Academic literature on the topic 'Modern methods of information protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Modern methods of information protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Modern methods of information protection"

1

Shelupanov, Alexander, Oleg Evsyutin, Anton Konev, Evgeniy Kostyuchenko, Dmitry Kruchinin, and Dmitry Nikiforov. "Information Security Methods—Modern Research Directions." Symmetry 11, no. 2 (2019): 150. http://dx.doi.org/10.3390/sym11020150.

Full text
Abstract:
In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing the security of the information systems. This direction includes the construction of an information security threats model and a protection system model, which allow to compile a complete list of threats and methods of protection against them. The main directions of information security tools develop
APA, Harvard, Vancouver, ISO, and other styles
2

Sharsheeva, K. T., A. N. Zhumabaeva, and G. M. Usubakunova. "RESEARCH OF INFORMATION SYSTEMS PROTECTION METHODS USING MODERN AUTHENTICATION METHODS." Herald of KSUCTA n a N Isanov, no. 1-2021 (March 22, 2021): 20–25. http://dx.doi.org/10.35803/1694-5298.2021.1.20-25.

Full text
Abstract:
At the moment, the exchange of data via insecure communication channels is the most vulnerable to information systems that store a large amount of data, the partial loss or substitution of which can lead to irreversible consequences. For this reason, in order to ensure security, the task is to use such methods and means that allow to verify the authenticity of the user's belonging to this system and, if successful, give access to information. In this paper are reviewed authentication methods that can be used depending on the needs of the systems, their vulnerabilities and recommend solutions t
APA, Harvard, Vancouver, ISO, and other styles
3

Ibrokhimova, Maftunakhona. "MODERN METHODS AND MEANS OF ENSURING INFORMATION SECURITY." Research and implementation 2, no. 2 (2024): 151–58. https://doi.org/10.5281/zenodo.10687797.

Full text
Abstract:
The importance of information in the life of any developed society is continuously increasing. From a long time ago, the information of the military-strategic importance of the state was strictly kept secret and protected. Currently, information related to production technologies and sales of products has the form of a commodity, and the demand for it in the domestic and foreign markets is increasing. Information technologies are constantly improving in the areas of automation and information protection. The development of modern information technologies is observed together with negative even
APA, Harvard, Vancouver, ISO, and other styles
4

Qizi, Toshboyeva Feruza To'lqin, and Bebutova Zulayxo Hamidovna. "MODERN METHODS AND ESSENCE OF ENSURING INFORMATION SECURITY IN THE INFORMATION SOCIETY." European Journal of Contemporary Business Law & Technology: Cyber Law, Blockchain, and Legal Innovations 1, no. 7 (2024): 106–11. https://doi.org/10.61796/ejcblt.v1i7.872.

Full text
Abstract:
In today's information society, the problem of information security is extremely important. In this article, the concept of information security and its tasks, threats to information security, the concept of encryption and types of encryptions, encryption standards, cryptography goals are given in-depth information. Issues of reliable protection of information were studied
APA, Harvard, Vancouver, ISO, and other styles
5

Khavikova, Yuliia. "PROTECTION OF INFORMATION IN ELECTRONIC SERVICES." Cybersecurity: Education, Science, Technique 1, no. 25 (2024): 215–28. http://dx.doi.org/10.28925/2663-4023.2024.25.215228.

Full text
Abstract:
The publication explores the problem of information security in the context of the rapid development of electronic services and growing requirements for their security. It is noted that the intensive introduction of modern technologies into financial and other electronic systems leads to an increase in the volume of electronic transactions and information exchange, which intensifies the need for highly effective security methods. The main emphasis is placed on the importance of using multi-factor authentication and modern cryptographic methods to prevent unauthorized access to confidential inf
APA, Harvard, Vancouver, ISO, and other styles
6

SHEVKO, N. R. "CYBER THREATS IN THE NEW REALITY OF RUSSIA: STATUS AND METHODS OF COUNTERING." Victimology 11, no. 4 (2024): 528–37. https://doi.org/10.47475/2411-0590-2024-11-4-528-537.

