Search results for "TOMSON"

showing 2 items of 2 documents

Balansētas izlases un kalibrācija

2016

Pētījuma mērķis ir apskatīt teoriju par balansētām izlasēm, kā arī teoriju par kuba metodi ar kuras palīdzību var iegūt balansētu izlasi, un salīdzināt, kura no metodēm dod precīzākus rezultātus - balansētas izlases vai kalibrētas izlases. Bakalaura darbs ir strukturēts četrās daļās: divās nodaļās, kurās ir apskatīts teorētiskais materiāls, praktiskā daļa, un secinājumi. Secinājumi balstās uz iegūtajiem rezultātiem, izmantojot datorprogrammu R un Microsoft Excel, kā arī uz balansētu izlašu teorijas izpētes. Diplomdarba apjoms ir 44 lappuses. Darbā ir 33 tabulas un 2 attēli. Izmantotās literatūras sarakstā ir 8 literatūras avoti. Atslēgas vārdi: balansēta izlase, kuba metode, kalibrācija, Ho…

MatemātikakalibrācijaBalansēta izlaseKuba metodeHorvica Tomsona novērtējums
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct