysis of the selected object, the calculation of the re­quired throughput, the preparation of technical requirements. A search was also made for the necessary technical solutions and a review of the necessary network technologies. The cited material allowed us to develop a model project for scalable infocommunication infrastructure for shopping centers.

Download the article

Theoretical and experimental physics

Estimation of Target Elevation Angles in Meter Radars

Abstract

The problem of estimating the angles of the target location in the radar meter wave range, associated with the interference of direct and reflected from the earth's surface waves. In the area of small site angles, the directional pat­terns for the forward and reflected waves merge together and significantly dis­tort the estimates of the target site angles. The possibility of solving the prob­lem of estimating the angles of the target site by three methods is analyzed: the method of angular spectral analysis, the method based on the likelihood equa­tions, the method of maximum likelihood with high resolution, developed at the IKBFU. On the basis of the likelihood functional, expressions are de­rived that define the radiation patterns of the antenna system and the surface of the likelihood functional. Results of model researches of potential possibili­ties of estimates of angles of a place by three methods are presented. It is shown that the maximum likelihood method with a high resolution interferen­ce has no systematic errors in estimates of elevation angles, as the low correla­tion and the large correlation of direct and reflected waves. This method sol­ves the problem of estimating the angles of the place in the range of 0,5 ÷ 85° with a signal-to-noise ratio of ≈ 30 dB.

Download the article