Full text
Abstract:
In the modern world, information security issues are becoming an integral part of life . In connection with the widespread introduction of modern information technologies into human activity, his life, information resources are the most vulnerable part of the system, subject to increasing attacks from intruders and of interest . Moreover, every year, cybercriminals use new ways and methods of committing atrocities, finding vulnerabilities both in computer networks, information security systems, and taking advantage of the gullibility and computer illiteracy of users, including using social eng
APA, Harvard, Vancouver, ISO, and other styles
7

Oliinyk, Yaroslav, Artem Platonenko, Vyacheslav Cherevyk, Maksym Vorokhob, and Yurii Shevchuk. "METHODS OF INFORMATION SECURITY IN IOT-TECHNOLOGIES." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 100–108. https://doi.org/10.28925/2663-4023.2025.27.705.

Full text
Abstract:
This paper examines modern IoT systems, which are an integral part of technological progress. They have found application in industry, transport, smart home systems and other technical areas. However, the large number of connected devices, their limited computing resources and dependence on wireless networks make these systems extremely vulnerable to attacks aimed at violating the confidentiality, integrity and availability of data. The article considers a method for protecting information in IoT systems, which takes into account the vulnerabilities of wireless networks and devices such as IP
APA, Harvard, Vancouver, ISO, and other styles
8

Shelupanov, A. A., O. O. Evsutin, A. A. Konev, E. Yu Kostychenko, D. V. Kruchinin, and D. S. Nikiforov. "Modern trends in development of methods and means for information protection." Proceedings of Tomsk State University of Control Systems and Radioelectronics 20, no. 3 (2017): 11–24. http://dx.doi.org/10.21293/1818-0442-2017-20-3-11-24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fediushyn, O. I., Y. V. Holovko, A. O. Smirnov, V. M. Sukhoteplyi, and O. V. Chechui. "Methods of information protection based on quantum image steganography." Radiotekhnika, no. 218 (September 26, 2024): 44–55. https://doi.org/10.30837/rt.2024.3.218.03.

Full text
Abstract:
The purpose of the article is to study information protection methods based on quantum image steganography. Traditional image protection techniques have limitations in terms of resilience and reliability. The use of quantum computing, particularly the NEQR model, offers significant advantages in enhancing the security and efficiency of watermarks and steganography. The article analyzes existing approaches to image representation in quantum states and demonstrates their superiority in digital image protection. A simulation of steganography using quantum algorithms is presented, showing improved
APA, Harvard, Vancouver, ISO, and other styles
10

Nikitin, Petr Vladimirovich, and Rimma Ivanovna Gorokhova. "Analysis of modern intelligent methods for protecting critical information infrastructure." Вопросы безопасности, no. 3 (March 2024): 14–38. http://dx.doi.org/10.25136/2409-7543.2024.3.69980.

Full text
Abstract:
Critical information infrastructure (CII), including the financial sector, plays a key role in ensuring the sustainable functioning of economic systems and the financial stability of States. However, the growing digitalization of the financial industry and the introduction of innovative technologies are opening up new attack vectors for attackers. Modern cyber attacks are becoming more sophisticated, and traditional defenses are proving ineffective against new, previously unknown threats. There is an urgent need for more flexible and intelligent cybersecurity systems. Thus, the subject of the
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Modern methods of information protection"

1

Толбатов, Андрій Володимирович, Андрей Владимирович Толбатов, Andrii Volodymyrovych Tolbatov та Т. М. Сырицына. "Методы защиты от ошибок при передаче информации". Thesis, Изд-во СумГУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/4426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Дядечко, Алла Миколаївна, Алла Николаевна Дядечко, Alla Mykolaivna Diadechko, A. Proshchajlo, and S. Poltavets. "Modern protection of the information." Thesis, Видавництво СумДУ, 2011. http://essuir.sumdu.edu.ua/handle/123456789/13459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aderam, Henry Ndejapo Tshapumba. "Consumer protection in online payment methods." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/73435.

