Wednesday, May 13, 2020

Information System Cyber Threats

Information System Cyber Threats and Telecommunications Engineering Courses

The article discusses the issue of training of telecommunications engineers. The architecture of telecommunications solutions is changing very quickly. Obviously, training programmes must also change. Cybersecurity issues are one of the main drivers of change in telecommunications solutions and, therefore, training programmes. They have become the main issues in all processes related to digital transformation. At the same time, it is clear that the development of education in telecommunications clearly lags behind modern requirements. Such issues come to the fore in relation to the development of digital economy programmes. Cyber security issues for military telecommunications solutions are discussed separately.

See details here

Friday, April 03, 2020

On Mobile Applications Based on Proximity

The article discusses mobile applications based on the concept of proximity. On the one hand, this can be considered as a special (private) class of geo-information systems, since we are talking about services (services) that are located in a certain geographically limited area. On the other hand, the abandonment of geo-computations and the use of special metrics for direct measurement of proximity opens up possibilities for completely new services that were not available in traditional models of geo-informatics. The paper discusses issues related to the measurement of proximity, new models of services and provides examples of specific implementations.

from our new paper

Monday, March 30, 2020

COVID-19 epidemic development

In this work, mathematical modelling of the dynamics of coronavirus COVID-19 is performed for China. The outbreak of coronavirus in China can be considered as public health emergency of international concern. The number of infected is increasing daily. Cases of COVID-19 virus have been detected in nearly 200 countries. Many sporting events, festivals, exhibitions and tournaments have been canceled or postponed. The pandemic has affected education systems around the world, leading to the massive closure of schools and universities. Viral incubation period of this virus is quite long, it ranges from 1 to 14 days. The danger of a new disease also lies in the fact that it is easily confused with a common cold or flu. Therefore, the spread of coronavirus COVID-19 is a serious threat for international health and economics. A mathematical description of the dynamics of virus allows to study the nature of the disease thoughtfully, to analyze statistical and model data, to make hypotheses concerning the future dynamics of coronavirus and to evaluate the effectiveness of the measures undertaken. For mathematical modelling of coronavirus COVID-19, the authors use a modified system of differential equations constructed according to the SIR compartmental model. The optimal values of the model parameters, that describe the statistical data precisely, were found. The analysis of the current situation of the COVID-19 coronavirus epidemic in China was made, which led to the efficiency mark of the existing measures to struggle against the virus.

from INJOIT

Saturday, February 08, 2020

On Data Analysis of Software Repositories

This article discusses the analysis of software repositories using data analysis methods. A review is made of methods for analyzing programs based on information retrieved from the program code stored in code repositories. A review is made of methods for analyzing programs based on information retrieved from the program code stored in repositories. The article reviews the works that apply methods of classification, clustering and depth learning in software development. For example, for classifying and predicting errors, changing the properties of code in the process of its evolution, detecting design flaws and debts, assist for code refactoring. The main ultimate goal for all models is, of course, an automation of programming. In practice, we are talking about more simple tasks. This includes, for example, information retrieval (program code), error prediction, clone detection, link analysis, evolution analysis, etc. Firstly, we discuss recurrent neural networks and their deployment for the analysis of software repositories. In the simplest case, recurrent networks model a programming language as a sequence of characters. Also, the paper covers clustering and topic modeling. - from our new paper

Friday, February 07, 2020

On a New Approach to Neighbor Discovery as Data Sharing Tool

In this paper, we propose and discuss a new approach to data sharing among mobile subscribers. Our idea is to use the neighbor discovery phase in wireless networks. It simulates a peer-to-peer network that will work without any telecommunication infrastructure. A single mobile phone (smartphone) will be sufficient both for creating a node of such telecommunication network and for publishing (distributing) information. What is important here, the usage of the standard neighbor discovery mechanism does not assume the preloading some mobile applications. Our idea is to share user-defined information during the basic neighbor discovery phase. In this case, the parties involved in the process should be able to read the shared data directly from the process of discovering for neighboring nodes. Our proposal is the further development of ideas related to context-aware systems based on network proximity principles. - from our new paper

Friday, December 20, 2019

OD matrices in transport tasks

The paper considers the analysis of data in so-called origin-destination matrices. Also in relation to them often use the term matrix of correspondence. As practical examples, we are using data from Moscow metro and Moscow suburb railways. The correspondence matrix shows the number of trips between two points (stations) for a selected time interval. Theoretically, such data being calculated for the given time intervals describe all the characteristics of the passenger load. But practically, it depends on the existing models for traffic. Currently, such data used, mostly, just to calculate simple statistics. But such a simplified approach completely ignores the temporal characteristics of the traffic. In this paper, we discuss data mining models and approaches for origin-destination matrices analysis. Also, we describe the results of applying such approaches to analyzing data from the Moscow region.

from our new paper: On Processing of Correspondence Matrices in Transport Systems

Thursday, December 19, 2019

On Physical Web for Social Networks

The article discusses the use of Physical Web approaches for the expansion of social networks. This implies the presentation of data from social networks in a real (physical) context, as well as the inverse task of using information about a real physical context in querying and analyzing data from social networks. First of all, mobile phones of social network users are considered as real objects that will be used both in data dissemination and in gathering information about the context. In this case, the purpose of consideration is to build a “natural” extension, when the implementation does not require the creation of a special type of social network entries. The general scheme or model of implementation is based on the minimization (or even complete absence) of requesting additional rights to access the social network, the absence of marks in the social network, and the use of basic functionality and standard protocols for mobile devices.

