15 research outputs found

    Concept of the system to protect children's access to information in schools using the DLP-system and RFID-technology

    Get PDF
    Nowadays, education is impossible without a computer, especially for children. That's why it is necessary to protect children from information that can harm their health as well as physical or spiritual growth (ineligible information), during their work with computer. There are types of information, which dissemination is prohibited or restricted to children under Russian law. This article describes concept of the system to protect children's access to information in schools using the DLP-system and RFID-technology. Article provides an overview of popular DLP-systems, services and algorithms for the detection harmful textual and image information. Data storage protocol of RFID-tags, which is used in Russian subway, is also considered

    Undetectable interception of network traffic on LAN technologies

    Get PDF
    Nowadays it's impossible to imagine a company that doesn't use Internet and Intranet (LAN) to move confidential data around. Safety measures can be both: hardware and software information security solutions. The cases of development and usage of custom, their own systems of automation of information processing (electronic document management, accounting, backup, etc.) are not rare, any more. In that case information security department assess the sustainability of computer networks or systems to attacks by the software, forgetting the data that being transmitted over the Ethernet (except, perhaps, Wi-Fi channel, but they only checking for cryptographically strong algorithm and a password). In current article, we propose a concept of the device for not-detectable interception (and modification) of the transmitted information through the Ethernet network

    Local conservation laws of second-order evolution equations

    Full text link
    Generalizing results by Bryant and Griffiths [Duke Math. J., 1995, V.78, 531-676], we completely describe local conservation laws of second-order (1+1)-dimensional evolution equations up to contact equivalence. The possible dimensions of spaces of conservation laws prove to be 0, 1, 2 and infinity. The canonical forms of equations with respect to contact equivalence are found for all nonzero dimensions of spaces of conservation laws.Comment: 11 pages, minor correction

    Similarities and differences in the historical records of lava dome-building volcanoes: implications for understanding magmatic processes and eruption forecasting

    Get PDF
    A key question for volcanic hazard assessment is the extent to which information can be exchanged between volcanoes. This question is particularly pertinent to hazard forecasting for dome-building volcanoes, where effusive activity may persist for years to decades, and may be punctuated by periods of repose, and sudden explosive activity. Here we review historical eruptive activity of fifteen lava dome-building volcanoes over the past two centuries, with the goal of creating a hierarchy of exchangeable (i.e., similar) behaviours. Eruptive behaviour is classified using empirical observations that include patterns of SO2 flux, eruption style, and magma composition. We identify two eruptive regimes: (i) an episodic regime where eruptions are much shorter than intervening periods of repose, and degassing is temporally correlated with lava effusion; and (ii) a persistent regime where eruptions are comparable in length to periods of repose and gas emissions do not correlate with eruption rates. A corollary to these two eruptive regimes is that there are also two different types of repose: (i) inter-eruptive repose separates episodic eruptions, and is characterised by negligible gas emissions and (ii) intra-eruptive repose is observed in persistently active volcanoes, and is characterised by continuous gas emissions. We suggest that these different patterns of can be used to infer vertical connectivity within mush-dominated magmatic systems. We also note that our recognition of two different types of repose raises questions about traditional definitions of historical volcanism as a point process. This is important, because the ontology of eruptive activity (that is, the definition of volcanic activity in time) influences both analysis of volcanic data and, by extension, interpretations of magmatic processes. Our analysis suggests that one identifying exchangeable traits or behaviours provides a starting point for developing robust ontologies of volcanic activity. Moreover, by linking eruptive regimes to conceptual models of magmatic processes, we illustrate a path towards developing a conceptual framework not only for comparing data between different volcanoes but also for improving forecasts of eruptive activity

    Using RFID Techniques for a Universal Identification Device

    No full text
    Radio-frequency identification (RFID) is a radio wave technology that uses to transfer data from a tag (also called RFID-tag or label), attached to an object, through a reader for the purpose of identifying the object. RFID technologies are widely deployed by various organizations as part of their authorization part of the systems. An RFID based system consists of two main parts which include: the hardware and the software. The hardware consists of the motor unit and the RFID reader. The software consists of security protocols for authorization and transfers the data. In this article we'll try to find basic techniques for creating a universal identification device

    Approaches to the Detection of Inappropriate Content in Images in the Personified System for Information Filtering

    No full text
    One of the most important development’s trend of product content filtering in the part Internet traffic’s control there is transition from using data bases site’s categories to determine sites for it content. It stays especially actual with the development of different portals, which can contain full of different categories. Those categories can change on time or apply under client’s settings

    Module of Text Information Analyze in the Personified System for Information Filtering

    No full text
    Text analyze for future filtering is one of the most useful tasks for children education, because it's hard to imagine modern education in schools, without usage of Internet resources. This work is aimed at techniques and technologies of filtering text information that can harm to children

    Healing Effect of Controlled Anti-Electromigration on Conventional and High-Tc Superconducting Nanowires

    Full text link
    The electromigration process has the potential capability to move atoms one by one when properly controlled. It is therefore an appealing tool to tune the cross section of monoatomic compounds with ultimate resolution or, in the case of polyatomic compounds, to change the stoichiometry with the same atomic precision. As demonstrated here, a combination of electromigration and anti-electromigration can be used to reversibly displace atoms with a high degree of control. This enables a fine adjustment of the superconducting properties of Al weak links, whereas in Nb the diffusion of atoms leads to a more irreversible process. In a superconductor with a complex unit cell (La 2−x Ce x CuO 4 ), the electromigration process acts selectively on the oxygen atoms with no apparent modification of the structure. This allows to adjust the doping of this compound and switch from a superconducting to an insulating state in a nearly reversible fashion. In addition, the conditions needed to replace feedback controlled electromigration by a simpler technique of electropulsing are discussed. These findings have a direct practical application as a method to explore the dependence of the characteristic parameters on the exact oxygen content and pave the way for a reversible control of local properties of nanowires

    Nano-SQUIDs with controllable weak links created via current-induced atom migration

    Full text link
    As the most sensitive magnetic field sensor, the superconducting quantum interference device (SQUID) became an essential component in many applications due to its unmatched performance. Through recently achieved miniaturization, using state-of-the-art fabrication methods, this fascinating device extended its functionality and became an important tool in nanomaterial characterization. Here, we present an accessible and yet powerful technique of targeted atom displacement in order to reduce the size of the weak links of a DC nano-SQUID beyond the limits of conventional lithography. The controllability of our protocol allows us to characterize in situ the full superconducting response after each electromigration step. From this in-depth analysis, we reveal an asymmetric evolution of the weak links at cryogenic temperatures. A comparison with time resolved scanning electron microscopy images of the atom migration process at room temperature confirms the peculiar asymmetric evolution of the parallel constrictions. Moreover, we observe that when electromigration has sufficiently reduced the junction’s cross section, superconducting phase coherence is attained in the dissipative state, where magnetic flux readout from voltage becomes possible

    Effet de guérison par anti-électromigration controlée dans des nanofils supraconducteurs conventionels et à haute température critique.

    Full text link
    At the present time, electron beam lithography (EBL) is considered as the reference technique for nanoscale patterning. However, making nanostructures below the sub-10 nm scale is still challenging due to broadening effects (forward electron scattering, backscattering, electrostatic charging…), and requires strong investment in terms of cost for state-of-the-art EBL systems. In this sense, alternative methods are continuously explored in order to make such nanofabrication easily reachable. A promising approach consists of inducing atomic diffusion by a large current density. This phenomenon, called electromigration (EM), and well known since the 60’s as a failure mechanism in metallic interconnections [1], still attracts interests from scientists and engineers for its great potential for fabrication of microstructures and for its reversibility character [2, 3]. In this work, we show that the combination of electromigration and anti-electromigration allows the precise tuning of superconducting properties of Al nanoconstrictions and we also observe the reversibility of electromigration failure for this material (see Fig. 1). The same process has been applied on Nb, leading to a more irreversible process, and La2 xCexCuO4. For the latter material, we show that selective migration of oxygen atoms and the consequent doping modification induces a transition from a superconducting state to an insulating state in a reversible way [4]. We also discussed the possibility to enhance the electromigration technique by replacing the complex feedback control by a technique of electropulsing. These researches have direct practical impact as a method to explore the dependence of the characteristic parameters on the exact oxygen content and pave the way for a reversible control of local properties of nanowires
    corecore