Full text
Abstract:
This research focuses on online payment methods which are premised on electronic funds transfer. It is a general discourse that the use of online payment methods is risky. It is held that the fear of fraud and abuse of a payment system is at the focal point of such risk. Banks which provide these payment systems are usually not prepared to negotiate with their prospective customers. Resultantly, banks contract out of the risk associated with online payments, specifically the liability for unauthorized electronic funds transfers. This culminates in bank’s customers bearing the majority of tha
APA, Harvard, Vancouver, ISO, and other styles
4

Tian, Yuan. "Privacy Preserving Information Sharing in Modern and Emerging Platforms." Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1186.

Full text
Abstract:
Users share a large amount of information with modern platforms such as web platforms and social platforms for various services. However, they face the risk of information leakage because modern platforms still lack proper security policies. Existing security policies, such as permission systems and isolation, can help regulate information sharing. However, these policies have problems, such as coarse granularity, bad usability, and incompleteness, especially when new features are introduced. I investigate the security impacts of new features in web and mobile platforms and find design problem
APA, Harvard, Vancouver, ISO, and other styles
5

Pramila, A. (Anu). "Benchmarking and modernizing print-cam robust watermarking methods on modern mobile phones." Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201504021271.

Full text
Abstract:
Digital watermarking has generally been used for copy-‭ ‬and copyright protection,‭ ‬authentication and,‭ ‬more recently,‭ ‬value-added services.‭ ‬It has been restricted to digital world but by developing methods which are able to read a watermark from a printed image with a camera phone would enable the watermark extraction to be free of time and place. The aim of this work was to compare print-cam robust watermarking methods and illustrate the problems that emerge when the watermarking methods are implemented on a camera phone.‭ ‬This was achieved by selecting three print-cam robust waterm
APA, Harvard, Vancouver, ISO, and other styles
6

Fratesi, Sarah Elizabeth. "The Virtual Landscape of Geological Information Topics, Methods, and Rhetoric in Modern Geology." [Tampa, Fla] : University of South Florida, 2008. http://purl.fcla.edu/usf/dc/et/SFE0002777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Krasnokutska, Nataliia. "Key trends in modern management." Thesis, NTU "KhPI", 2017. http://repository.kpi.kharkov.ua/handle/KhPI-Press/34935.

Full text
Abstract:
The study has shown the major trends that affect the creation and spread of new methods of management in the information society.The attained results prove the fact that precisely because of the efforts of managers companies can take their rightful place in the business environment, even at the low level of physical resources.
APA, Harvard, Vancouver, ISO, and other styles
8

Shulman, Katharine. "Paintings in Transit: A New Means For Protection of Collections, Balancing Traditional and Modern Conservation Philosophies and Methods." Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/scripps_theses/697.

Full text
Abstract:
This thesis examines the motives behind museum loan and exchange policies and how loans can act as a new avenue for protecting and preserving paintings. When borrowed artworks are transported from one museum to another, there are many variables that come into play and careful planning is necessary for the safety of the object. Specific case studies of several well-known and respected museums that engage in and encourage loans will explore the complex nature of lending policies, their effect on the condition of artworks and their significance and impact on the museum world. This thesis culminat
APA, Harvard, Vancouver, ISO, and other styles
9

Rogers, Jason Lee. "Secure distribution of open source information." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FRogers.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Raybould, Michael, and n/a. "Attitudes and Information Effects in Contingent Valuation of Natural Resources." Griffith University. Australian School of Environmental Studies, 2006. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20061009.150949.

