14 research outputs found

    Mail client with data transfer protected with end-to-end encryption

    Get PDF
    This article is devoted to the study of the issues of secure messaging and file exchange by e-mail at the enterprises of the agro-industrial complex. The purpose of this work is to develop an algorithmic support and software of mail client that supports the functionality of end-to-end data encryption. The following research methods are used in the article: comparison method, observation method, structural analysis method. The comparison method is used to identify differences between key distribution protocols. Methods of observation and analysis make it possible to understand the behavior of various protocols within systems that differ in technical and software properties. The article consists of four parts: Introduction, Materials and Methods, Results, Conclusions. The first part describes the relevance of the topic, discusses the features of various cryptographic protocols. The second part describes the developed algorithms that ensure the operation of the mail client and end-to-end data encryption. The third part discusses the results of software implementation of the developed algorithms. In the fourth part conclusions are made and summed up. The main results of the work are algorithmic implementation of software for local architecture based on the use of symmetric cryptography; a software tool designed according to a local scheme, including modules that allow you to develop a system on a client-server architecture

    Filtering grayscale images using the Kalman filter

    Get PDF
    This article aims to explore the possibility of using the Kalman filter to filter images. The relevance of the study lies in the fact that at present the tasks of image processing have become of great importance in many areas, such as industry, science, medicine, space industry and agriculture. Methods for improving image quality are of great applied and scientific interest for the agricultural sector, since machine vision methods are now widely used in assessing the condition of agricultural plants, soil condition, sorting of agricultural products, controlling unmanned agricultural machines, etc. The purpose of this work is to develop an algorithm and software for filtering grayscale images. The article consists of four parts: Introduction, Materials and methods, Results, Conclusions. The first part describes the relevance of the topic, discusses the reasons for obtaining noisy images. The second part describes the Kalman filter algorithm as applied to image filtering problems. In the third part, the results of the software implementation of the developed algorithm are considered, which make it possible to evaluate the quality of image filtering. In the fourth part conclusions are drawn and summed up. The main results of the work are the algorithmic implementation of noise removal from halftone images grayscale images using a software tool developed as part of these studies

    Mail client with data transfer protected with end-to-end encryption

    No full text
    This article is devoted to the study of the issues of secure messaging and file exchange by e-mail at the enterprises of the agro-industrial complex. The purpose of this work is to develop an algorithmic support and software of mail client that supports the functionality of end-to-end data encryption. The following research methods are used in the article: comparison method, observation method, structural analysis method. The comparison method is used to identify differences between key distribution protocols. Methods of observation and analysis make it possible to understand the behavior of various protocols within systems that differ in technical and software properties. The article consists of four parts: Introduction, Materials and Methods, Results, Conclusions. The first part describes the relevance of the topic, discusses the features of various cryptographic protocols. The second part describes the developed algorithms that ensure the operation of the mail client and end-to-end data encryption. The third part discusses the results of software implementation of the developed algorithms. In the fourth part conclusions are made and summed up. The main results of the work are algorithmic implementation of software for local architecture based on the use of symmetric cryptography; a software tool designed according to a local scheme, including modules that allow you to develop a system on a client-server architecture

    Algorithm for emergency deletion of files by voice command

    No full text
    The Currently, there is a growing interest in various methods and means of protecting information, which is due to the growing number of crimes related to the violation of confidentiality of information, including through physical access to a computer. There are many ways to protect information from unauthorized access, such as physical security measures, password protection, and so on. However, a situation may arise when all defense lines have already been overcome and there is no other way to quickly block or destroy confidential information in any other way than with the help of a voice command. Thus, the topic of the article is relevant. The object of research is an information system containing confidential information. The subject of the research is the methods of emergency deletion of confidential information. The purpose of this article is to develop an algorithm for urgent deletion of files by voice command. In the course of the work, the algorithm for the emergency deletion of files by voice command was developed, which allows blocking the means of inputting information (keyboard and mouse) and deleting files located in a predetermined folder. The algorithm provides protection against accidental pronunciation of a voice command: before deleting files, a timer is first started, the time of which is pre-set by the user. During the duration of the timer, it is possible to cancel the deletion of files by entering a password, however, there is no way to access the information until the appropriate password is entered

    Filtering grayscale images using the Kalman filter

    No full text
    This article aims to explore the possibility of using the Kalman filter to filter images. The relevance of the study lies in the fact that at present the tasks of image processing have become of great importance in many areas, such as industry, science, medicine, space industry and agriculture. Methods for improving image quality are of great applied and scientific interest for the agricultural sector, since machine vision methods are now widely used in assessing the condition of agricultural plants, soil condition, sorting of agricultural products, controlling unmanned agricultural machines, etc. The purpose of this work is to develop an algorithm and software for filtering grayscale images. The article consists of four parts: Introduction, Materials and methods, Results, Conclusions. The first part describes the relevance of the topic, discusses the reasons for obtaining noisy images. The second part describes the Kalman filter algorithm as applied to image filtering problems. In the third part, the results of the software implementation of the developed algorithm are considered, which make it possible to evaluate the quality of image filtering. In the fourth part conclusions are drawn and summed up. The main results of the work are the algorithmic implementation of noise removal from halftone images grayscale images using a software tool developed as part of these studies

    Practical implementation of scheduling observations of moving objects that appear at random times

    No full text
    The article is devoted to practical implementation of planning of observations of the set of mobile objects appearing in the area of visibility of the measuring information system at random moments of time. A variant of the implementation of the suboptimal distribution of the measuring resources of the information system between the problems of trajectory detection and estimation is proposed. Application of the attitude proposed in the article allows to increase accuracy of measurement of paths of mobile objects up to 52% in comparison with uniform tracking plan

    Development of a real-time document approval system

    No full text
    The article describes the preparation of the document approval system before the start of development, the project architecture, and testing. The work processes are demonstrated, registration and authorization in the system, creation of the document approval process and the approval process itself are considered

    Development of an import–substituting software package for secure file transfer, based on the modified protocol of EL–GAMAL

    No full text
    The article describes the development of modified encryption protocol based on the El–Gamal cryptoalgorithm. The development of an import–substituting software package for secure file transfer, based on the modified protocol of El–Gamal was made also

    Specific features of the practical implementation of observation planning in systems for monitoring networks with dynamic topology

    No full text
    The article is devoted to the issues of practical implementation of planning observations of information processes flows, the sources of which are dynamic network objects that can appear in the network at random times. A variant of the implementation of the suboptimal distribution of time resources of the monitoring system between the tasks of detecting and evaluating random processes that appear in accordance with the laws of the Poisson flow is proposed

    System for detecting of potentially dangerous communications of network users

    No full text
    This work is devoted to the processes of organizing internal information security at the enterprise. The scheme of a software tool for monitoring employee communication and detecting malicious messages using artificial neural network analysis and full-text dictionary search is proposed. A software package designed according to the described scheme has been developed. The scheme of interaction of the program components is considered: a keylogger, a keyboard input analyzer, a user interface, a server coordinating interaction. The schemes of interaction with the analyzer by means of the WebSocket protocol were shown. The interaction of the neural network and the dictionary helped to increase the percentage of accuracy of detecting a dangerous or suspicious message, for example, when the neural network does not consider the text dangerous, and the dictionary considers the opposite, then such text is considered dangerous and is shown to the administrator. Thus, the combination of neural network analysis and dictionary analysis makes it possible to detect more suspicious messages. The work of the software product and its advantages in comparison with other similar systems are demonstrated
    corecore