404 research outputs found

    SYNERGY OF BUILDING CYBERSECURITY SYSTEMS

    Get PDF
    The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed. ISBN 978-617-7319-31-2 (on-line)ISBN 978-617-7319-32-9 (print) ------------------------------------------------------------------------------------------------------------------ How to Cite: Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: http://doi.org/10.15587/978-617-7319-31-2 ------------------------------------------------------------------------------------------------------------------ Indexing:                    Розвиток сучасної світової спільноти тісно пов’язаний з досягненнями в області обчислювальних ресурсів і кіберпростору. Формування та розширення асортименту послуг базується на досягненнях людства у галузі високих технологій. Однак стрімке зростання обчислювальних ресурсів, поява повномасштабного квантового комп’ютера посилює вимоги до систем безпеки не тільки інформаційно-комунікаційних, але і до кіберфізичних систем і технологій. У першому розділі обговорюються методологічні основи побудови систем безпеки для об'єктів критичної інфраструктури на основі моделювання процесів поведінки антагоністичних агентів у систем безпеки. У другому розділі пропонується концепція інформаційної безпеки в соціальних мережах, яка заснована на математичних моделях захисту даних, з урахуванням впливу конкретних параметрів соціальної мережі та наслідків для неї. Враховуються нелінійні взаємозв'язки параметрів системи захисту, атак, соціальних мереж, а також вплив індивідуальних характеристик користувачів і характеру взаємовідносин між ними. У третьому розділі розглядаються практичні аспекти методології побудови постквантових алгоритмів для асиметричних криптосистем Мак-Еліса та Нідеррейтера на алгебраїчних кодах (еліптичних та модифікованих еліптичних кодах), їх математичні моделі та практичні алгоритми. Запропоновано гібридні конструкції криптокоду Мак-Еліса та Нідеррейтера на дефектних кодах. Вони дозволяють істотно знизити енергетичні витрати на реалізацію, забезпечуючи при цьому необхідний рівень криптографічної стійкості системи в цілому. Запропоновано концепцію безпеки корпоративних інформаційних та освітніх систем, які засновані на побудові адаптивної системи захисту інформації. ISBN 978-617-7319-31-2 (on-line)ISBN 978-617-7319-32-9 (print) ------------------------------------------------------------------------------------------------------------------ Як цитувати: Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: http://doi.org/10.15587/978-617-7319-31-2 ------------------------------------------------------------------------------------------------------------------ Індексація:                 &nbsp

    A Journey to Self

    Get PDF
    The initial intent of this project was to define a future direction by focusing on intuitive problem solving and work with a life coach. The plan exploited a tactile preference with work in fiber, glass and paint. In order to enhance skills of reflection, the plan included lessons in yoga and participation in the Expert2Expert conference and the Creative Problem Solving Institute conference. Key learnings of the project included clarification of a strong preference to embrace the present and a willingness to allow the future to unfurl. It became obvious that I also have a clear preference for tactile, creative process – as indicated by the attached wall hanging (A Journey to Self: Divergence and Convergence). It has also become clear that that Learning is a key passion. Finally, there is a growing importance of voice – both in explaining my introvert preference to others (including my students) and in tactile expression through work with hot glass and weaving

    The Transformative Power of Deliberate Creativity: Reflections of a Priest Creativity Practitioner

    Get PDF
    The idea of creativity continues to gain global currency as the tool for growth and development, especially in our contemporary world. There is an emerging universal paradigm shift that promotes creativity as something that could be structured and deliberate as against the erstwhile belief that it is restricted and by chance. Nevertheless, some individuals, groups, and climes are yet to fully embrace creativity in all its ramifications. Creativity practice is one of the means to foster and sustain creativity in persons and groups. Consequently, nurturing creativity continues to impact people and contexts. Through four case studies, this project presents a fortuitous journey of an unlikely party which begins from without and ends on a personal discovery which transforms both the subject-facilitator and the various contexts in which deliberate creativity practice is facilitated. A case is made for the espousal of deliberate creativity as a veritable skill for the growth and development of not only organizations but persons thereby touting creativity in a deliberate manner as an indispensable skill for all times and for transformation of all human situations

    Giving Technology the Place It Deserves in Creative Problem Solving

    Get PDF
    This project explores the potential for using artificial intelligence (AI) in Creative Problem Solving (CPS) to facilitate a creative process. It invites members from the technology and CPS communities to see the opportunities for AI-augmented creative problem solving, and to join forces to turn those opportunities into reality. To this end the author looks at creativity through a knowledge-centered lens. He proposes a model based on how the human brain makes connections, to enable AI developments that help transform the knowledge residing in a team and/or from external resources into creative solutions. A vision of how AI could be leveraged in specific CPS tools and the facilitation of an unconference session are some of the other outcomes presented