Full text
Abstract:
This thesis investigated the effects of photographic and text information on respondents' attitudes and willingness-to-pay for a proposed beach protection scheme in the erosion prone Gold Coast region on the east coast of Australia. The research developed two alternative expectancy-value attitude-behaviour models to test residents' attitudes toward relevant targets and behavioural intention, expressed through stated willingness-to-pay, and compared the proposed models with one established attitude-behaviour model. The thesis set out to investigate three central research questions; one question
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Modern methods of information protection"

1

A, Adey R., ed. Modelling of cathodic protection systems. WIT, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

National Council on Radiation Protection and Measurements. Scientific Committee 6-1. Uncertainties in the measurement and dosimetry of external radiation: Recommendations of the National Council on Radiation Protection and Measurements. National Council on Radiation Protection and Measurements, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Popadyuk, Tat'yana, Irina Smirnova, Nataliya Linder, et al. Modern electrical substations. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1861116.

Full text
Abstract:
The textbook provides general information about the operating modes of electrical systems and substations, methods for calculating short-circuit currents and selecting electrical equipment for substations and power grids, classification of substations is given, designs of manual control transformers, high-voltage and low-voltage substations are considered, issues of their relay protection, requirements of electrical installation rules and technical operation rules for the device and operation of substations.
 It is intended for students of the training direction 13.03.02 "Electric power a
APA, Harvard, Vancouver, ISO, and other styles
4

Jeschke, Peter, Wolfgang Krämer, Ulrich Schirmer, and Matthias Witschel, eds. Modern Methods in Crop Protection Research. Wiley-VCH Verlag GmbH & Co. KGaA, 2012. http://dx.doi.org/10.1002/9783527655908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Spirin, Yuriy, Sergey Zotov, Evgeniy Krasnov, and Nadezhda Cvetkova. Polder watercourses: research methods and geoecological assessment. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1903343.

Full text
Abstract:
The monograph describes research methods and geoecological assessment of polder lands.
 The history of research and practical use of surface waters of the Kaliningrad region is characterized, modern problems of their geoecological state are revealed. The characteristic of polder lands as complex natural and economic systems is given, the necessity of geoecological studies of the catchments of small rivers located on them is substantiated. A methodological approach has been developed to assess the geoecological condition of the basins of small watercourses through the combined analysis of
APA, Harvard, Vancouver, ISO, and other styles
6

Maksurov, Aleksey. Ensuring information security on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Full text
Abstract:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian
APA, Harvard, Vancouver, ISO, and other styles
7

Novosel'cev, Viktor, Sergey Kochedykov, Dar'ya Orlova, Kirill Plyuschik, L. Rossihina, and I. Goncharov. Conflict-active project management for the development of information security systems of infocommunication networks. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1921360.

Full text
Abstract:
The object of study in the monograph is the conflict "information security system of infocommunication networks of critical socio-economic infrastructure objects — an attacker (criminal element)". The subject of the research is the development of a methodology for conflict-active project management for the development of information security systems for these networks, including models for supporting project decision-making. The theoretical basis of the above is the provisions of system analysis, the theory of management and decision-making, the theory of active systems, the theory of informat
APA, Harvard, Vancouver, ISO, and other styles
8

Garrabrants, Andrew C. Background information for the Leaching Environmental Assessment Framework (LEAF) test methods. U.S. Environmental Protection Agency, Office of Research and Development, National Risk Management Research Laboratory, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kirby, B. R. Fire resistance of steel structures: Modern fire protection systems and design methods. British Steel, General Steels, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kirby, B. R. Fire resistance of steel structures: Modern fire protection systems and design methods. British Steel Corporation, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Modern methods of information protection"

1

Buesser, Beat. "Towards Privacy Preserving LLMs Training." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_19.

Full text
Abstract:
AbstractPrivacy-preserving training of machine learning models aims to avoid or minimize (mitigate) the exact or similar reproduction (leakage) of information contained in the training data. This chapter introduces pre-processing methods (filtering and de-duplication) that prepare the training data to minimize information leakage, followed by a discussion of training and deployment methods (differentially private fine-tuning, noisy knowledge transfer) that provide empirical or theoretical guarantees for the achieved privacy protection with a focus on Large Language Models (LLMs).
APA, Harvard, Vancouver, ISO, and other styles
2

Jiang, Lili, and Vicenç Torra. "On the Effects of Data Protection on Multi-database Data-Driven Models." In Lecture Notes in Computer Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98018-4_19.

