Dreams, Synchrony, and Synchronicity
This essay presents the dreams of a long-term patient over the course of treatment in order to explore the transpersonal potential of the relational unconscious—those open channels of unconscious communication between people. At a key moment, the patient brings in the therapist’s own childhood dream, serving to break a period of impasse and reset the therapy. Dreams and their interpretation reveal the essence of fractal consciousness, by which a sliver of experience can shed light on the whole of the psyche. A fractal model of understanding suggests open boundaries between self/other and self/world at multiple levels. The deep intimacy of ongoing therapy can capitalize on this openness by promoting shared states of physiological resonance between patient and therapist. Such conditions are ripe for facilitating and amplifying uncanny knowing, synchronicities, and other transpersonal experiences.
- Research Article
- 10.26583/bit.2022.1.03
- Mar 1, 2022
- Bezopasnost informacionnyh tehnology
This work aims to create a specialized trusted information analysis device (SDU AI) designed to control and filter information when controlling channel-forming means in an automated system in a secure design that processes restricted access information and can transmit information over open (unprotected from unauthorized access) communication channels. With the development of automated systems, automation of functions, including the control of channel-forming means, the security of processed information and the efficiency of tasks are becoming increasingly important. At the same time, in automated systems in protected execution (ASZI), for the organization of operational automated control of channel-forming means, as a rule, it must ensure the interaction of networks varying degrees of confidentiality of the processed information. The object of the study is ASZI processing restricted access information in one network and implementing the exchange of information through open (unprotected from unauthorized access) communication channels with another network. The subject of the study is to assess the possibility of using SDU AI to ensure the possibility of interfacing networks with varying degrees of confidentiality of processed information, performing the functions of monitoring and filtering information when managing channel-forming means. A unified architecture of the SDU AI has been developed. The threats to information security arising from the implementation of information exchange through open communication channels are considered. A method for creating a SDU AI based on trusted hardware and software platform designed for use in the ASZI to protect against identified threats to information security is proposed.
- Research Article
- 10.32620/reks.2022.2.13
- May 18, 2022
- RADIOELECTRONIC AND COMPUTER SYSTEMS
The subject of research. There has been studying a new universal method of information protection in optical text recognition systems when transmitting confidential data over open communication channels. This work develops the concept of creating a modern, simple and reliable method for protecting information during its transmission over communication channels, to determine the objective criteria for the quality of its work, to create a set of algorithms for implementing the proposed method and software for conducting experimental studies. The current work puts on the concept of creation of a simple and reliable current method for protecting information when passing it through communication channels, also to define the objective criteria for assessing the tool operation quality and to exercise the dedicated programs, which implement the proposed methods and developed algorithms. Based on the results of these studies, it must evaluate the practice effectiveness of the proposed method in terms of both the transmitted data coding/decoding reliability and the secrecy of the fact of special information transmission. Results. It is described the universal concept of producing and use of the contemporary methods of information protection in optical text recognition systems in a confidential data transmission over open communication channels. The main criteria for these systems performance quality are determined. A new combined method for encrypting transmitted messages using QR-codes with subsequent masking of the fact of data transmission by various methods of LSB-steganography is proposed. To conduct experimental studies, a text recognition program based on Tesseract OCR software version 4.0 was developed. The program in Python uses the recent resources of the OpenCV library. The dedicated software technique contributed to assessing the efficiency of the algorithms, which realized the transmitted data encryption and therefore communication links privacy. There are examples of the system operation and results of the software testing in modes of messages encoding for subsequent hidden transmission. Conclusion. The case studies acknowledge the high efficiency of the proposed method of confidential data protection when transmitting them via open networks. The technique can be taken as a basis for developing software aimed at protecting information in OCR systems offered by various manufacturers.
