4 research outputs found
Analysis of the Process of Information Transfer from the Source-to-User in Terms of Information Impact
The process of transferring information from an official source or from the βsceneβ to the final consumer is quite complex and lengthy. During its promotion, information circulates in the information space and is influenced by various groups of influence that pursue their interests. Thus, very often the end-user receives biased, biased information, the purpose of which is to exert a certain influence on his behavior. The situation is complicated by the limited sources of information, their subjectivity, and bias, which are the essence of information conflict when the opposing parties try to put any information pressure on the sources of information and the whole process of its dissemination. To ensure the proper functioning, making adequate decisions, the task of the end-user is to obtain objective and timely information, for which the issues of assessing its reliability come to the fore
Recurrent Estimation of the Information State Vector and the Correlation of Measuring Impact Matrix using a Multi-Agent Model
The information-oriented model is a multi-agent simulation model in which the integrated
characteristics of information resources are the result of many local interacting individuals. The
information-oriented approach in modeling involves the creation of simulation models that
reproduce some criteria of information reliability and their local interaction for the built integrated
models of many information resources. Information within this model is considered as a unique,
discrete unit in which there is a set of characteristics that change with the introduction of the life
cycl
Encryption Method for Systems with Limited Computing Resources
Due to the active development of the Internet of Things ( IoT 1 , ) technology, more and more systems of interconnected devices and sensors are appearing that collect various data an d transmit them through gateways to remote servers. It goes without saying that this data must be protected at all stages. This is especially important for data on the functioning of potentially dangerous objects and devices. Because of the features of dev ices with limited computing resources, it is impossible to use standard methods of information protection in the gateway built-- in sensor link. The article considers the algorithm of the Internet of Things system using limited devices, which consists of a g ateway for receiving data from sensors and transmitting them to servers and limited devices used for data collection and encryption. The proposed algorithm describes the process of data packet generation, key generation, encryption, transmission, and decry ption of data received from sensors. The reliability of data encryption transmitted in the gatewaybuilt sequence -- in sensor link is ensured by the generation of a truly random the encryption key, based on the initial measured value on the unconnected and ungrounded analog input of the microcontroller, and a series of arithmetic operations
Method for Calculating the Residual Resource of Fog Node Elements of Distributed Information Systems of Critical Infrastructure Facilities
The paper considers the process of predicting the residual technical resource of elements (devices) of information and communication systems, which are components of fog computing. The analysis of the influence of the technical state of the elements of fog nodes on the functioning of distributed information systems is carried out. A method for calculating the residual resource of fog nodes has been developed, which is advisable to use for planning the modernization of fog nodes and in the process of calculating the fault tolerance of the entire distributed infrastructure