Full text
Abstract:
AbstractThis paper analyses the effects of masking mechanism for privacy preservation in data-driven models (regression) with respect to database integration. Especially two data masking methods (microaggregation and rank swapping) are applied on two public datasets to evaluate the linear regression model in terms of privacy protection and prediction performance. Our preliminary experimental results show that both methods achieve a good trade-off of privacy protection and information loss. We also show that for some experiments although data integration produces some incorrect links, the linea
APA, Harvard, Vancouver, ISO, and other styles
3

Drewes, Mark, Klaus Tietjen, and Thomas C. Sparks. "High-Throughput Screening in Agrochemical Research." In Modern Methods in Crop Protection Research. Wiley-VCH Verlag GmbH & Co. KGaA, 2013. http://dx.doi.org/10.1002/9783527655908.ch1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Olenik, Britta, and Gerhard Thielking. "Polymorphism and the Organic Solid State: Influence on the Optimization of Agrochemicals." In Modern Methods in Crop Protection Research. Wiley-VCH Verlag GmbH & Co. KGaA, 2013. http://dx.doi.org/10.1002/9783527655908.ch10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Clarke, Eric D., and Laura J. Mallon. "The Determination of Abraham Descriptors and Their Application to Crop Protection Research." In Modern Methods in Crop Protection Research. Wiley-VCH Verlag GmbH & Co. KGaA, 2013. http://dx.doi.org/10.1002/9783527655908.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schmitt, Walter. "Ecological Modeling in Pesticide Risk Assessment: Chances and Challenges." In Modern Methods in Crop Protection Research. Wiley-VCH Verlag GmbH & Co. KGaA, 2013. http://dx.doi.org/10.1002/9783527655908.ch12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kamp, Hennicke G., Doerthe Ahlbory-Dieker, Eric Fabian, et al. "The Use of MetabolomicsIn Vivofor the Development of Agrochemical Products." In Modern Methods in Crop Protection Research. Wiley-VCH Verlag GmbH & Co. KGaA, 2013. http://dx.doi.org/10.1002/9783527655908.ch13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Parsons, Paul. "Safety Evaluation of New Pesticide Active Ingredients: Enquiry-Led Approach to Data Generation." In Modern Methods in Crop Protection Research. Wiley-VCH Verlag GmbH & Co. KGaA, 2013. http://dx.doi.org/10.1002/9783527655908.ch14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kolle, Susanne N., Burkhard Flick, Tzutzuy Ramirez, Roland Buesen, Hennicke G. Kamp, and Bennard van Ravenzwaay. "Endocrine Disruption: Definition and Screening Aspects in the Light of the European Crop Protection Law." In Modern Methods in Crop Protection Research. Wiley-VCH Verlag GmbH & Co. KGaA, 2013. http://dx.doi.org/10.1002/9783527655908.ch15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schleifer, Klaus-Jürgen. "Computational Approaches in Agricultural Research." In Modern Methods in Crop Protection Research. Wiley-VCH Verlag GmbH & Co. KGaA, 2013. http://dx.doi.org/10.1002/9783527655908.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Modern methods of information protection"

1

Thomas, E. D., K. E. Lucas, R. L. Foster, A. R. Parks, and A. I. Kaznoff. "Physical Scale Modeling of Impressed Current Cathodic Protection Systems." In CORROSION 1989. NACE International, 1989. https://doi.org/10.5006/c1989-89274.

Full text
Abstract:
Abstract The U. S. Navy has examined the various methods used to design ship hull cathodic protection systems. From fleet experience, the optimal design of Impressed Current Cathodic Protection (ICCP) systems requires the exact placement hull components. Physical scale modeling is being used as a primary tool in determining the placement of anodes and reference cells in order to achieve uniform and protective hull potentials. A one/ninty-sixth scale hull model m linear scaled resistivity electrolyte was used to provide important information on interzone relationships, geometric factors and qal
APA, Harvard, Vancouver, ISO, and other styles
2

Parker, Gord W., and James Walton. "Non-Contact Stray Current Measurements in a Multi-Line, Multi-Crossing Pipeline Corridor." In CORROSION 2007. NACE International, 2007. https://doi.org/10.5006/c2007-07649.

