Wednesday, May 13, 2020

Information System Cyber Threats

Information System Cyber Threats and Telecommunications Engineering Courses

The article discusses the issue of training of telecommunications engineers. The architecture of telecommunications solutions is changing very quickly. Obviously, training programmes must also change. Cybersecurity issues are one of the main drivers of change in telecommunications solutions and, therefore, training programmes. They have become the main issues in all processes related to digital transformation. At the same time, it is clear that the development of education in telecommunications clearly lags behind modern requirements. Such issues come to the fore in relation to the development of digital economy programmes. Cyber security issues for military telecommunications solutions are discussed separately.

See details here

Friday, April 03, 2020

On Mobile Applications Based on Proximity

The article discusses mobile applications based on the concept of proximity. On the one hand, this can be considered as a special (private) class of geo-information systems, since we are talking about services (services) that are located in a certain geographically limited area. On the other hand, the abandonment of geo-computations and the use of special metrics for direct measurement of proximity opens up possibilities for completely new services that were not available in traditional models of geo-informatics. The paper discusses issues related to the measurement of proximity, new models of services and provides examples of specific implementations.

from our new paper

Monday, March 30, 2020

COVID-19 epidemic development

In this work, mathematical modelling of the dynamics of coronavirus COVID-19 is performed for China. The outbreak of coronavirus in China can be considered as public health emergency of international concern. The number of infected is increasing daily. Cases of COVID-19 virus have been detected in nearly 200 countries. Many sporting events, festivals, exhibitions and tournaments have been canceled or postponed. The pandemic has affected education systems around the world, leading to the massive closure of schools and universities. Viral incubation period of this virus is quite long, it ranges from 1 to 14 days. The danger of a new disease also lies in the fact that it is easily confused with a common cold or flu. Therefore, the spread of coronavirus COVID-19 is a serious threat for international health and economics. A mathematical description of the dynamics of virus allows to study the nature of the disease thoughtfully, to analyze statistical and model data, to make hypotheses concerning the future dynamics of coronavirus and to evaluate the effectiveness of the measures undertaken. For mathematical modelling of coronavirus COVID-19, the authors use a modified system of differential equations constructed according to the SIR compartmental model. The optimal values of the model parameters, that describe the statistical data precisely, were found. The analysis of the current situation of the COVID-19 coronavirus epidemic in China was made, which led to the efficiency mark of the existing measures to struggle against the virus.

from INJOIT

Saturday, February 08, 2020

On Data Analysis of Software Repositories

This article discusses the analysis of software repositories using data analysis methods. A review is made of methods for analyzing programs based on information retrieved from the program code stored in code repositories. A review is made of methods for analyzing programs based on information retrieved from the program code stored in repositories. The article reviews the works that apply methods of classification, clustering and depth learning in software development. For example, for classifying and predicting errors, changing the properties of code in the process of its evolution, detecting design flaws and debts, assist for code refactoring. The main ultimate goal for all models is, of course, an automation of programming. In practice, we are talking about more simple tasks. This includes, for example, information retrieval (program code), error prediction, clone detection, link analysis, evolution analysis, etc. Firstly, we discuss recurrent neural networks and their deployment for the analysis of software repositories. In the simplest case, recurrent networks model a programming language as a sequence of characters. Also, the paper covers clustering and topic modeling. - from our new paper

Friday, February 07, 2020

On a New Approach to Neighbor Discovery as Data Sharing Tool

In this paper, we propose and discuss a new approach to data sharing among mobile subscribers. Our idea is to use the neighbor discovery phase in wireless networks. It simulates a peer-to-peer network that will work without any telecommunication infrastructure. A single mobile phone (smartphone) will be sufficient both for creating a node of such telecommunication network and for publishing (distributing) information. What is important here, the usage of the standard neighbor discovery mechanism does not assume the preloading some mobile applications. Our idea is to share user-defined information during the basic neighbor discovery phase. In this case, the parties involved in the process should be able to read the shared data directly from the process of discovering for neighboring nodes. Our proposal is the further development of ideas related to context-aware systems based on network proximity principles. - from our new paper