In the paper we consider the minimization problem of maximum function for class quadratic functions. In the optimization problem of minimax type the conditions of existence and optimality are researched. Some property of maximum function are studied. The conditions for existence, uniquely of solution and the necessary and sufficient conditions of optimality are obtained.
16.12.2022 Volume 1 Issue 8 View more DownloadThis article focuses on the further development of the digital economy and the elimination of its problems, the impact of the growth of the digital economy on global economic growth, as well as the role of the digital economy in the global market. It is also explained that it can significantly change the way people live and that this is its main advantage.
16.12.2022 Volume 1 Issue 8 View more DownloadThis article presents an analysis of shunting locomotives currently used on the railways of the Republic of Uzbekistan. The analysis provides an analysis of JSC “O‘zbekiston temir yo‘llari”, and legal entities that own their own railways, that is, by the number, age and distribution of shunting locomotives in the locomotive fleet of large industrial enterprises (Navoi mining metallurgical combine, Almalyk mining metallurgical combine).
16.12.2022 Volume 1 Issue 8 View more DownloadThis article presents an EPR spectroscopic study of the structure of the polyvinylidene fluoride + carbon black (0.02) composite system. And also, it is considered that, with the help of electron paramagnetic resonance, it is possible to find out the nature of the distribution of particles of polyvinylidene fluoride + soot (0.02).
16.12.2022 Volume 1 Issue 8 View more DownloadTechnological advancements over the last years have impacted the way our personal data is being shared and processed. The evolution of technology has brought forward new techniques to share, process and store data. This has generated new models of data (including personal data) processing, but also introduced new threats and difficulties for the end user to understand and control the processing. Continuous online presence of end users has resulted in an increased processing of large amounts of personal data at daily basis. Think of online shopping or using a mobile application to navigate to a specific location or contact friends and family. The whole data lifecycle has been augmented with many actors being involved and eventually end users not being able to fully understand and control who, for how long and for what purpose has access to their personal data.
16.12.2022 Volume 1 Issue 8 View more DownloadOver the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home. Unfortunately, like other IoT systems, there are inherent security risks which can lead to significant violations of a user’s privacy. In this review, we explore the attack surface of modern surveillance systems and enumerate the various ways they can be compromised with real examples. We also identify the threat agents, their attack goals, attack vectors, and the resulting consequences of successful attacks. Finally, we present current countermeasures and best practices and discuss the threat horizon. The purpose of this review is to provide researchers and engineers with a better understanding of a modern surveillance systems’ security, to harden existing systems and develop improved security solutions.
16.12.2022 Volume 1 Issue 8 View more DownloadIn today’s information age, government organizations and business enterprises are heavily relying on interconnected computer systems to manage a variety of public services including energy, transportation, water, etc. While this increased connectivity has many operational advantages benefitting the public, they have also become vulnerable to cyber attacks such as Corporate Security Breaches, Spear Phishing, and Social Media Fraud. The aviation sector is one the critical infrastructure systems that is not only vulnerable to physical threats, but also cyber threats, especially with the increased use of Bring Your Own Device (BYOD) at airports. It has been recognized that there is currently no cyber security standards established for airports in the United States as the existing standards have mainly focused on aircraft Control System (CS). This paper summarizes the need, background, ongoing developments and research efforts with respect to the establishment of cyber-security standards and best practices at U.S. airports with special emphasis on cyber security education and literacy.
16.12.2022 Volume 1 Issue 8 View more DownloadThe cyber physical systems integrate the sensing, computation, control and networking processes into physical objects and infrastructure, which are connected through the Internet to execute a common task. Cyber physical systems can be applied in various applications, like healthcare, transportation, industrial production, environment and sustainability, and security and surveillance. However, the tight coupling of cyber systems with physical systems introduce challenges in addressing stability, security, efficiency and reliability. The machine learning (ML) security is the inclusion of cyber security mechanism to provide protection to the machine learning models against various cyber attacks. The ML models work through the traditional training and testing approaches. However, execution of such kind of approaches may not function effectively in case if a system is connected to the Internet. As online hackers can exploit deployed security mechanisms and poison the data. This data is then taken as the input by the ML models. In this article, we provide the details of various machine learning security attacks in cyber physical systems. We then discuss some defense mechanisms to protect against these attacks. We also present a threat model of ML security mechanisms deployed in cyber systems. Furthermore, we discuss various issues and challenges of ML security mechanisms deployed in cyber systems. Finally, we provide a detailed comparative study on performance of the ML models under the influence of various ML attacks in cyber physical systems.
16.12.2022 Volume 1 Issue 8 View more Download