Full text
Abstract:
Abstract Stray Current (SC) has been an area of concern to Cathodic Protection professionals since at least 1917(1) and in the intervening century it has only become a bigger problem. The three biggest causes of increased CP interference is the increased use of underground utility construction, increased oil and gas exploitation, and increased number of electric rail systems. While analyzing the effects of SC is straightforward, methods of analyzing the problem are rather difficult. Specifically, gathering the data was an inefficient process. Measuring potentials gave an incomplete picture of
APA, Harvard, Vancouver, ISO, and other styles
3

Correa, Otavio, and Jorge Seleme Mariano. "Using Digital Twin and AI to Predict Atmospheric Corrosion - a Smart Tool for Decision Makers." In CONFERENCE 2022. AMPP, 2022. https://doi.org/10.5006/c2022-17991.

Full text
Abstract:
Abstract This paper focuses on reviewing and offering a solution to manage the complex atmospheric corrosion process and its protection within industrial plants such as Oil & Gas, Petrochemicals, Pulp and Paper, and Mining. A review of the main protective coating failure mechanisms, as well as corrosion evaluation methods, are presented. Our objective is to gather the main parameters for a maintenance/inspection management tool, by developing a field data collection processing that feeds a digital model to predict coating failure and to enhance time, costs, and performance of asset integri
APA, Harvard, Vancouver, ISO, and other styles
4

Correa, Otavio, and Jorge Seleme Mariano. "Using Digital Twin and AI to Predict Atmospheric Corrosion - A Smart Tool for Decision Makers." In CONFERENCE 2022. AMPP, 2022. https://doi.org/10.5006/c2022-17992.

Full text
Abstract:
Abstract This paper focuses on reviewing and offering a solution to manage the complex atmospheric corrosion process and its protection within industrial plants such as Oil & Gas, Petrochemicals, Pulp and Paper, and Mining. A review of the main protective coating failure mechanisms, as well as corrosion evaluation methods, are presented. Our objective is to gather the main parameters for a maintenance/inspection management tool, by developing a field data collection processing that feeds a digital model to predict coating failure and to enhance time, costs, and performance of asset integri
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Xuening, Kaili Zhao, Xuening Zhang, et al. "Data Privacy Protection Methods for Electric Power IoT." In 2025 IEEE 6th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT). IEEE, 2025. https://doi.org/10.1109/ainit65432.2025.11035051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Тургунов, Бекзод, Bekzod Turgunov, Мухаммадмусо Халилов, and Muhammadmuso Halilov. "MODERN METHODS OF PROTECTION THE INFORMATION SIGNAL FROM UNAUTHORIZED ACCESS IN OPTICAL NETWORKS." In CAD/EDA/Simulation in Modern Electronics. Bryansk State Technical University, 2018. http://dx.doi.org/10.30987/conferencearticle_5c19e60de0e465.61450093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Шумилина, Вера, Vera Shumilina, Юлия Коптева, Yulia Kopteva, Сатине Тевосян, and Satin Tevosyan. "MAJOR PROBLEMS OF CONFIDENTIAL INFORMATION PROTECTION AND THE WAYS OF THEIR SOLUTION." In Modern problems of an economic safety, accounting and the right in the Russian Federation. AUS PUBLISHERS, 2018. http://dx.doi.org/10.26526/conferencearticle_5c5060d2f3afe7.25271992.

Full text
Abstract:
The authors disclose the basic concepts of this topic, prove the relevance, consider the types of threats to confidential information and methods of protection, both legal and organizational, presented an algorithm for creating a system for protecting confidential information.
APA, Harvard, Vancouver, ISO, and other styles
8

Yurlova, S. Ya, and M. S. Shushnov. "Security and privacy in visual information display systems with mobile access." In Modern Problems of Telecommunications - 2024. Siberian State University of Telecommunications and Information Systems, 2024. http://dx.doi.org/10.55648/spt-2024-1-224.