- Research Article
- 10.17721/2519-481x/2021/73-09
- Jan 1, 2021
- Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University
The paper proposes a method to improve the efficiency of the secure IP-telephony key distribution protocol based on the Diffie-Hellman algorithm, which differs from the existing method for detecting an illegitimate subscriber by introducing an automated software and hardware verification of the authentication string. If several communication channels are used in this case, an appropriate check will reveal an illegitimate subscriber. Solves the following tasks: makes it possible to identify an active illegitimate correspondent using voice synthesis software; to identify an active illegitimate correspondent of IP - protocols in the communication channels of Internet telephony in the absence of previously distributed secret key information between the correspondents of the trusted center. The results of the study allow us to indicate that the most well-known IP-protocols for the distribution of general secret information need to be improved in two directions: increasing the information security of IP-telephony and improving the main indicators of IP-protocols of Internet networks. The most dangerous attack is a meeting-in-the-middle attack on IP protocols for the distribution of shared secret information. The task of forming general secret information in the context of a "meeting in the middle" attack of an illegitimate correspondent's invasion is relevant at the present stage. One of the methods to improve the security of the IP protocol for the formation of general secret information is to monitor and prohibit the execution of an attack of the "meeting in the middle" type due to the use of several parallel independent channels of communication sessions in the Internet IP - telephony networks. Knowing the vulnerability and the level of protection of the object for which it is necessary to carry out protection, an active illegitimate correspondent can perform a combination of attacks that can lead to gaining unauthorized access to the object's data. 87 A method for identifying an active illegitimate IP subscriber is proposed - protocols for the distribution of shared secret information based on the Diffie-Hellman key exchange algorithm, the feature of the method is the use of several open communication channels. Provides a decrease in the likelihood of a successful "meeting in the middle" attack by an active illegitimate subscriber, as well as the presence of a mechanism for identifying an active attacker in the communication channel in the absence of previously distributed shared secret information. The method imposes restrictions on the communication channels used, in the sense that the communication channels must be independent.
- Research Article
- 10.23939/ujit2021.02.066
- Nov 23, 2021
- Ukrainian Journal of Information Technology
The development of computer and digital technology contributes to the growth of information flows transmitted through open and closed communication channels. In many cases, this information is confidential, financial, or commercial in nature and is of value to its owners. This requires the development of mechanisms to protect information from unauthorized access. There are two fundamental areas of secure data transmission over the open communication channels – cryptography and steganography. The fundamental difference between them is that cryptography hides from others the content of the message, and steganography hides the very fact of the message transmission. This paper is devoted to steganographic methods of data concealment, which are less researched than cryptographic, but have significant potential for use in a variety of applications. One of the important characteristics of most methods is their effectiveness. In general, efficiency is assessed in the context of solving specific problems. However, the most common criteria for the effectiveness of steganographic methods are the amount of hidden data and the method of transmitting the secret key to the receiving party, which will not allow the attacker to intercept it. Because media files make up a significant portion of network traffic, a digital image is chosen as the stegocontainer. It is proposed to determine the coordinates of the embedding location on the basis of iterative functions. The advantage of their use is the compactness of the description of the coordinates of the pixels in which the data will be hidden. In addition, it is proposed to use the Diffie-Gellman algorithm to transfer the parameters of iterative functions to the receiving side. This method of key distribution makes the steganographic method less vulnerable to being stolen by an attacker. The second performance criterion is the amount of hidden data. The paper found that the moderate addition of multiplicative noise makes it possible to increase the amount of hidden data without significantly reducing the visual quality of the stegocontainer. To analyze the distortions in the image-stegocontainer, which are due to the influence of noise and modification of the lower bits of pixels, the method of a quantitative assessment of visual quality is used, which is based on the laws of visual perception. Keywords: steganographic data hiding; hiding efficiency; iterative functions; Diffie-Gelman algorithm.