From our new paper: Namiot D., Sneps-Sneppe M. (2019) On Physical Web for Social Networks. In: Vishnevskiy V., Samouylov K., Kozyrev D. (eds) Distributed Computer and Communication Networks. DCCN 2019. Communications in Computer and Information Science, vol 1141. Springer, Cham

Tuesday, December 10, 2019

On mobility patterns in Smart City

The article is devoted to the analysis of transport data in the Moscow region, which was used in the design of new urban rail lines. Mobility (smart mobility) is one of the main characteristics of a smart city. Understanding how residents in a city actually move is necessary for the reliable provision of transport services, the construction of new transport lines, etc. Understanding patterns of displacement allows you to identify anomalies in urban displacements, which are evidence of some changes in the urban environment. The basis for the analysis is the data of mobile operators and information on the use of travel documents. - from our new paper

Thursday, October 31, 2019

On Enterprise Information Systems and Cyber Threats

The main goal of the paper is to look for new university courses regard Russian digital economy program, which is oriented to the end-to-end digital technologies, including: Big Data; neuro-technologies and artificial intelligence; quantum technologies; industrial internet; robotics and sensory; wireless communication; technologies of the virtual and complemented realities. According to the newer Pentagon activities, the key attention in the field of Information Systems has turned to Cloud Strategy and Artificial intelligence. This Pentagon's new strategy was developed after the serious critics of the current state, namely, the shortcomings with Joint Information Environment and its key cyber-security equipment - Joint Regional Security Stacks. Two-side difficulties for DoD modernization are discussed: from one side, the vendors' pressure introduce the latest achievements, namely, Software Defined Network and Network Function Virtualization, and from another, it is difficult to abandon the old technology, as time-division multiplexing, asynchronous transfer mode equipment, signaling protocol SS7 and Advanced Intelligent Network - our presentation from ICUMT 2019

Tuesday, October 08, 2019

The curse of software

For shifting from circuit switching to packet switching in telecommunications, the main obstacle is excessive software. Our presentation "The curse of software: Pentagon telecommunications case"

Saturday, September 14, 2019

Channel Switching Protocols Hinder the Transition to IP World

In this paper, we target the strategy for telecommunications architectures during the transition to the IP-only models. The paper discusses the shifting from circuit switching to packet switching in telecommunications. Particularly, we analyze the coexistence of circuit switching and packet switching technologies in American military communications where each warfare object should have own IP address. The paper discusses the role of multifunction Soft Switches (MFSS). This Soft Switch plays the role of a media gateway between TDM channels and IP channels. As a case, we are passing through the transformation from SS7 signaling to internet protocol, ISDN-based government Defense Red Switch Network and, finally, the extremely ambitious cybersecurity issues and the cyber vulnerabilities of weapons found by Government Accountability Office. We conclude the growing cyber threats will provide a long-term channel-packet coexistence.

from our new paper

Thursday, May 23, 2019

On proximity information systems

The paper discusses the replacement of well-known conception of geo-information systems with a new model based on proximity. Geo-information systems have attracted great attention and have received great development in recent times. The reasons for this are fairly obvious. On the one hand, services are required by users, primarily at their location, and on the other hand, location determination has become easy, especially in connection with the proliferation of smartphones. But at the same time, the actual geographic coordinates are not needed by the majority of such services. Coordinates are used only for searching and organizing data. While the actual assignment of most services is a search for data (services) bound by these coordinates to a spe cific area. In other words, in most cases, service is meant data near the current location. Hence the idea to build services directly on the assessment of proximity, completely bypassing the work with coordinates. It also makes possible completely new services, especially in the technical field (for example, in transport, agriculture, etc.).

from our new paper

Thursday, May 16, 2019

On Content Models for Proximity Services

First time introduced in Release 12 of the 3GPP specifications, Proximity Services (ProSe in the above-mentioned specification) is a Device-to-Device (D2D) technology that allows two devices to detect each other and to communicate directly without traversing the Base Station or core network. In other words, it is a technology that is oriented (ultimately) on the direct connection of two devices. In this article, we are promoting the idea that proximity services are more than just support for a direct connection (in fact, search for candidates for a direct connection). The paper discusses content models (that is, information dissemination models) based on proximity data. In this case, a direct connection is simply one of the possible options for disseminating information.

Our new paper from FRUCT conference