Full text
Abstract:
The article discusses the current issues of security and privacy of visual information in the context of mobile access. The author analyzes in detail the threats associated with unauthorized access, which put personal photos, videos and screenshots of users at risk. Special attention is paid to modern methods of protection. Additionally, the role of VPN in enhanced protection of visual information, ensuring anonymity and security on the network, is discussed.
APA, Harvard, Vancouver, ISO, and other styles
9

Zybin, Sergei, and Vladimir Khoroshko. "iMethods transformation and protection information which transmit by communication lines." In 2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science. IEEE, 2006. http://dx.doi.org/10.1109/tcset.2006.4404594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tikhonov, E. E., K. A. Chebanov, and V. A. Burlyaeva. "Improvement of Information Protection and Data Transmission Methods in the Power Industry Using Neural Networks and a System of Residual Classes." In 2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon). IEEE, 2019. http://dx.doi.org/10.1109/fareastcon.2019.8934839.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Modern methods of information protection"

1

Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.

Full text
Abstract:
Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and
APA, Harvard, Vancouver, ISO, and other styles
2

Weinschenk, Craig, Keith Stakes та Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Water Mapping. UL Firefighter Safety Research Institute, 2017. http://dx.doi.org/10.54206/102376/nevx1787.

Full text
Abstract:
As research continues into how fire department interventions affect fire dynamics in the modern fire environment; questions continue to arise on the impact and implications of interior versus exterior fire attack on both firefighter safety and occupant survivability. Previous research into various types of fire ground ventilation, flow paths, and exterior fire streams has provided the fire service with an increased understanding of fire dynamics. However, in some instances, the information from the studies may not support current, experienced-based practices. This gap between the research to d
APA, Harvard, Vancouver, ISO, and other styles
3

Burak, Leonid Ch, and Nataliya L. Ovsyannikova. Modern methods of storage and packaging of garden strawberries (Fragaria × ananassa Duch.) (review). Contemporary horticulture, 2024. https://doi.org/10.12731/2312-6701-266171.

Full text
Abstract:
Postharvest treatment of garden strawberries and the development of effective storage methods are crucial to increase the shelf life and preserve its quality until consumption. Although some reviews on certain treatment technologies have been published, we have not found studies that considered and compared common and advanced methods of storing garden strawberries. Therefore, the goal of this study is to review modern postharvest methods of strawberry storage (Fragaria × ananassa Duch). The review includes reports published in English and Russian in 2014—2024. PubMed, Scopus, Web of Science,
APA, Harvard, Vancouver, ISO, and other styles
4

Gurevitz, Michael, Michael E. Adams, Boaz Shaanan, et al. Interacting Domains of Anti-Insect Scorpion Toxins and their Sodium Channel Binding Sites: Structure, Cooperative Interactions with Agrochemicals, and Application. United States Department of Agriculture, 2001. http://dx.doi.org/10.32747/2001.7585190.bard.

Full text
Abstract:
Integrated pest management in modern crop protection may combine chemical and biological insecticides, particularly due to the risks to the environment and livestock arising from the massive use of non-selective chemicals. Thus, there is a need for safer alternatives, which target insects more specifically. Scorpions produce anti-insect selective polypeptide toxins that are biodegradable and non-toxic to warm-blooded animals. Therefore, integration of these substances into insect pest control strategies is of major importance. Moreover, clarification of the molecular basis of this selectivity
APA, Harvard, Vancouver, ISO, and other styles
5

Yaremchuk, Olesya. TRAVEL ANTHROPOLOGY IN JOURNALISM: HISTORY AND PRACTICAL METHODS. Ivan Franko National University of Lviv, 2021. http://dx.doi.org/10.30970/vjo.2021.49.11069.