- Research Article
- 10.37493/2307-910x.2024.4.2
- Jan 1, 2024
- Sovremennaya nauka i innovatsii
Introduction. The object of the study in this paper is the information security system. The purpose of this study is to develop a system of cryptographic protection of service information transmitted over open communication channels using the TCP/IP protocol between the TCP server and the client in the concept of an information security system. The paper provides examples of various algorithms for cryptographic protection of information when transmitting information over open communication channels. Materials and methods. This article discusses special encryption algorithms: DES, Triple DES, Rijndael, RC2 and RSA. The selection of the desired algorithm in a specific work session is carried out by selecting from the drop-down list. After specifying the type of algorithm, you should select the key length in the next drop-down list. The presence of several encryption algorithms and the presence of different key lengths will significantly improve the cryptographic strength of the system being developed, since when a sent message is intercepted, the algorithm and key length can be arbitrary, which will make it difficult for unauthorized decryption of messages. Results and discussions. World experience shows that success in the field of information security largely depends on the degree of use of the latest technologies that implement the majority of open cryptographic algorithms used. A huge number of organizations spend large amounts of money to ensure the security of information transmitted both outside and within the organization. Moreover, in the second case, as a rule, less attention is paid. But this is a pressing problem today and to solve it you need a software product. Of course, information security problems cannot be solved only by developing software products, because the human factor remains the weak point of any system. Conclusion. The solutions that are proposed based on the results of the work performed within the framework of this article will enable users to transmit and receive information through open communication channels, both within the organization and outside, thereby ensuring the protection of information from unauthorized access and modification.
- Research Article
1
- 10.1134/1.2175246
- Dec 1, 2005
- Journal of Experimental and Theoretical Physics Letters
A general method is proposed for privacy protection upon correction of errors in primary keys in quantum cryptography through an open communication channel. By the example of the cascade procedure for correcting errors, a method is described for removing information sent through an open communication channel when cleaning a key. The critical percentage is found for the quantum cryptography protocol BB84 to which the cascade error correction method with deletion guarantees the security of the final key. The method proposed for removing information sent through the open communication channel is quite general and can be used for many cleaning protocols for primary keys in quantum cryptography.
- Research Article
1
- 10.21869/2223-1560-2020-24-1-175-188
- Jun 23, 2020
- Proceedings of the Southwest State University
Purpose of research. Currently, various technologies and methods are used to control the integrity and authenticity of data transmitted through open communication channels. One of them is the technology for transmitting sequences of information packets connected to each other in chains using certain cryptographic algorithms. Similar approaches are used in the well-known blockchain technology and are focused on large volumes of transmitted and protected information and large sizes of additional service information fields. The purpose of this article is to study the characteristics of systems, transmission of small information packets in comparison with traditional size frames of TCP/IP stack, in which the broken packet sequence order is restored using the chain method, by analyzing hash sequences available in each of such packets.Methods. In this article, simulation modeling, system analysis method, method of systematization and ranking of the obtained results are used.Results. It is shown that increasing the size of the additional field with the hash of the previous message from 4 to 6 bits has a significant effect on reducing the probability of erroneous restore of the order of information packets. Further increasing the length of the hash field reduces the probability of error by only 2 to 5 % for each additional bit of the hash field for any length of the chain being restored. It is shown that the coefficient of the usage of the communication channel (the ratio of useful chain of packets to the volume of information transmitted through the communication channel) is maximum when the length of the hash field is 6 in the whole range of sizes of the field information part of the data packet.Conclusion. The paper shows that the chain method is applicable for restoring the original sequence of information packets transmitted from the source to the receiver in systems where the preservation of the sequence of packets is not guaranteed. The obtained values of the transmission system parameters allow us to ensure acceptable reliability of data transmission with a minimum amount of additional service information, and achieve information redundancy less than that in similar ones by 10-15.
- Research Article
14
- 10.1080/13669870701315799
- Jul 1, 2007
- Journal of Risk Research
Response to risks can be seen as an ecological process, involving a community of actors whose perceptions and actions play off each other, and whose responses help to determine the way in which risk events play out. Risk governance thus needs to take account of how the many different stakeholders caught up in the event respond to the perceived risks. The NATO‐MoD funded MERREA project was aimed at exploring these processes of risk response through a series of case studies, as a basis for developing more effective risk governance strategies. This paper describes the study and summarises results from a cross‐cutting analysis of the case studies. It highlights five key issues: the inadequate identification and characterisation of stakeholders that occurs in many risk situations; the importance of given and self‐adopted roles in determining stakeholders' understanding and expectations of risk; the importance of recognising both formal and informal channels of risk communication in any risk situation, requiring the establishment of effective and open channels of communication well in advance of any event; the need to recognise, admit and communicate uncertainty in risk situations if trust is to be maintained; and the importance of establishing lead organisations for risk governance who carry the trust of all the stakeholders concerned.
