×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Application of recursive algorithms in transport security

    The article analyzes the elements of recursion and methods of its optimization, gives a name to the elements of the structure of recursion, an analysis is carried out, a pseudocode is shown. The relevance of using a recurrent approach when conducting inspection activities in order to ensure transport security is revealed. Algorithms of actions of transport security units based on recursion are specified.

    Keywords: recursion, transport security, inspection, memoization, segmentation, transport security zone

  • Blockchain in the Transport security System

    The article presents a variant of the analytical dependence of the workability factor on the time of execution of a specific operation by an employee of the transport security unit performing the function of screening passengers and baggage crossing the borders of the transport security zone using technical means of ensuring transport security. A mathematical model of the influence of the human factor on reducing the number of technological operations, as well as the quality of inspection activities during long-term monotonous and homogeneous operations is constructed. A software implementation of passenger questionnaires through the Blockchain system is presented to optimize the work of employees from the transport security units performing the functions of passenger and baggage screening in order to improve the security of transport infrastructure facilities and vehicles from acts of unlawful interference.

    Keywords: blockchain, transport security, inspection, data analysis, data processing, mathematical model, workability, optimization, railway transport, transport security units

  • Assesment of information security during data transfer between access subjects in the client-server architecture

    As a result of the work, an algorithm was developed and a software tool was implemented that allows ensuring the confidentiality of information in the interaction between access subjects. The study of the dependence of the selected parameters of the elliptic curve on the processing time and transmission of the encrypted message has been carried out. Studies have shown that with an increase in the values of the parameters of the elliptic curve, the time for processing confidential information increases due to insufficient system resources.

    Keywords: confidential information, information leakage, asymmetric encryption, information reliability, system resources, communication channel