CONTROL MODEL OF DATA STREAM TRANSMITTED OVER A NETWORK BASED ON PROXYING TECHNOLOGY
Article Sidebar
Open full text
Issue Vol. 8 No. 1 (2018)
-
DETERMINATION OF THE EFFICIENCY FACTORS OF THE ABSORPTION AND SCATTERING OF NICKEL NANOPARTICLES
Oleksandr Machulianskyi, Bohdan Babych, Viktor Machulianskyi4-7
-
CONTROL MODEL OF DATA STREAM TRANSMITTED OVER A NETWORK BASED ON PROXYING TECHNOLOGY
Olesia Barkovska, Vitaliy Serdechnyi8-11
-
INVESTIGATION OF THE MEMRISTOR NONLINEAR PROPERTIES
Sviatoslav Khrapko, Volodymyr Rusyn, Leonid Politansky12-15
-
IMITATION MODELING OF THE ROUTING PROCESS BASED ON FUZZY LOGIC
Ivan Lesovoy, Genagij Pylypenko16-19
-
INVARIANT PIEZORESONANCE DEVICES BASED ON ADAPTIVE MULTIFREQUENCY SYSTEMS WITH A PREDICTIVE STANDARD
Sergey Pidchenko, Alla Taranchuk20-23
-
DEVELOPMENT AND RESEARCH OF CRYPTOGRAPHIC HASH FUNCTIONS BASED ON TWO-DIMENSIONAL CELLULAR AUTOMATA
Yuliya Tanasyuk, Sergey Ostapov24-27
-
GENERALIZED APPROACH TO HURST EXPONENT ESTIMATING BY TIME SERIES
Lyudmyla Kirichenko, Tamara Radivilova, Vitalii Bulakh28-31
-
SPECTRAL SENSITIVITY OF HUMAN VISION TO THE LIGHT PULSES
Volodymyr Brailovsky, Ivan Pyslar, Magharyta Rozhdestvenska, Magdalena Michalska32-35
-
ORGANIZATION OF IMPLEMENTATION OF UBIQUITOUS SENSOR NETWORKS
Sergey Toliupa, Yuriy Kravchenko, Aleksander Trush36-39
-
PECULIARITIES OF THE RADIO SIGNALS AND HINDRANCES IN THE NAVIGATION SYSTEM OF THE REMOTE-PILOTED VEHICLES
Mykola Mykyjchuk, Volodymyr Markiv40-43
-
DISTORTIONLESS SIGNALS TRANSFER THROUGH A WIRE MEDIA METASTRUCTURE
Dmytro Vovchuk, Serhii Haliuk, Leonid Politanskyy44-47
-
THE USE OF ARTIFICIAL INTELLIGENCE IN AUTOMATED IN-HOUSE LOGISTICS CENTRES
Tomasz Rymarczyk, Grzegorz Kłosowski48-51
-
USING MICROSERVICES ARCHITECTURE AS ANALYTICAL SYSTEM FOR ELECTRICAL IMPEDANCE TOMOGRAPHY IMAGING
Tomasz Cieplak, Tomasz Rymarczyk, Grzegorz Kłosowski52-55
-
OPTIMIZATION OF DATA PROCESSING FOR REQUESTING OBSERVATION SYSTEMS
Iryna V. Svyd, Andrij I. Obod, Oleksandr S. Maltsev, Daria B. Pavlova, Bridel V. Mongo56-59
-
METHODS OF PRODUCING APODIZED FIBER BRAGG GRATINGS AND EXAMPLES OF THEIR APPLICATIONS
Łukasz Zychowicz, Jacek Klimek, Piotr Kisała60-63
-
DEAD TIME MEASUREMENT BY TWO-SOURCE METHOD – OPTIMIZATION OF MEASUREMENT TIME DIVISION
Grzegorz Domański, Bogumił Konarzewski, Robert Kurjata, Krzysztof Zaremba, Janusz Marzec, Michał Dziewiecki, Marcin Ziembicki, Andrzej Rychter, Waldemar Smolik, Roman Szabatin, Piotr Brzeski64-66
-
ANALYSIS OF THE BENDING STRAIN INFLUENCE ON THE CURRENT- -VOLTAGE CHARACTERISTICS OF HTC SUPERCONDUCTING TAPES
Jacek Sosnowski67-70
-
DETERMINATION OF R = F(T) CHARACTERISTICS OF THE FIRST AND SECOND GENERATION SUPERCONDUCTING TAPES
Rafał Kwoka, Janusz Kozak, Michał Majka71-74
Archives
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
-
Vol. 9 No. 4
2019-12-16 20
-
Vol. 9 No. 3
2019-09-26 20
-
Vol. 9 No. 2
2019-06-21 16
-
Vol. 9 No. 1
2019-03-03 13
-
Vol. 8 No. 4
2018-12-16 16
-
Vol. 8 No. 3
2018-09-25 16
-
Vol. 8 No. 2
2018-05-30 18
-
Vol. 8 No. 1
2018-02-28 18
-
Vol. 7 No. 4
2017-12-21 23
-
Vol. 7 No. 3
2017-09-30 24
-
Vol. 7 No. 2
2017-06-30 27
-
Vol. 7 No. 1
2017-03-03 33
-
Vol. 6 No. 4
2016-12-22 16
-
Vol. 6 No. 3
2016-08-08 18
-
Vol. 6 No. 2
2016-05-10 16
-
Vol. 6 No. 1
2016-02-04 16
Main Article Content
DOI
Authors
Abstract
Network traffic control model is described in the work, including data mining modules transmitted in the network as well as further qualified data analysis module based on artificial intelligence methods and means, namely recursive and convolutional neural networks. The topicality of work is proved by the intensive scientific research conducted in the field of information security, big data intelligent data processing tools, and stipulated by growing necessity to limit access of children to aggressive information, which can impact on the child’s psychoemotional state. Particular attention is paid in the article to proxy-server development for HTTP query receipt, search for a match in white and black lists and decision making as to data legality.
Keywords:
References
Barabanov А.В., Markov А.С., Cirlov В.L.: Sertifikatsiya sistem obnaruzheniya vtorzheniy. Otkrytyye sistemy. SUBD 3/2012, 31–33.
Huan T.: The Application of SSL Protocol in Computer Network Communication. Intelligence Computation and Evolutionary Computation. Advances in Intelligent Systems and Computing 180/2013, 779–783.
Kuznetsova E.S., Loukachevitch N.V., Chetviorkin I.I.: Testing rules for a sentiment analysis system. Computational Linguistics and Intellectual Technologies 12(2)/2013, 71–80.
Pak A., Paroubek P.: Language independent approach to sentiment analysis (LIMSI participation in ROMIP ’11). Computational Linguistics and Intellectual Technologies 11(2)/2012, 37–50.
Scherer S., Schwenker F., Palm G.: Emotion Recognition from Speech Using Multi-Classifier Systems and RBF-Ensembles. Studies in Computational Intelligence 83/2008, 49–70.
Sentsova A.Yu., Mashkyna Y.V.: Avtomatizatsiya ekspertnogo audita informatsionnoy bezopasnosti na osnove ispol'zovaniya iskusstvennoy neyronnoy seti. Bezopasnost' informatsionnykh tekhnologiy 2/2014, 65–70.
Wan S., Ren Z.: Research on Full-Proxy Based TCP Congestion Control Strategy. Advances in Intelligent and Soft Computing 133/2012, 371–378.
Article Details
Abstract views: 308
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