    Describing the Falls Prevention Program at an Acute Care Hospital in Ontario Using Leveson’s Systems Model

    Get PDF
    Falls are the most frequent adverse event in acute care hospitals. Although a large number of studies have addressed the patients’ risk factors for falls and best practices in fall prevention, patients falls still remain a major problem. This study applied a systemic methodology (Causal Analysis based on STAMP (CAST)) to depict Ontario’s acute care hospital structure related to patient fall prevention. The system’s component behaviours and interactions were described and deficits and inappropriate control mechanisms among the system’s controllers were identified. As a result of the CAST analysis, the complexity of the health care system, lack of a consistent and clear fall prevention strategy, risk assessment tool and fall data analysis methodology, and effective communication between the controllers were identified as potentially problematic. Suggestions were offered to improve these gaps

    Second Look Commission 2017 Annual Report

    Get PDF
    https://digitalcommons.memphis.edu/govpubs-tn-commission-children-youth-second-look-commission-annual-report/1005/thumbnail.jp

    3D-printed adsorbents for gas separations: A material development, kinetic assessment, and process performance investigation

    Get PDF
    “Adsorbent materials are promising for various gas purification processes, however, forming them into structured contactors is paramount in enhancing mass transfer properties and reducing pressure losses. In this research, various adsorbents were engineered into structured contactors with 3D printing. The overall goal of this research was to improve the formulation methods of 3D-printed adsorbents and understand their performances in gas separation processes. The specific objectives were to 1) develop new adsorbent 3D-printing strategies, 2) understand the kinetic properties of printed adsorbent monoliths, and 3) assess their process performances. Objective one was addressed by developing five 3D printing techniques: i) oxide seeding and secondary MOF growth (Paper I), ii) direct ink writing of amine-modified MOFs (Paper II), iii) polymer seeding with MOF growth (Paper III), IV) MOF precursor incorporation into printable sol-gels with thermal coordination (Paper V), and v) binderless zeolite printing with sacrificial pectin and gelatin biopolymers (Paper VI). Objective two was addressed by varying the monolith cell density (Paper IV), adsorbent loading method (Papers II-III, V-VI) and macropore space (Paper IV-VI) to determine how these properties relate to printed monoliths’ mass transfer rates. Objective three was addressed by varying the process conditions in a PSA system over a 3D-printed MOF-74 (Ni) monolith for CO2/H2 separation (Paper VII) and over an activated carbon monolith bed for CO2/CH4 separation (Paper VIII). Overall, this research indicated that developing new printing methods can enhance the physiochemical and kinetic properties of printed adsorbent monoliths, established that printed monoliths’ kinetic rates are limited by molecular diffusion, and demonstrated that printed adsorbent monoliths can achieve comparable PSA separation performance to established benchmarks”--Abstract, page iv

    Educational Considerations, vol. 15(3) Full Issue

    Get PDF
    Educational Considerations, vol.15 (3) Fall 1988 - Full issu

    Implementing a Database to Intervene in and Reduce Gun Violence in Rochester, NY

    Get PDF
    The purpose of this thesis was to examine the issue of gun violence, specifically urban gun violence in the city of Rochester, New York. The goal was to gain an understanding of the circumstances surrounding these shootings and to learn how to potentially reduce these types of incidents. In order to do this, we created a database containing over 200 different variables covering incident information, victim/suspect information, weapons information, circumstances, and outcome of the investigation. All fatal and non-fatal shootings in the City of Rochester between years 2010 and 2012 were entered into this database. These three years’ worth of data were then analyzed. One of the most notable findings included the large proportion of shootings that were identified as being the result of some type of dispute. It was also found that over half of the shootings had some degree of gang involvement, and the overwhelming majority of all shootings in the study were carried out by handguns. Additionally, less than half of the victims claimed to not know their attacker. Based on this information, it is safe to say that most shootings in Rochester are not random; there is likely a precursor or series of events leading up to the shooting. This tells us that intervention is possible if we identify ongoing disputes that are escalating in violence. Once we identify the violent disputes, we can focus police, social, and political resources in those acute areas and groups. This project helped to secure funding for these exact types of programs through the New York State Gun Involved Violence Elimination (GIVE) initiative, as well as the Smart Policing Initiative (SPI) Violent Retaliatory Dispute Project
    corecore