- Research Article
42
- 10.1109/access.2022.3201876
- Jan 1, 2022
- IEEE Access
The smart healthcare system has improved the patients quality of life (QoL), where the records are being analyzed remotely by distributed stakeholders. It requires a voluminous exchange of data for disease prediction via the open communication channel, i.e., the Internet to train artificial intelligence (AI) models efficiently and effectively. The open nature of communication channels puts data privacy at high risk and affects the model training of collected data at centralized servers. To overcome this, an emerging concept, i.e., federated learning (FL) is a viable solution. It performs training at client nodes and aggregates their results to train the global model. The concept of local training preserves the privacy, confidentiality, and integrity of the patient’s data which contributes effectively to the training process. The applicability of FL in the healthcare domain has various advantages, but it has not been explored to its extent. The existing surveys majorly focused on the role of FL in diverse applications, but there exists no detailed or comprehensive survey on FL in healthcare informatics (HI). We present a relative comparison of recent surveys with the proposed survey. To strengthen healthcare data privacy and increase the QoL of patients, we proposed an FL-based layered healthcare informatics architecture along with the case study on FL-based electronic health records (FL-EHR). We discuss the emerging FL models, and present the statistical and security challenges in FL adoption in medical setups. Thus, the review presents useful insights for both academia and healthcare practitioners to investigate FL application in HI ecosystems.
- Research Article
1
- 10.1051/e3sconf/202131102005
- Jan 1, 2021
- E3S Web of Conferences
The article presents the results of the analysis of the process of expansion and diversity of communication channels in the university environment, which is relevant from the standpoint of achieving the goals of sustainable development in the field of education. It is shown that one of the most accessible and open communication channels, in which modern students are actively involved, is the channel of environmental communications. They have many manifestations, which corresponds to the most exceptionally wide ecological space, reflecting both individual and collective interests, features of a narrow professional attitude to nature and its civilizational understanding. A significant part of the disciplines studied in higher education contributes to the formation of students' environmental competencies. The specificity of the ecological approach to education and upbringing contributes to involvement of students in activities for the nature protection. The regularities of environmental communications functioning can be traced on the example of environmental education carried out at the Moscow Automobile Road State Technical University (MADI).
- Research Article
- 10.47598/2078-9025-2021-4-53-114-124
- Dec 29, 2021
- Vestnik BIST (Bashkir Institute of Social Technologies)
The article analyzes the process of formation in the academic environment of a higher educational institution of the desire to expand and diversify communication channels, which is significant from the standpoint of achieving the goals of sustainable development in the field of education. It is shown that one of the most accessible and open communication channels is ecological. This is due to the peculiarities of the very ecological approach to education and upbringing, which contributes to the involvement of students in the protection of nature, as well as the fact that this channel opens up opportunities for transition to other areas, including political communication.
- Research Article
1
- 10.33383/2018-105
- Feb 1, 2019
- Light & Engineering
Results of theoretical and experimental research of NLOS (NonLine of Sight) communication systems in the atmosphere, under water, and in mixed media based on publications of authors from China, Canada, Greece, the USA, Great Britain, Russia, and other countries are discussed in the present work. The theory of radiation transfer and the linear systems theory provide the basis for theoretical research. The radiation transfer equation is solved by the Monte–Carlo method in the singlescattering approximation. It is demonstrated that approximate methods are applicable when the average scattering multiplicity in open communication channels does not exceed 1. The Monte Carlo method is used to study the influence of opticalgeometric parameters of schemes of communication channels on the probabilities of communication errors, signal/noise ratios, limiting base lengths, attenuation of informationcarrying signals, and their superposition leading to communication errors. Examples of communications in the atmosphere in the UV range at distances up to 1300 m, in the visible range up to70 km, and under water up to 20 m are given. Search for optimal methods of signal modulation, development of software and hardware complexes for numerical simulation of the transfer properties of communication channels, refinement of analytical models of impulse transfer characteristics of noncoplanar schemes of bistatic optoelectronic communication systems (OECS), and research of the effect of winddriven sea waves and processes of radiation scattering in water are planned to study the efficiency of operation of the communication systems and to expand ranges of variations of the input NLOS and OECS parameters in the experiments carried out in natural water reservoirs.