Full text
Abstract:
Our study’s main object is travel anthropology, the branch of science that studies the history and nature of man, socio-cultural space, social relations, and structures by gathering information during short and long journeys. The publication aims to research the theoretical foundations and genesis of travel anthropology, outline its fundamental principles, and highlight interaction with related sciences. The article’s defining objectives are the analysis of the synthesis of fundamental research approaches in travel anthropology and their implementation in journalism. When we analyze what metho
APA, Harvard, Vancouver, ISO, and other styles
6

Želvytė, Julija, and Regina Narkiekė. Cargo Transportation using Modern Technologies at UAB "Kamida". Vilnius Business College, 2024. https://doi.org/10.57005/ab.2024.2.3.

Full text
Abstract:
This article presents the role of integrated technology systems in optimizing cargo transportation processes, focusing mainly on UAB "Kamida". Logistics, especially cargo transportation, is a complex operation involving various activities, during which the efficiency of transportation methods has a significant impact on costs and the quality of customer service. Modern technologies, such as cargo tracking systems, vehicle tracking systems, and order management systems, make it possible to simplify the transportation process and reduce costs. The obtained results showed that UAB "Kamida" uses s
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Renduo, and David Russo. Scale-dependency and spatial variability of soil hydraulic properties. United States Department of Agriculture, 2004. http://dx.doi.org/10.32747/2004.7587220.bard.

Full text
Abstract:
Water resources assessment and protection requires quantitative descriptions of field-scale water flow and contaminant transport through the subsurface, which, in turn, require reliable information about soil hydraulic properties. However, much is still unknown concerning hydraulic properties and flow behavior in heterogeneous soils. Especially, relationships of hydraulic properties changing with measured scales are poorly understood. Soil hydraulic properties are usually measured at a small scale and used for quantifying flow and transport in large scales, which causes misleading results. The
APA, Harvard, Vancouver, ISO, and other styles
8

Babenko, Vitalina O., Roman M. Yatsenko, Pavel D. Migunov, and Abdel-Badeeh M. Salem. MarkHub Cloud Online Editor as a modern web-based book creation tool. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3858.

Full text
Abstract:
The main criterion for the competitiveness of a teacher or expert in the field of science is a good ability to present their knowledge to students in an interactive form without spending a lot of time in preparation. The purpose of the study is to analyze modern editors to create educational information content in the modern educational space and to present a modern tool for creating web books based on the latest IT technologies. Modern editors of web material creation have been analyzed, statistics of situations on mastering of knowledge by listeners, using interactive methods of information
APA, Harvard, Vancouver, ISO, and other styles
9

Shekeriak-Kushka, Yana. ETHICAL AND SECURITY ASPECTS OF DATA ANALYTICS IN JOURNALISM: THE CONTEXT OF THE RUSSIAN-UKRAINIAN WAR. Ivan Franko National University of Lviv, 2025. https://doi.org/10.30970/vjo.2025.56.13279.

Full text
Abstract:
The purpose of this article is to examine the ethical and security aspects of data usage in data journalism, particularly in the context of wartime. It explores key risks associated with working with data, such as privacy violations, manipulation, and the reinforcement of stereotypes. The article analyzes the legislative framework for personal data protection in Ukraine and the EU, as well as specific challenges faced by journalists during the war, including the protection of information sources, anonymization of sensitive data, and ensuring civilian safety. Recommendations are proposed for et
APA, Harvard, Vancouver, ISO, and other styles
10

Thompson and Lawson. L51640 Improved Pipe-to-Soil Potential Survey Methods. Pipeline Research Council International, Inc. (PRCI), 1991. http://dx.doi.org/10.55274/r0010138.

Full text
Abstract:
Pipe-to-soil potential measurements are the primary means for monitoring the effectiveness of cathodic protection (CP) systems. All criteria for cathodic protection employ, in one form or another, a potential measurement of the pipe with respect to a reference electrode. Although the pipeline industry obviously depends on pipe-to-soil potential measurements for monitoring CP systems, very little is known concerning what portion of the pipe is being sampled by the potential measurement. Prior to performing this project, many questions remained unanswered, such as: (1) what is the length of pipe
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!