- Conference Article
- 10.1109/educon.2014.6826098
- Apr 1, 2014
Late developments in information and communication technology show high impact on current implementation of technical documentation. The traditional use of technical documentations was solely defined as technical product information to aid the customer in cases of product learning or handling product malfunctions. Embedding technical documentation into the actual product opens new potentials for consumer learning as well as for various marketing purposes. For private sectors, in form of consumer electronics, and also for business scenarios like testing facilities or manufacturing installations, embedded learning environments enrich the product and open communication channels. By implementing feedback channels, interactive systems can be developed, providing useful information for users and letting businesses gain insights into product usage behaviors at the same time. We identify seven relevant factors for successful implementations of such systems. First implementations for diverse branches to demonstrate the current state-of-the-art in embedded interactive learning environments are depicted. In a critical analysis regarding the selected cases, current limitations and future potentials are highlighted. Finally, we focus on the product engineer's perspective. Utilizing the product as major communication channel expands the engineer's responsibilities, requiring new knowledge in business communication. A paradigm shift in the education of engineers is depicted as consequence of future developments.
- Research Article
1
- 10.14489/vkit.2020.11.pp.047-054
- Nov 1, 2020
- Vestnik komp'iuternykh i informatsionnykh tekhnologii
The tasks of secure generating, distributing, and delivering keys to telecommunications systems correspondents that use cryptographic methods to protect information, along with accounting tasks, use order, and keys destruction are fundamental to the key life cycle task list. Traditionally, they are solved using secure communication channels, which is not economical, not always timely and in certain conditions impossible. The alternatives are key negotiation methods by transmitting information over open communication channels. The information efficiency accurate estimates are represented for some methods of open key agreement between two legitimate correspondents. They are not known for the network key formation conditions. The study purpose: an evidence-based search for potential evaluations of the open network key generation information effectiveness. The results: based on a set of represented results (including problem statement, intruder models development, channel connectivity, coder, decoder, system of quality indicators and key forming method requirements, key generation method, the network key generation asymptotic information efficiency index, proof key capacity theorem), an asymptotic information efficiency index estimate of a network key forming was made, which the key network bandwidth measurement based on the information exchange on a binary broadcast channel of communication with the component channels described by discrete symmetric channels models is proposed. Besides, Broadcast channel entropy function influence on the estimate is investigated. The pattern determining the network key forming possibility that meets the requirements is identified. The connection of the results with known scientific research is identified. The areas for further research are identified. The practical significance: the obtained results develop the wellknown scientific results in the field of the open key agreement theory and can be useful to specialists in the design and construction field of promising key management subsystems of modern cryptographic information protection systems that provide a closed telecommunication systems information exchange.
- Research Article
1
- 10.20535/2219-380413201546103
- Nov 7, 2015
- Information systems, mechanics and control
Quantum cryptography is a relatively new but promising method for secure data transmission. Today it is believed that it can ensure the absolute secrecy of data, resulting from the principles of quantum physics, on which it is based, namely the uncertainty principle of quantum Heisenberg. According to this principle cannot measure any aspect of photons without distorting thus irrevocably different option. That is the recipient of a message knows when attempting invasion in this necessarily knows.To create a quantum communication channel often use fiber optic lines or open space in which carriers serve single photons or pairs of entangled photons are often used.Three tasks facing cryptography are:1. Ensuring the confidentiality of messages sent via open communication channels.2. Authentication messages that confirm the validity of the information received and sent.3. Installing intrusion in fact, if it took place.Given the importance of information security, quantum cryptography technology will soon be available not only banks or large corporations but also individuals. Leading IT companies are in search of optimum circuit solutions that would produce industrial equipment for the transmission of confidential information available for mass use. The main obstacles for implementation of quantum cryptography methods are short distances, which can transmit information with modern facilities, high cost and cumbersome equipment. To solve these problems prompted the idea of creating a hybrid air-fiber system using satellite communications is proposed. The use of artificial satellites for the transmission of photons through the air opens the possibility of secret key clients in any part of the Earth and even beyond.It is also appropriate to review the possibility of using existing telecommunication and electrical networks for the transmission of quantum keys. The ideas p presented in the paper, open new space for scientific experiments.
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.